motion based security alarm

17

Upload: akshay-surve

Post on 05-Jul-2015

101 views

Category:

Engineering


1 download

DESCRIPTION

project

TRANSCRIPT

Page 1: Motion based security alarm
Page 2: Motion based security alarm

GROUP MEMBERS

AKSHATA MOHITE

MANGESH NIKAM

PRATIK NAIK

KIRTI MADHAVI

UNDER THE GUIDANCE OF

Ms. SHOBHANA GAIKWAD

Page 3: Motion based security alarm

Existing System

Limitations of Existing System

Proposed System

Algorithm

Data Flow Diagram

Advantages of Proposed System

Real Time Applications

Soft. & Hardware Specification

References

Page 4: Motion based security alarm

CCTV

Now a Days CCTV (Closed circuit Television) Is Most Popular System For Security Purpose.

Page 5: Motion based security alarm

It Gives Evidence After Incident.

It’s Difficult To Maintain Heavy Amount OfRaw Video Data

Human Interaction.

Require Higher Bandwidth For TransmittingThe Visual Data.

Page 6: Motion based security alarm

We Propose a Robust Security Alarming System Based On Detection Of Moving Objects In Video Streams And An Efficient Security System.

Page 7: Motion based security alarm

Alarming And Report

Comparison

Edge Detection

Convert To Gray Image

Capture Image

Page 8: Motion based security alarm

MODULE 1 :Taking Snapshot Of Images.

MODULE 2 : This Images Will Converted To Gray Images.

MODULE 3 : Detect Edges Of Images By Using Canny Detector.

MODULE 4 : Edges Of Images Will Compared With DefaultImages.

MODULE 5 : If Suspicious Image Is Detected Then Alert Administrator.

Page 9: Motion based security alarm

CANNY EDGE DETECTOR

The Algorithm Runs In 5 Separate Steps

1. Smoothing

2. Finding Gradients

3. Non-Maximum Suppression

4. Double Thresholding

5. Edge Tracking By Hysteresis

Page 10: Motion based security alarm

EDGES COMPARISON

This Module Will Extract The Moving ObjectFrom The Edged Images And Give TheCoordinate And Area Acquired By The Object

This object Will Be Compared With ThePreviously Stored the Default Behavior Of TheObject In Restricted Area

If Any Conflicting Behaviour Apart FromDefault Stored Context Is Detected; It WillSend To The Alarming Module

Page 11: Motion based security alarm

ALARMING AND REPORT

If Module 4 Sends Report Of Any Suspicious Activity Then This Module Will Be Activated. It Will Alert The Administrator

As The Alarm Rings The System Will Enter New Record In Database Which Will Have Information For Analysis Of Event

Page 12: Motion based security alarm
Page 13: Motion based security alarm

Helpful In Identifying People In The Crime Scenes etc.

Don’t need to monitor videos manually by the person

Keep Track Of Information Video Data For Future Use

Reduce The Large Data Storage

Does Not Require Large Bandwidth

Provide a Robust Alarming System To Alert The System Administrator

Page 14: Motion based security alarm

Indoor/Outdoor Security.Real Time Crime Detection.Traffic Monitoring.High Security Area,

BANKS. AIRPORTS. ATM CENTERS. MALLS.

Page 15: Motion based security alarm

SOFTWARE

SPECIFICATION

• Operating SystemWindows XP,7

• Programming

language :

• Java(JDK 1.6)

SOFTWARE

TOOLS

• IBM RAD

,Rational Rose

• Backend

Microsoft

Access

HARDWARE

SPECIFICATION

•PROCESSOR: Speed

minimum: PIII 800 MHz

•RAM: Minimum: 128 MB,

256 MB

•Web camera

Page 16: Motion based security alarm

PAPER REFERENCE

• ICCTAI'2011 paper on “Motion Based Security Alarming System for Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R. Vinotha”

WEB REFERENCES

• http://www.filestub.com

• http://www.ebookee.org

• http://www.google.com

Page 17: Motion based security alarm