Preview

Video Surveillance

Powerful Essays
Open Document
Open Document
2678 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Video Surveillance
Home Security and Video Surveillance using GSM Modem
Sneha Fotedar [1], Tanvi Agarwal [2], Shaheen Shaikh [3], Preety [4] Department of Computer Engineering AISSMS IOIT University of Pune {snehafotedar, tanvi.ag0607, shaikhshahheen, preety032}@gmail.com
Nowadays, researchers experience continuous growth in network surveillance. The reason being is the instability incidents that are happening all around the world. Therefore, there is a need of a smart surveillance system for intelligent monitoring that captures data in real time, transmits, processes and understands the information related to the monitored data. The video data can be used as a forensic tool for after-crime inspection. Hence, these systems ensure high level of security at public places which is usually an extremely complex challenge. As video cameras are available at good price in the market, hence video surveillance systems have become more popular. Video surveillance systems have wide range of applications like traffic monitoring [1] and human activity understanding [2]. • i. Benefits of video surveillance Availability- There was a time when the surveillance techniques were utilized only in shopping centres and malls. Now-a-days, you can notice closed-circuit televisions almost at any place you visit, from a small store to homes and holy places. As a result, they guarantee greater public security at a fraction of the cost. Real-time monitoringTraditionally big organizations have always had the benefits of video surveillance manned by security professionals. In the past times, the events captured on video were used to expose important information and work as proof after the event happened. But, modern technologies let users to check and reply to alarms immediately.

Abstract--- This project has a special feature of smart video transfer and capture feature. Smart video surveillance systems are capable of enhancing situational awareness across multiple scales of space and time. However, at the



