Indoor Surveillance System Using Android Platform



Similar documents
ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

Nagpur, Maharashtra, India

Intelligent Home Automation and Security System

AN INTERNET OF THINGS (IOT) BASED SECURITY ALERT SYSTEM USING RASPBERRY PI

Automated Monitoring System for Fall Detection in the Elderly

CCTV - Video Analytics for Traffic Management

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

CENTRALIZED SECURITY SYSTEM BASED ON IoT

868 Mhz. Wirefree DIY. Friendly. Easy Fit Range of Alarms

A Novel Approach Of Mobile Based Student Attendance Tracking System Using Android Application

AADHAAR ENABLED BIOMETRIC ATTENDANCE SYSTEM (AEBAS) An Introduction

CLOUD BASED HOME SECURITY 1 Anjali Chachra 1

User's Guide. [Home Network] app. Model No.

ESE498. Intruder Detection System

Mouse Control using a Web Camera based on Colour Detection

ANDROID LEVERED DATA MONITORING ROBOT

ALCATEL-LUCENT ENTERPRISE OPENTOUCH NOTIFICATION SERVICE IMPROVE REAL-TIME SITUATIONAL AWARENESS

Alert Technology Group 46 Empey St, Brantford ON Office Toll Free

the new wireless home alarm system

Quick Setup Guide LifeShield Broadband

Design of Home Automation Framework With Social Network Integration

Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone

LIVE STREAMING MOTION DETECTION CAMERA SECURITY SYSTEM WITH NOTIFICATION USING RASPBERRY PI Angela Antony 1, Prof. G. R.

Video Analytics and Security

DESIGN AND IMPLEMENTATION OF LOW COST HOME SECURITY SYSTEM USING PIC MICROCONTROLLER ANDGSM NETWORK

Development of a Service Robot System for a Remote Child Monitoring Platform

Surveillance Robot Using Arduino Microcontroller, Android APIs and the Internet

The SwannCloud Mobile App

International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay ISSN

Commercial Security Made Simple with Cloud Video Surveillance

>>IP. VIDEO INTERCOM & SMART HOME TCP/IP video intercom solution expert

YOUR INTERACTIVE SECURITY

PVNMS Brochure All rights reserved. Proxim Wireless Corporation. 1

Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6

Research Article Surveillance System Based On Raspberry Pi for Monitoring a Location Through A Mobile Device

Live Streaming Motion Detection Camera Security System with Notification using Raspberry Pi

Rogers Smart Home Monitoring QUICK START GUIDE ROG_6093_QST_GDE_EN.indd 1 9/22/12 8:29 AM

Smarter Security Solutions

Using Received Signal Strength Variation for Surveillance In Residential Areas

An Android Application for Student Information System

Hidden Camera Surveillance

A Digital Door Lock System for the Internet of Things with Improved Security and Usability

FPGA Based Home Security System

Bluetooth Messenger: an Android Messenger app based on Bluetooth Connectivity

Passion for Innovation

Palos Verdes Estates Police Department 340 Palos Verdes Drive West, Palos Verdes Estates, CA (310)

Automated Blood Bank Management System Using Direct Call Routing Technique

idvr-pro Viewer Software for Mac User Manual ver 0.1

HOME ALARM MONITORING NETWORK GOH SWEE TIAN

Domonial, le Sucre. Easy to Use Intruder Detection Systems

Mobile Image Offloading Using Cloud Computing

Additional Instruction

Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.

Intrusion Detection System using Log Files and Reinforcement Learning

Intelligent Video Technology

The IoT s application to protect your family

Remote Monitors. Advanced IP CCTV MAXCOM TECHNOLOGIES CCTV. Wireless Camera. Fingerprint Access. Exper. Dubai. Ready Stock.

