SlideShare a Scribd company logo
1 of 31
Muhamed Shahid U V| Nooh KVM | Sravan P V | Sreehari S
What is Video Surveillance ?
• Observing or analysing a particular site for
safety and business purposes is known as
video surveillance.
• Security and crime control concerns are the
motivating factors for the implementation of
video surveillance cameras.
• Video surveillance cameras are used in
shopping malls, public places, banking
institutions, companies and ATM machines.
Traditional Video Surveillance
• Fixed cameras used to capture images or
record video sequences.
• After that captured images are stored in the
server.
•

Stored data are used for further checking
like investigation
U Think Is It SECURE??
What wrong with them ?
• More Human effort required.
• The moving object cannot be detected
correctly.
• No alert about the motion detection to
the user.

• Image cannot be retrieve at the time of
motion detection.
Are You Satisfied With This






Ordinary
Inefficient
Low secure
Expensive
Slow

Security System ?

WE DON’T THINK SO…..
World Going Smart, So Surveillance
•

So our proposed system is to solve all these
Drawbacks using Smart phones .

•

The moving object is identified using the OpenCV and
Euclidean Distance Method

•

Another advantage of this system is when an
unknown image is captured by the system it will alert
the user automatically by sending an SMS to user’s
mobile.
User will be using Android Mobile for the Retrieval of
Images from the remote place to know whether those
images are important and can be ignored.

•
Design-DFD Level 0
DFD-Level 1
DFD-Level 2.0 Camera
DFD-Level 2.1 User
DFD-Level 2.2 Admin
Sequence Diagram –
smart video surveillance system
Sequence Diagram –
Commanding System
Database Tables
Architecture
Open CV

OpenCV (Open Source Computer Vision Library) is a
library of programming functions mainly aimed at realtime computer vision, developed by Intel. It is free for use
under the open source BSD license. The library is crossplatform. It focuses mainly on real-time image processing
Euclidian’s Distance Method
DifferenceSquared = (standard_red - captured_red)^2 + (standard_green
captured_green)^2 + (standard_blue - captured_blue)^2
total_diff = total_diff + DifferenceSquared

output = sqrt(total_diff)
Threading
In the app uses 2 separate thread for each camera.one is used for
capturing images and other one is used for comparing images
And extra one Thread for the checking commands from the remote
user.
So if number camera is two then there is 2+2+1=5 threads.
Menu

Manage Group
Manage Member

Manage Member

Camera Setting
Detection List

Detected Image
Future
Live Streaming.
Video Recording Support.
HAWKEYE-Mobile.
Gesture & Face Detections.
Web interface.
IOS,Windows,Blackberry supporting.
Smart Video Surveillance System
Smart Video Surveillance System

More Related Content

What's hot

Augmented Reality Application - Final Year Project
Augmented Reality Application - Final Year ProjectAugmented Reality Application - Final Year Project
Augmented Reality Application - Final Year ProjectYash Kaushik
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition systemNilu Desai
 
Virtual Reality: Graphics Display Interfaces
Virtual Reality: Graphics Display InterfacesVirtual Reality: Graphics Display Interfaces
Virtual Reality: Graphics Display InterfacesMihir Parikh
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII
 
Virtual reality vs. augmented reality
Virtual reality vs. augmented realityVirtual reality vs. augmented reality
Virtual reality vs. augmented realityPixel Crayons
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detectionWeverify
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesAnca Georgiana Rusu
 
Computer vision and Open CV
Computer vision and Open CVComputer vision and Open CV
Computer vision and Open CVChariza Pladin
 
What Is DevOps?
What Is DevOps?What Is DevOps?
What Is DevOps?Soumya De
 
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...Edge AI and Vision Alliance
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksElaheh Rashedi
 
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...SlideTeam
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)Milson Munakami
 
UX for XR: Creating User Flows for Mixed Reality
UX for XR: Creating User Flows for Mixed RealityUX for XR: Creating User Flows for Mixed Reality
UX for XR: Creating User Flows for Mixed RealityLillian Warner
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection ReviewAsaad Waqar
 

What's hot (20)

Augmented Reality Application - Final Year Project
Augmented Reality Application - Final Year ProjectAugmented Reality Application - Final Year Project
Augmented Reality Application - Final Year Project
 
DevOps seminar ppt
DevOps seminar ppt DevOps seminar ppt
DevOps seminar ppt
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
DevOps explained
DevOps explainedDevOps explained
DevOps explained
 
Virtual Reality: Graphics Display Interfaces
Virtual Reality: Graphics Display InterfacesVirtual Reality: Graphics Display Interfaces
Virtual Reality: Graphics Display Interfaces
 
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
SSII2021 [SS2] Deepfake Generation and Detection – An Overview (ディープフェイクの生成と検出)
 
Virtual reality vs. augmented reality
Virtual reality vs. augmented realityVirtual reality vs. augmented reality
Virtual reality vs. augmented reality
 
Deepfake detection
Deepfake detectionDeepfake detection
Deepfake detection
 
Forged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakesForged authenticity: the case of deepfakes
Forged authenticity: the case of deepfakes
 
Computer vision and Open CV
Computer vision and Open CVComputer vision and Open CV
Computer vision and Open CV
 
What Is DevOps?
What Is DevOps?What Is DevOps?
What Is DevOps?
 
