ESE498. Intruder Detection System



Similar documents
Indoor Surveillance System Using Android Platform

Analecta Vol. 8, No. 2 ISSN

Rapid Application Development for Machine Vision A New Approach

Automatic Extraction of Signatures from Bank Cheques and other Documents

Automated Monitoring System for Fall Detection in the Elderly

False alarm in outdoor environments

DATA ACQUISITION FROM IN VITRO TESTING OF AN OCCLUDING MEDICAL DEVICE

Project 4: Camera as a Sensor, Life-Cycle Analysis, and Employee Training Program


Three Levels of Data-Logging Software from National Instruments

CCTV - Video Analytics for Traffic Management

REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING

Mouse Control using a Web Camera based on Colour Detection

GETTING STARTED WITH LABVIEW POINT-BY-POINT VIS

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA

How To Set Up A Wide Area Surveillance System

The SwannCloud Mobile App


Multimodal Biometric Recognition Security System

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

Signature Region of Interest using Auto cropping

Using NI Vision & Motion for Automated Inspection of Medical Devices and Pharmaceutical Processes. Morten Jensen 2004

A secure face tracking system

IMAQ. IMAQ Vision for LabVIEW User Manual. IMAQ Vision for LabVIEW User Manual. June 2003 Edition Part Number B-01

Fall detection in the elderly by head tracking

GeoVision Setup. Once all the settings for Windows are completed and you have all the hard drives setup you can install GeoVision.

Trigger-to-Image Reliability (T2IR)

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE.

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

Automatic Traffic Estimation Using Image Processing

PHOTOGRAMMETRIC TECHNIQUES FOR MEASUREMENTS IN WOODWORKING INDUSTRY

VISION ALGORITHM FOR SEAM TRACKING IN AUTOMATIC WELDING SYSTEM Arun Prakash 1

Energy efficient Smart home based on Wireless Sensor Network using LabVIEW

Vision based approach to human fall detection

Security Alarm Monitoring Protocol

A Method of Caption Detection in News Video

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6


FRC WPI Robotics Library Overview

Using the NI 17xx Smart Camera Direct Drive Lighting Controller

Security Service de Services sécurité. Security Alarm Monitoring Protocol

Manufacturing Process and Cost Estimation through Process Detection by Applying Image Processing Technique

19th International Conference on Mechatronics and Machine Vision in Practice (M2VIP12), 28-30th Nov 2012, Auckland, New-Zealand

Locating and Decoding EAN-13 Barcodes from Images Captured by Digital Cameras

Detection and Restoration of Vertical Non-linear Scratches in Digitized Film Sequences

Distance-Learning Remote Laboratories using LabVIEW

Fall Detection System based on Kinect Sensor using Novel Detection and Posture Recognition Algorithm

Demo: Real-time Tracking of Round Object

LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK

Anomaly Detection Toolkit for Integrated Systems Health Management (ISHM)

Virtual Mouse Using a Webcam

A Survey of Video Processing with Field Programmable Gate Arrays (FGPA)

The Scientific Data Mining Process

3D SCANNING: A NEW APPROACH TOWARDS MODEL DEVELOPMENT IN ADVANCED MANUFACTURING SYSTEM

Social Innovation through Utilization of Big Data

Building an Advanced Invariant Real-Time Human Tracking System

The remote CCTV monitoring specialists CCTV Monitoring

E27 SPRING 2013 ZUCKER PROJECT 2 PROJECT 2 AUGMENTED REALITY GAMING SYSTEM

ROBOTRACKER A SYSTEM FOR TRACKING MULTIPLE ROBOTS IN REAL TIME. by Alex Sirota, alex@elbrus.com

Tracking performance evaluation on PETS 2015 Challenge datasets

A Reliability Point and Kalman Filter-based Vehicle Tracking Technique

Location tracking: technology, methodology and applications

Home Invasion Safety. Protecting Your Family

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

Visual Structure Analysis of Flow Charts in Patent Images

Data Centers. Defense in depth. Network video protection for data centers.