References: [1] D. Koller, K. Daniilidis, H. H. Nagel, Model-based object tracking in monocular sequences of road traffic scenes. International Journal of Computer Vision, Vol. 10, 1993, pp. 257-281. [2] Yuri A. Ivanov and Aaron F. Bobick, Recognition of Multi-Agent Interaction in Video Surveillance, {ICCV} (1), pp. 169-176, 1999. [3] Drew Ostheimer, Sebastien Lemay, Mohammed Ghazal, Dennis Mayisela, Aishy Amer, Pierre F. Dagba:” A Modular Distributed Video Surveillance System Over IP”, 1-4244-0038-4 2006 IEEE CCECE/CCGEI, Ottawa, May 2006. [4] Alberto Amato, Vincenzo Di Lecce, Vincenzo Piuri:” Neural Network Based Video Surveillance System”, 0-7803-9175-6/05/$20.00 ©2005 IEEE. [5] Wann-Yun Shieh, Ju-Chin Huang:” Speedup the Multi-Camera Video-Surveillance System for Elder Falling Detection”, 978-0-76953678-1/09 $25.00 © 2009 IEEE. [6] Hae-Min Moon, Sumg Bum Pan:” A New Human Identification Method for Intelligent Video Surveillance System”, 978-1-4244-71164/10/$26.00 ©2010 IEEE. [7] Supavadee Aramvith, Suree Pumrin, Thanarat Chalidabhongse,Supakorn Siddhichai,:” Video Processing and Analysis for Surveillance Applications”, 978-1-4244-5016-9/09/$25.00©2009 IEEE. [8] Arun Hampapur, Lisa Brown, Jonathan Connell, Ahmet Ekin, Norman Haas,Max Lu, Hans Merkl, Sharath Pankanti, Andrew Senior, Chiao-Fe Shu, and Ying Li Tian:” Smart Video Surveillance”, 10535888/05/$20.00©2005IEEE. [9] Liyan Zhang, Ronen Vaisenberg, Sharad Mehrotra, Dmitri V. Kalashnikov:” Video Entity Resolution: Applying ER Techniques for Smart Video Surveillance”, 978-1-61284-937-9/11/$26.00 ©2011 IEEE 26. [10] R. Collins et al. “A system for video surveillance and monitoring”, VSAM Final Report, Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-RI-TR-00-12, May 2000. [11] M. Greiffenhagen, D. Comaniciu, H. Niemann, and V. Ramesh, “Design, analysis and engineering of video monitoring systems: An approach and case study”, Proc. IEEE, vol. 89, no. 10, pp. 1498-1517. [12] A. Hampapur, L. Brown, J. Connell, M. Lu, H. Merkl, S. Pankanti, A. Senior, C. Shu, and Y. Tian, “The IBM smart surveillance system, demonstration”, Proc. IEEE, CVPR 2004. [13] L. Marchesotti, L. Marcenaro and C. Ragazzoni, “A video surveillance architecture for alarm generation and video sequences retrieval, Image Processing”. 2002. Proceedings. [14] Foresti, _. L. Mahoen, P. and Regazzoni, C. “Multimedia VideoBased Surveillance System, Requirements, Issues and Solutions”. Kluwer Academic Publishers, 2002, USA. [15] Regazzoni, C. Fabri, _. and Vernazzza, _. “Advanced Video-based Surveillance System. Kluwer Academic Publishers”, 2002, USA. V. Conclusion A new approach to design and implement video surveillance systems was presented in this paper. The main goals were to easily and robustly capture the images and check for the intrusion. It requires background knowledge in streaming video for video-based monitoring applications. Smart surveillance systems significantly contribute to situation awareness. Such systems transform video surveillance from data acquisition tool to information and intelligence acquisition systems. The information extracted from video images in this system will be valuable resources for helping with suspicious incident analysis such as pre-alarm warning, locate suspect in video scenes, and building suspect information knowledge database for crime investigation. Real-time video analysis provides smart surveillance systems with the ability to react in real-time. Our system senses the intrusion and sends notifications to authorized persons so that action can be taken in response to the intrusion.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    During my research on the surveillance cameras used by local police departments, IBM has discovered a way for artificial intelligence which enables computers to recognize a crime in progress and refer the video feed to a human colleague for handling. This system will first replace mobile officers for traffic enforcement; eventually they will be capable of keeping watch for almost any crime or any known criminal. At the same time, police officers must track the use of new technologies for fighting criminal organizations. The Internet has made it possible for a variety of financial crimes, global operations by close-knit gangs that police agencies are not equipped to meet.…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Automatic Dependent Surveillance-Broadcast (ADS-B) is a critical aspect of the Federal Aviation Administration’s (FAA) Next Generation Air Transportation System (NextGen). NextGen is a Joint Planning Development Office multiagency effort established by Congress to transform the air transportation system into amore flexible, adaptive, and highly automated system capable of handling two to three time the current air traffic (Thompson & Sinclair, n.d.). In short, the ADS-B system provides improved surveillance and pilot situational awareness simultaneously to pilots and air traffic controllers. ADS-B is still in the process of its development but is slowly being implemented in the United States and in the international community. New technologies bring about improvements in aircraft avionics functional capabilities but also bring about new human factors issues. Since ADS-B is the future of air traffic control, these human…

    • 3886 Words
    • 16 Pages
    Powerful Essays
  • Good Essays

    In 1992, Dallmeier presented the world’s first video sensor with digital image storage. At this time, the idea of using digital image storage in video surveillance wasn’t taken seriously but Dallmeier saw its benefits and potential. In retrospect, this idea has proved to be a groundbreaking development, one that has revolutionized video surveillance. Today we cannot imagine the security field without the use of digital technology.Panomera® is a completely novel camera technology, which was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera®, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps.While other video analysis systems are limited to pure motion detection, Dallmeier uses SEDOR® – an abbreviation for “Self Learning Event Detector” – a self-learning analysis system. Using intelligent picture analysis algorithms and self-learning detection systems a variety of different situations can be automatically recognised even in complex scenes. For example, object sizes, directions of movement and speeds can be analysed. Environmental influences like rain, snow or branches blowing in the wind are filtered out using special algorithms.…

    • 471 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Closed caption television cameras can monitor dangerous situations from a secure region. This can give security officers and regulation enforcement the upper hand in a precarious situation. The use of alert schemes can be triggered automatically or manually throughout a hostage position which would save time and alleviate the criminal from being able to make thought out conclusions. Sprinkler systems are another kind of security characteristic that will go off throughout a fire or bomb. Sprinklers can save valuable merchandise and…