Integrated Physical Security and Incident Management

Open Access Research and Design for Mobile Terminal-Based on Smart Home System

White paper. Axis Video Analytics. Enhancing video surveillance efficiency

Quick Start Guide For Vera Advanced Home Security Solution

4 Ch. HD Network Video Recorder with 1TB HDD, HDMI Output, 4 Night Vision 720p Cameras and Free Night Owl Pro App

ReadyGuard Touch Security System

Quick Setup Guide LifeShield Cellular Primary

LYNX Touch 5100 GRAPHIC TOUCHSCREEN WITH 4G/WI-FI COMMUNICATIONS, ANDROID TABLET AND Z-WAVE AUTOMATION. A Brilliant Way to Build Your Business!

GRAND Wi-Fi SURVEILLANCE SYSTEM

Automated Security System using ZigBee

Hills wireless security alarm DIY range

TOTAL DEFENSE MOBILE SECURITY USER S GUIDE

Data Loggers for Real Time Temperature Monitoring - WiFi

1 of 5 4/18/2015 9:34 AM

Totally Wireless Video Security

Axis IP surveillance. Endless possibilities for video surveillance.

Solutions for the Connected Home

GeoVision Setup. Once all the settings for Windows are completed and you have all the hard drives setup you can install GeoVision.

RELAX. YOU RE IN CONTROL. home security

Tuxedo Touch CENTRALIZED CONTROL OF SECURITY, VIDEO AND Z-WAVE ENABLED THERMOSTATS, LIGHTS, SHADES AND LOCKS. Take Control of Your Business!

BlackVue Cloud App Overview...3. Getting Started...6. Basic Menu Screens BlackVue Cloud BlackVue Wi-Fi Internal Memory...

Keywords: GPS, GSM, AVR Microcontroller, SMS.

View. Select View Managed Video Services ADT

Amcrest 960H DVR Quick Start Guide

A Research Using Private Cloud with IP Camera and Smartphone Video Retrieval

A General Framework for Tracking Objects in a Multi-Camera Environment

Monitoring of Natural Hazards With the ImpactSentinel Alarming System An Intelligent Solution

Logitech Alert Video Security System. Getting To Know

Intrusion. IC60 security meets design. Answers for infrastructure.

GSM Alarm System User Manual

Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle

Honeywell Video Analytics

Surveillance System Using Wireless Sensor Networks

Home Security and Control

Night Owl 8 Channel DVR with 1TB HDD, HDMI Output, 8 Hi-Resolution Cameras (2 Audio Enabled) and free Night Owl PRO App

Galaxy Flex SECURITY THAT FITS WITH YOUR BUSINESS AND LIFESTYLE. Protect your property

Welcome to Bell Aliant NextGen Home Security

How to Solve the Most Persistent Problem in Perimeter Security Systems

1080p HD Security Camera with Audio. FREE Cloud Recording 7 days of FREE video storage + upgrade options

Transcription:

