Novel Approach to Create and Detect Invisible Cloak using Monocular Camera or Web Cam

PDF (1533KB), PP.51-61

Views: 0 Downloads: 0

Author(s)

Nishant Pratap Singh 1 Adi Maqsood 1 Arunita Chaukiyal 1 Preeti Marwaha 1,*

1. Department of Computer Science, Acharya Narendra Dev College, University of Delhi, New Delhi, 110019, India

* Corresponding author.

DOI: https://doi.org/10.5815/ijem.2026.02.03

Received: 30 Nov. 2025 / Revised: 30 Dec. 2025 / Accepted: 20 Feb. 2026 / Published: 8 Apr. 2026

Index Terms

OpenCV, Gaussian Curves, Invisible Cloak, Intrusion Detection, Security

Abstract

The design of an invisible cloak has attracted attention owing to its potential use in espionage and military applications. Advances in computer vision and image processing have enabled the creation of invisible cloaks. This study presents the design and detection of an invisible cloak using a cost-effective monocular camera. The proposed algorithm uses the OpenCV library in Python to create and detect the cloak by analyzing individual pixels in video frames to identify areas with minimal or no change in pixel values. The approach relies on pixel-level analysis using Gaussian curves for detection. Experimental validation of self-created and publicly available datasets demonstrates the effectiveness of the method. Although the algorithm performs well under static environmental conditions, challenges remain in dynamic settings, which will be addressed in future work to improve robustness. This study contributes to the development of practical and affordable invisibility cloak technology and reliable detection methods to mitigate potential misuse.

Cite This Paper

Nishant Pratap Singh, Adi Maqsood, Arunita Chaukiyal, Preeti Marwaha, "Novel Approach to Create and Detect Invisible Cloak using Monocular Camera or Web Cam", International Journal of Engineering and Manufacturing (IJEM), Vol.16, No.2, pp.51-61, 2026. DOI:10.5815/ijem.2026.02.03

Reference

[1]Culjak, I., Abram, D., Pribanic, T., Dzapo, H., & Cifrek, M. (2012). A brief introduction to OpenCV. In Proceedings of the 35th International Convention MIPRO (pp. 1725–1730). IEEE.
[2]Zhang, L., Li, X. Y., Liu, K., Liu, C., Ding, X., & Liu, Y. (2018). Cloak of invisibility: Privacy-friendly photo capturing and sharing system. IEEE Transactions on Mobile Computing, 18(11), 2488–2501.
[3]Zheng, Y., Zhang, X., Wang, F., Cao, T., Sun, M., & Wang, X. (2018). Detection of people with camouflage pattern via dense deconvolution network. IEEE Signal Processing Letters, 26(1), 29–33.
[4]Criminisi, A., Pérez, P., & Toyama, K. (2004). Region filling and object removal by exemplar-based image inpainting. IEEE Transactions on Image Processing, 13(9), 1200–1212.
[5]Q., Zhou, M., & Hu, B. (2020). Object detection based on fusing monocular camera and LiDAR data in decision level using DS evidence theory. In 2020 IEEE 16th International Conference on Automation Science and Engineering (CASE) (pp. 476–481). IEEE.
[6]Kulkarni, N. (2012). Color thresholding method for image segmentation of natural images. International Journal of Image, Graphics and Signal Processing, 4(1), 28.
[7]Sergyan, S. (2008). Color histogram features based image classification in content-based image retrieval systems. In 2008 6th International Symposium on Applied Machine Intelligence and Informatics (pp. 221–224). IEEE.
[8]Ibraheem, N. A., Hasan, M. M., Khan, R. Z., & Mishra, P. K. (2012). Understanding color models: A review. ARPN Journal of Science and Technology, 2(3), 265–275.
[9]Sugano, H., & Miyamoto, R. (2008). Parallel implementation of morphological processing on Cell/BE with OpenCV interface. In 2008 3rd International Symposium on Communications, Control and Signal Processing (pp. 578–583). IEEE.
[10]Reynolds, D. A. (2009). Gaussian mixture models. In Encyclopedia of Biometrics (pp. 659–663). Springer.
[11]Bocklet, T., Maier, A., Bauer, J. G., Burkhardt, F., & Nöth, E. (2008). Age and gender recognition for telephone applications based on GMM supervectors and support vector machines. In 2008 IEEE International Conference on Acoustics, Speech and Signal Processing (pp. 1605–1608). IEEE.
[12]Parzen, E. (1962). On estimation of a probability density function and mode. The Annals of Mathematical Statistics, 33(3), 1065–1076.
[13]Choudhury, B., & Jha, R. M. (2013). A review of metamaterial invisibility cloaks. Computers, Materials & Continua, 33(3), 275–303.
[14]Wu, Z., Lim, S. N., Davis, L. S., & Goldstein, T. (2020). Making an invisibility cloak: Real-world adversarial attacks on object detectors. In Computer Vision – ECCV 2020 (pp. 1–17). Springer International Publishing.
[15]Singh, N. P. (n.d.). Data invisible cloak dataset [Data set]. GitHub. https://github.com/Nishant-Pratap-Singh/Data-invisible-cloak
[16]Atri, A. (n.d.). Invisible man dataset [Data set]. GitHub. https://github.com/AdityaAtri/invisible-man