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

A Prototype For Eye-Gaze Corrected

Vision-Based Blind Spot Detection Using Optical Flow

Manage Software Development in LabVIEW with Professional Tools

Embedded Vision on FPGAs The MathWorks, Inc. 1

Managed Security Services

Low-resolution Character Recognition by Video-based Super-resolution

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

Object Tracking System Using Approximate Median Filter, Kalman Filter and Dynamic Template Matching

Nicholas Mezei CSCI 6448 OOA&D Homework #3: Use Cases. Use Case Diagram: Home Security System. Alarm System

Melaleuca Home Security

SECURITY SOLUTIONS BANKING AND FINANCE

SIGNATURE VERIFICATION

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

Burglar Alarms Advice

COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS

Low Cost Home Security Options. Jim Niehaus October 9, 2012

A method of generating free-route walk-through animation using vehicle-borne video image

A Survey on Intelligent Home Security System Using GSM

PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING

WHITE PAPER Professional Series Detectors Sensor Data Fusion February 2008

The IoT s application to protect your family

The Role of Size Normalization on the Recognition Rate of Handwritten Numerals

Transcription:

0 Washington University in St. Louis School of Engineering and Applied Science Electrical and Systems Engineering Department ESE498 Intruder Detection System By Allen Chiang, Jonathan Chu, Siwei Su Supervisor Professor Robert Morley Submitted in Partial Fulfillment of the Requirement for the BSEE Degree, Electrical and Systems Engineering Department, School of Engineering and Applied Science, Washington University in St. Louis May 2014

1 Student Statement This project is the official documentation for the Intruder Detection System built by Senior Electrical Engineering students Allen Chiang, Jonathan Chu, and Siwei Su. The three students are the main designers of the project, and have maintained the integrity of the course in the design of this project. These designs are in compliance of the Washington University Honor Code.

2 Project Abstract In this project, we used LabVIEW with NI Vision to build an intruder detection system algorithm to detect the presence of an intruder. We realized that household pets could be a problem in most household safety systems, as their movement could easily trigger it off. It is because of this that we designed our algorithm to ignore any pets that come into the viewing space. Our system alerts the user through SMS and Email if any intruder has been detected. The images that were acquired and analyzed through frame comparisons converted to binary images that represent change, and then filtered through a series of image refining VI s, helping to enhance our change detection results. Acknowledgements We would like to thank Professor Robert Morley for being our Senior Design Mentor. The guide and direction that he gave to our project led us to a successful design. He supported us through many difficulties throughout the project, and ultimately helped us achieve the goal we set out to accomplish. We would also like to thank Professor Ed Richter for his guidance in our project. His invaluable LabVIEW and NI Vision expertise helped us fully utilize these programs, bringing us closer to our goals.

3 Table of Contents Student Statement... 1 Project Abstract... 2 List of Figures... 4 List of Tables... 5 Problem Formulation... 6 Problem Statement... 6 Problem Formulation... 7 Project Specifications... 8 Concept Synthesis... 10 Literature Review... 10 Concept Generation... 10 Concept Reduction... 12 Detailed Engineering Analysis and Design Presentation... 13 Image Acquisition... 14 Image Processing... 15 Alert... 20 Cost Analysis... 21 Bill of Materials... 21 Hazards and Failure Analysis... 22

4 Conclusions... 23 References... 24 List of Figures Figure1 - Tree diagram illustrating our brainstorming process and ideas... 11 Figure2 - Structure and data flow of Intruder Detection System. Processing occurs in three steps: signal acquisition, signal processing, and alert.... 13 Figure3 Labview VIs used to acquire images: IMAQdx Open Camera, IMAQdx Configure Grab, IMAQdx Grab... 13 Figure4 - Original Image Acquired from Camera... 14 Figure5 - The part of Labview code doing subtraction... 14 Figure6 - Image after the subtraction of subsequent frames... 15 Figure7 - The part of Labview code doing threshold... 15 Figure8 - Image converted into binary image... 16 Figure9 - The part of code doing filtering... 16 Figure10 - The part of code doing Morphology and filling holes... 17 Figure11 - Image after filtering... 17 Figure12 - The part of code doing clamping... 18 Figure13 - Image after clamped... 18