    • 1047 Words
    • 5 Pages
    Good Essays
  • Good Essays

    1984 Pros And Cons Essay

    • 631 Words
    • 3 Pages

    Since 9/11 and other tragedies such as the Boston Marathon bombing surveillance in many ways has increased significantly. One of the most significant ways is through the use and implementation of high-tech security systems, "As the volume and quality of cameras and sensors increases, cities are turning to more advanced face and object recognition software to make sense of the data"(CNN2). One of…

    • 631 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Surveillance has a wide selection of devices and detection systems to detect intruders on the market, from the trembler devices that register movement on a fence, to ground sensors that can detect low-level seismic activity (the movement of people or cars). Radar surveillance, laser, thermal, magnetic, volumetric, and…

    • 1927 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Recently “webcam hacking” has become a major concern in our modern world. Similar to the telecsreens found in 1984, webcams have the capability of constantly monitoring computer users. According to The Guardian, “Britain's surveillance agency GCHQ, with aid from the US National Security Agency, intercepted and stored the webcam images of millions of internet users not suspected of wrongdoing.” It is evident that our technology has the capability to surveil computer users at any moment.…

    • 549 Words
    • 3 Pages
    Good Essays
  • Better Essays

    CCJS321 Project 2

    • 1909 Words
    • 5 Pages

    U.S. Department of Justice. (2008). Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition. Retrieved from National Criminal Justice Reference Service: https://www.ncjrs.gov/pdffiles1/nij/219941.pdf…

    • 1909 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Whether the officer is acting inappropriately or the suspect is acting hostile the video will prove to be the most critical evidence. Tennenbaum, A. N., & Moore, A. M. (1993) assures surveillance systems are great additions to police cars. They protect both sides, and if one thinks about it, he would rather be stunned than shot. The most distinct video surveillance brings the highest quality to agencies. They are easy to use and they have the technology to transfer, gather, and retrieve evidence. In fact, the video is shared with court officials and the prosecution while maintaining the integrity of the original…

    • 980 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Everyone leaves personal digital tracks in systems whenever he or she make a purchase, takes a trip, uses a bank account, make a phone call, walks past a security camera, obtains a prescription, send or receives a package, files income tax forms, applies for a loan, e-mails a friend, sends a fax, rent a video, or engages in just about any other activity. The security camera increases the scope and nature of available data. Law-abiding citizens, criminal and terrorist leave extensive digital tracks. Gathering and analyzing electronic and behavioral information can play major roles in detecting and preventing terrorist…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There are many good outcomes that evidence is caught on surveillance footage. This kind of technology can obtain many different activities. For instance, it can provide recording incidents that HPD encounters while being on duty. Published reports have recently agreed on having this new law take place in a few…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Crime seems to be on a rise, from low poverty areas to the white collar vicinities. Today’s technology however, is assisting with the apprehension of criminals through the means of cameras, computers, fingerprinting and others. However, something that technology cannot help with is to identify the exact actions of individuals, nor can you duplicate what is seen by others. Eyewitnesses are so important when it comes to the criminal process. It’s vital for individuals to give accurate account of crimes witnessed. It is just as important for those that are gathering the information, or witness statements, to assess each eyewitness correctly, for that statement can put an innocent man in jail and a criminal back in the streets.…

    • 361 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Court Issues And Victims

    • 1514 Words
    • 5 Pages

    Antitheft strategies previously thrive and will become even more ordinary. Alarm systems are being vended as typical apparatus on cars, ships, and novel homes. Satellite tracking and retrieval systems and license plate recognition strategies that now assistance to recover stolen cars will be used to find entrenched computer chips and to re-claim all kinds of valued possessions and even locate lost peoples. Electronic observing systems, scrutiny cameras, preprogrammed cell phones, and crisis transmitters will safeguard chiefly defenseless groups, such as maltreated…

    • 1514 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Cafe Management

    • 1462 Words
    • 6 Pages

    The system we propose has great scope in the current real time situation. The cyber crime monitoring system can be enhanced to an extent by implementing this system. Most of the firms and establishments are being computerized in order to ease the tasks to be performed. The internet cafés unfortunately are rarely computerized. We aim through this venture, a better reliable solution.…

    • 1462 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    School security personnel manning surveillance camera systems in real-time can take quick action about evacuating children, faculty and staff in case of emergencies related to fire or other potentially dangerous…

    • 263 Words
    • 2 Pages
    Good Essays