Indoor Surveillance System Using Android Platform 1 Mandar Bhamare, 2 Sushil Dubey, 3 Praharsh Fulzele, 4 Rupali Deshmukh, 5 Dr. Shashi Dugad 1,2,3,4,5 Department of Computer Engineering, Fr. Conceicao Rodrigues Institute of Technology Vashi, Navi Mumbai. 400708, India Abstract - This paper is about an automated indoor surveillance system on android that works without the need of any human intervention. An android phone is mounted on the wall, which monitors a closed room. If any moving object (i.e. intruder) enters the room, then the System automatically alerts the remote registered user by sending a warning SMS and photograph of the intruder. After alerting the user, Video is recorded and an alarm starts ringing. The System detects Intrusion through image processing. The motion is detected using the Background Subtraction Algorithm of Image Processing. Computational power and Camera of an android phone is used to perform the video processing on the phone itself. Keywords - Indoor Surveillance, Image Processing, Android, Opencv, Motion Detection, Background Subtraction. 1. Introduction There are various Video surveillance system and sensor devices for security in public and private places which ensures security. The existing systems like CCTV camera require human intervention, where a person sitting at master computer needs to operate [1]. It may be effective if very high level of monitoring is needed. But it may not be useful for a place where no one is allowed to enter like bank locker, server room and closed room. The existing systems require large storage space for video and human to monitor. These systems are inefficient for indoor surveillance which requires to alert remote user instantly. Video surveillance system using Image processing is an intelligent system which detects any moving objects [2]. It performs image processing on the video, to detect the objects or person and stores the video. This intelligent system requires a computer to perform the Image processing tasks. Installation of such a system is cumbersome job and the System needs many components. These existing systems mentioned above are unable to provide real time intrusion alert to the user. Indoor surveillance system using android platform is an application which monitors a closed room or some private room with static background. The Indoor surveillance system utilizes the camera of an android phone to monitor a room. On detection of the Intruder, the System sends an SMS and a Photograph of the room and thus alerts the remote user about suspicious activities. The Android smartphone is used to perform image processing tasks. The system is completely automatic and no Human intervention is required except to start the system itself. There is no need for any extra connectivity to the android phone. The System utilizes the computational power, camera and Wi-Fi feature of the phone. Since the system is developed considering high security environment particularly in unmanned areas of surveillance, such as bank locker rooms, where ideally there shouldn t be any kind of motion, the key aspect in implementation of the System is Motion Detection. Any kind of Motion in the room is assumed to be caused by an Intruder, which needs to be recorded and informed to the remote user. 2. Proposed System The proposed solution is to create an Indoor Surveillance system using Android Platform. The System will help to detect any kind of intruder in a closed room with Single entry point. The System plans on using the android phone s camera and immense computational power of the phone to do so. This system will need a basic android smartphone with a camera. The device will be mounted at a proper place with its camera facing towards the entry point of the room. Android smart-phones provide features like Video Recording, in-built Networking, Memory Storage facility, Computation center (CPU). If any kind of intrusion occurs then it will alert to the remote user by sending message. 156

2.1 Advantages over Existing System 1. Fully Automated The system will not require any human intervention at any point of time except while starting the system. No need to hire a human to continuously observe the video feed. 2. Wireless system Since every task is performed by a single compact device, there will be no mesh of wires. User can setup the mobile device on his own without the need to depend on anyone else. 3. Easy to install Setting up the System requires just Installation of the Indoor Surveillance app on the Android Smart-phone and placing up the phone at a suitable place from where it can Record activities of entire room. No wiring, No Server Installation, No CCTV setup required. 4. Battery powered Since the mobile phones use phones Battery they can continue to function even in case of power loss for a small period of time (expected to work on battery power for at least 2 hours). 5. Quick to response and raise alert As soon as there is any suspicious movement, User gets to know about it via an Email and SMS on his phone. Further action can be taken by the user, to quickly &immediately catch the person responsible for breaking in. 6. Cheap All it takes is a Smart Phone with a SIM card andwi-fi Enabled network. No need to buy a Server, or any person to continuously monitor the room. No wiring cost, No CCTV cost. 7. On-The-Go Solution: Someone looking for a temporary surveillance can use the proposed system on the go. 8. Offers real time tracking: User can be notified immediately without any delay with the picture of intruder. 9. Portability: System can be mountedby installing the application on the android phone. The Intrusion detection is done using image processing techniques. Initially a frame is captured which serves as background image for future. The systemkeeps on capturing frames and compares it with initial frame. Using image subtraction these two images will be compared pixel wise, if there is any difference above the threshold value then the situationis concluded as motion in the background. Thecomputational part is performed on android phone and it makes use of android phone s processing power. Once if any intrusion occurs, then that set of frames and video is saved for future proof. System will immediately inform the remote user through messaging and will send a photograph of the room via Email. 2.2 Application Flow 3. Implementation 3.1 System Modules Fig 2.1: Overall workflow of the System 1. Login and Signup module/user Information registration Activity : In this module the new user can register with the application by entering his/her details while the already registered users can login to the application 2. Surveillance module/motion detection using Opencv: In this module the area which is to be monitored will be continuously inspected or observed for any kind of intrusion or suspicious activity. This is done using Opencv that process the input from the camera to find any kind of 157