5 Figure14 - The part of code drawing tracking box... 19 Figure15 - The original image with tracking box... 19 Figure16 - The thresholds used to check if the moving object is a pet or a human... 20 Figure17 - The part of code sending emails and text messages... 20 List of Tables Table1 Bill of Materials... 21

6 Problem Formulation Problem Statement: According to the FBI, 97% of all home intrusions happen when no one is at home. In 2012, a home was invaded every 20 seconds (burglarized or robbed). Around the United States, 4457 homes are robbed or burglarized every single day. However, only 18% of these incidents end in arrests. There is an increasing problem of home intruders in the United States. More and more people are finding ways to break into homes, posing a safety threat to homeowners and neighborhoods. People turn to crime, thinking that the risk is worth the return, since many intruders never get caught. This creates a very bad environment for people to live in, as they would constantly have to live in fear. The problem with home security in the modern world is a cause for concern. In the United States in 1998, police responded to approximately 38 million home security alarm activations, at an annual cost of approximately $1.5 billion. Nationwide, false alarms would by itself account for 10 to 25 percent of all calls to the Police Department. That is between 3,800,000 and 9,500,000, costing between $150 million and $375 million. Among these false alarms, many are triggered due to owners accidentally setting the alarm while household pets are free to roam. We wanted to fix this problem, by building a home intruder detection system that can accurately detect a human intruder, while filtering out movements that come from household pets. The self-proposed problem to be solved in our project is to design and implement an intruder detection system.

7 The objectives are: the system should be able to alert the user once an intruder has been detected the system should be able to differentiate between a human intruder and a household pet the system should apply filters to minimize false positives and false negatives the system should work in any enclosed environment (such as a living room, dorm room, etc.) the system should be reliable The constraints are: Costs. We will try and create our system with minimal costs. We will create the system using software that is accessible to us for free through the engineering school Problem Formulation: We decided to use LabView to tackle our problem of creating an intruder detection system. We chose LabView because it is accessible for free through the engineering school, it contains a NI Vision package that contains many useful VIs that we can utilize, it is known for being a useful software for prototyping, and because it is compatible with a wide variety of webcams. The verification of the accuracy and success of our system will be very straightforward at the end of the project: the system will either be able to detect human intruders or it will be unable to.

8 Project Specifications Our design will include the following: Image acquisition: Our camera is able to capture images of various resolutions and image types. The resolution and image type that we choose to acquire is a 800 x 600 RGB24 video input. Our camera is able to capture frames at a maximum rate of 35 frames per second for 800 x 600 RGB24 video input. Image processing: Must compare consecutive frames by subtracting pixels to find the area of change. The system must subsequently convert the subtracted image to a binary image. Must actively filter binary images using a salt and pepper filter to filter out noise. Must improve binary image quality by rounding edges and filling in empty spaces. Intruder Algorithm: Extract the pixel height of the area of change determined by our image processing workflow, compare the pixel height with a threshold. The threshold is a predetermined value that is dependent on the area of enclosed space that the camera is capturing. Extract the width and height of the area of change determined by our image processing workflow. Compare the ratio of the width and height of the area of change to a predetermined ratio threshold.

9 Email SMS Alert: Actively sends out alerts every 3 seconds while intruder is inside the camera view Must halt SMS/Email operations when intruder steps out of camera view System must do nothing in the event of a pet System operation: Accuracy in detections(of intruders or pets) of up to 90% Using 800 x 600 RGB24 video input, our system runs with a frame rate of around 25 frames per second.

10 Concept Synthesis Literature Review: An IEEE paper, Image change detection algorithms: a systematic survey, by Radke, R.J., Andra, S., Al-Kofahi, O., and Roysam, B., gave us many ideas and potential algorithms for detecting change while we were brainstorming for methods for detecting change in images. The paper showed us various ways to improve change detection, such as preprocessing models, predictive models, and significance and hypothesis testing. A website with an introduction and tutorial to image change detection, Tracy s Creative Image Tutorials, had very clear and easy to understand step by step images that brings you through a sequence of images showing what was done and how it contributes to finding the change in an image. The website was very helpful for understanding the gist for image change detection in the early stages of our design process. Our group started the project with no prior experience with LabView, thus a lot of our reading was directed to the learning of LabView. The IMAQ Vision for LabVIEW User Manual and other LabVIEW Manuals helped us get started with coding in LabVIEW. Concept Generation In the design of a reliable intruder detection system, we had 2 main components of the project: Detection Method and Functionalities. We had to ensure that we could build a system that could reliably detect intruders as well as perform functions to alert and process the images. In the beginning, we were considering various detection techniques, such as

11 weight detection or even a simple password key input system. Below is a tree diagram illustrating our brainstorming process and ideas. Figure 1. Tree diagram illustrating our brainstorming process and ideas

12 Concept reduction In the choice between our different methods for detecting an intruder, we ruled out detecting an intruder with a proximity sensor due to the simplicity of a proximity sensor. A proximity sensor would not offer us as much customizability as either weight sensors or using a webcam for image processing. For example the proximity sensor can only sense when something is detected, however it can t provide you with details regarding what was detected, thus failing the requirement of minimizing false positives and false negatives. We decided to rule out detecting an intruder through weight detection when we realized that this method is not reliable enough. The idea of weight detection is to place a pressure sensor at the entry points of the enclosed space, such as doors or windows. The problem with weight sensors, however, is that an intruder can easily step over and avoid the sensor, therefore rendering the intruder detection system useless. In the end, we decided that using a camera and creating an intruder detection system with image processing would be best for our project, as it offers customizability and is much harder for an intruder to avoid. The customizability of image processing will let us apply filters and functions to improve the accuracy of the system, thus satisfying the requirement of minimizing false positives and false negatives. Additionally, through image processing we will also be able to differentiate between pets or humans. Upon making the decision to deal with images, we had to order a reliable (and cost-efficient) camera that could process our images with a reasonable frame rate.

13 Detailed Engineering Analysis and Design Presentation The camera captures a real time video stream. Then the video is fed into Labview for processing. The difference between the current frame of the video and its previous frame is analyzed. If there is an intruder in the video, an alert email and text message will be sent by Labview. Figure 2. Structure and data flow of Intruder Detection System. Processing occurs in three steps: signal acquisition, signal processing, and alert. Image Acquisition The camera keeps acquiring the video feed in real time. The IMAQdx Open Camera VI opens the camera and the IMAQdx Configure Grab VI configures and starts a grab acquisition. The IMAQdx Grab VI acquires the most current frame. Figure 3. Labview VIs used to acquire images: IMAQdx Open Camera, IMAQdx Configure Grab, IMAQdx Grab

14 Figure 4. Original Image Acquired from Camera Image Processing 1) Subtraction The current frame of the video is subtracted by its previous frame using the IMAQ Subtract VI. If there is an intruder in the video, there will be a difference between two consecutive frames. If the intruder is constantly moving, the difference is the shape of the intruder. Figure 5. The part of Labview code doing subtraction

15 Figure 6. Image after the subtraction of subsequent frames 2) Threshold Image Turn the subtracted image into a binary image by using the IMAQ Threshold VI so that each pixel will have a value of either 1 or 0. Then we can filter out unwanted noises easily. Figure 7. The part of Labview code doing threshold

16 Figure 8. Image converted into binary image 3) Filter Out Noises and Fill Holes Apply the IMAQ RemoveParticle VI and the IMAQ Morphology VI to the binary image to filter out noises, which are small particles. Then apply the IMAQ Convex Hull VI to fill the holes. Figure 9. The part of code doing filtering

17 Figure 10. The part of code doing Morphology and filling holes Figure 11. Image after filtering 4) Clamp the Filtered Image Apply horizontal clamp and vertical clamp to the filtered image to get the height and width of the figure in the image.