intrusion. Opencv accomplishes this task using the Background subtraction method. Image Processing Tasks for Motion Detection: A. Capture Background Image The processing tasks begin with capturing the first background image. This background image shows how the environment without the intruder should look like. The background image acts as reference image to compare the further images for detecting new objects in the room that were not present in the before. Image 3.3 Result of absdiff () with Human Intrusion C. Apply Binary Thresholding Algorithm Thresholding segments the gray-scale image and transforms it to a binary image[4]. We use Binary Thresholding to segment the result of absdiff. The Binary Image consists of Black and White pixels only. Apply Dilation iteratively to the threshold image to enhance foreground object and to remove internal noise from the image. Image 3.1 Background image B. Apply Background Subtraction technique to the captured Image Start capturing images for comparison with the previously captured background image.using image processing function absdiff, [3] find the difference between the current image and background image. The Subtracted image result is as shown below: Image 3.4 Result after application of Binary Thresholding D. Finding Contours Image 3.2 RGB Image with Human Intrusion Contours can be explained simply as a curve joining all the continuous points (along the boundary), having same color or intensity. The contours are a useful tool for shape analysis and object detection and recognition.in Image processing, finding contours is like finding white object from black background. Thus, object to be found should be white and background should be black [5].The Binary Image has background of room in Black Pixels & Extracted moving object in White pixels. We find such 158

White continuous areas in the threshold image. Presence of White pixels indicates there is motion in the environment. To reduce the false negatives, minimum area is set to 2 percent of the total image pixel. If the area of the contour is more than 2 percent of the area of the image, only then the system calls it as a contour. This eliminates detection of very small changes in the E. Checking for Contours in 15 Consecutive frames To further improve the algorithm, the system checks for contours in 20 consecutive frames. Thus small motions which are not detected in consecutive 20 frames are ignored by the system. F. Contours found in 20 Consecutive Frames In such a case the system can conclude there is a definite solid motion in the room. Thus intruder is detected and further tasks of Video Recording and sending notification to the user can begin. Fig 3.5: Surveillance using Opencv Flow of Image processing steps: Fig 3.6: Motion detection Flowchart. 159

3. Automatic Video Recording: As soon as the intrusion is detected this activity is initialized. In this activity the video of the intrusion is recorded and stored as a proof. 5. Buzzer Alarm: The System Rings a buzzer if intrusion has occurred. This action is performed so as to warn the intruder. 4. Conclusion 4. Sending Alerts: Fig 3.7: Video Recording Activity This is one of the important modules as it helps to notify the user about the intrusion asandwhen the intrusion occurs. Thus gives a real-time intrusion alert to the remote user Indoor Surveillance Using Android Platform will be a user friendly android application which will allow the user to detect any kind of intrusion in a static background. This application will overcome the drawbacks of the existing system, thus making it more efficient than the once that are already present. The aspects of the system that will actually fascinate users are the reusability, real time information about intrusion and the most important of all cost of the system. An algorithm which gives highly accurate results in less time and comparatively less cost than the existing systems has been presented. This system was built keeping in mind every possible behavior of the intruder thereby enhancing the efficiency of the system. Hence the system developed provides high efficiency in less cost since no hardware complex connection is needed and also because of less storage requirements. References [1] Surveillance (https://en.wikipedia.org/wiki/surveillance) [2] S. Chandana Real time video surveillance system using motion detection, India Conference (INDICON), 2011 Annual IEEE. [3]http://docs.opencv.org/2.4/modules/core/doc/operations_on_ar rays.html#absdiff [4] Thresholding (image processing) https://en.wikipedia.org/wiki/thresholding_%28image_pr ocessing%29 [5] What are contours? (http://docs.opencv.org/3.1.0/d4/d73/tutorial_py_contours _begin.html#gsc.tab=0). Fig 3.8: Status activity. 160