18 Figure 12. The part of code doing clamping Figure 13. Image after clamped 5) Draw Tracking Box Draw a box around the moving object based on its height and width. Then overlay the tracking box on the original image for visual appeal to users.

19 Figure 14. The part of code drawing tracking box Figure 15. The original image with tracking box Alert The height given by the horizontal clamp is first compared with a range of threshold set by designers, which checks if the moving object is a pet. If the height is high enough to fall out of the range, the height is then divided by the width given by the vertical clamp to get the height-width ratio. The ratio is then compared with another range of threshold set by designers, which is the possible

20 range of human height-width ratio. If the calculated ratio falls into the range, the alarm will be triggered and alerting emails and text messages will be sent to the users. Figure 16. The thresholds used to check if the moving object is a pet or a human Figure 17. The part of code sending emails and text messages

21 Cost Analysis For a user already with LabView installed with NI Vision, the costs of implementing our Intruder Detection System is just the cost of the webcam, which can be any economic webcam and can be easily bought for under $20. For a user without LabView, the user would have to purchase LabView (as low as $20 for students and up to $1,249 for the full price). Considering the price of NI Vision, the total price of our system can easily go for several thousand dollars. As we can see, this system would not be affordable if the user did not already have LabView and NI Vision. However for further investigation, if our code can be packaged into an executable software, then our intruder detection system can be priced at an extremely affordable price and could be easily sold online for download. Compone Suppli Item (Item Cost for Cost for nt er No.) Prototy Producti pe on (per unit) Web Camera Sabren t BPC3- CAMWCM6L NV $19.98 Undecide d Total $19.98 http://www.bestpricecables.com/s abrent-usb-2.0-web-camera-6-ledinfrared-night-vision-w-audiomi.html Table 1. Bill of Materials

22 Hazards and Failure Analysis: The user should follow all safety instructions that come with their webcam and computer. Our intruder detection system does not come with any safety or health hazards.

23 Conclusion In the end, we were able to design a reliable intruder detection system that was able to differentiate between humans and pets. The system utilized set thresholds and filters to minimize rates of false positives and negatives. The system is consistent, accurate, and reliable, with an accuracy of over 90%. Further investigations include incorporating night vision functionality as well as sound actuators to dissuade intruders. Implementing multiple cameras may also increase viewing area, and thus, improving functionality. We would also need to find a method to package system to increase portability. Additionally, our current system must request user to manually set the threshold values. These threshold values vary, depending on the depth of the camera viewing space. For further investigation, an automated threshold algorithm could be developed to detect the depth of the image and automatically set a corresponding threshold as a result.

24 References 1. Radke, R.J.; Andra, S.; Al-Kofahi, O.; Roysam, B., "Image change detection algorithms: a systematic survey," Image Processing, IEEE Transactions on, vol.14, no.3, pp.294,307, March 2005 2. Radke, R.J.; Andra, S.; Al-Kofahi, O.; Roysam, B., "Image change detection algorithms: a systematic survey," Image Processing, IEEE Transactions on, vol.14, no.3, pp.294,307, March 2005 3. Rose, T, "Change Detection Images". RetrievedApril, 2014 Available: http://www.tracyleerose.com/txt/tutorials/tutorial_changedetection/cha ngedetection.html 4. Sampson, R, "False Burgler ". RetrievedApril, 2014 Available: http://www.cops.usdoj.gov/pdf/e05021556.pdf 5. "IMAQ Vision for LabVIEWTM User Manual". RetrievedApril, 2014 Available: http://www.ni.com/pdf/manuals/371007a.pdf 6. "Image Filtering Overview". RetrievedApril, 2014 Available: http://www.ni.com/white-paper/3472/en/ 7. "FBI Statistics". RetrievedApril, 2014 Available: http://patriotcrimedefense.com/fbi-statistics

25 8. "Improve an Image". RetrievedApril, 2014 Available: http://zone.ni.com/reference/en-xx/help/370281m- 01/nivisionlvbasics/improve_an_image/