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...
“Modernizing the Development of AI-based IoT Devices with Wedge,” a Presentat...
 
Face Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural NetworksFace Recognition Methods based on Convolutional Neural Networks
Face Recognition Methods based on Convolutional Neural Networks
 
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...
Guide To Jenkins Management Continuous Integration And Useful Plugins Complet...
 
google glass
google glassgoogle glass
google glass
 
Software Defined networking (SDN)
Software Defined networking (SDN)Software Defined networking (SDN)
Software Defined networking (SDN)
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
UX for XR: Creating User Flows for Mixed Reality
UX for XR: Creating User Flows for Mixed RealityUX for XR: Creating User Flows for Mixed Reality
UX for XR: Creating User Flows for Mixed Reality
 
Driver Drowsiness Detection Review
Driver Drowsiness Detection ReviewDriver Drowsiness Detection Review
Driver Drowsiness Detection Review
 
Computer vision
Computer visionComputer vision
Computer vision
 

Viewers also liked

Contact Management - Schmooze
Contact Management - SchmoozeContact Management - Schmooze
Contact Management - SchmoozeMathew Lawrence
 
Event-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemEvent-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemCSCJournals
 
Smart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PISmart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PIKrishna Kumar
 

Viewers also liked (6)

RADAR, Mlat, ADS, Bird RADAR, Weather RADAR Guide
RADAR, Mlat, ADS, Bird RADAR, Weather RADAR GuideRADAR, Mlat, ADS, Bird RADAR, Weather RADAR Guide
RADAR, Mlat, ADS, Bird RADAR, Weather RADAR Guide
 
Contact Management - Schmooze
Contact Management - SchmoozeContact Management - Schmooze
Contact Management - Schmooze
 
Event-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance SystemEvent-Handling Based Smart Video Surveillance System
Event-Handling Based Smart Video Surveillance System
 
Video Streaming
Video StreamingVideo Streaming
Video Streaming
 
Smart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PISmart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PI
 
Raspberry pi
Raspberry pi Raspberry pi
Raspberry pi
 

Similar to Smart Video Surveillance System

Android based smart surveillance
Android based smart surveillanceAndroid based smart surveillance
Android based smart surveillanceShahid Vadakkekad
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision systemAkashPatil334
 
Abnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneAbnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneShivi Tandon
 
Vision for the blind
Vision for the blindVision for the blind
Vision for the blindHaseeb Ehsan
 
Computer Vision Technology and Expertise
Computer Vision Technology and ExpertiseComputer Vision Technology and Expertise
Computer Vision Technology and ExpertiseRhonda Software
 
SecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management ProjectSecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management ProjectAmit Chougule
 
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...IRJET Journal
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)Alphan Manas
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVIRJET Journal
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualZTech Proje
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settingsDavide De Bella
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copyevsrao
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET Journal
 
virtual reality | latest |best presentation
virtual reality | latest |best presentationvirtual reality | latest |best presentation
virtual reality | latest |best presentationvipin mishra
 

Similar to Smart Video Surveillance System (20)

Android based smart surveillance
Android based smart surveillanceAndroid based smart surveillance
Android based smart surveillance
 
Computer architecture for vision system
Computer architecture for vision systemComputer architecture for vision system
Computer architecture for vision system
 
Abnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android SmartphoneAbnormality in Elderly Fall using Android Smartphone
Abnormality in Elderly Fall using Android Smartphone
 
Vision for the blind
Vision for the blindVision for the blind
Vision for the blind
 
Computer Vision Technology and Expertise
Computer Vision Technology and ExpertiseComputer Vision Technology and Expertise
Computer Vision Technology and Expertise
 
fundamentals of machine vision system
fundamentals of machine vision systemfundamentals of machine vision system
fundamentals of machine vision system
 
SecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management ProjectSecureLite: An Industrial Surveillance and Security Management Project
SecureLite: An Industrial Surveillance and Security Management Project
 
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
Social Distance Detector Using Computer Vision, OpenCV and YOLO Deep Learning...
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
H028038042
H028038042H028038042
H028038042
 
ICS1020 CV
ICS1020 CVICS1020 CV
ICS1020 CV
 
ICS1020CV_2022.pdf
ICS1020CV_2022.pdfICS1020CV_2022.pdf
ICS1020CV_2022.pdf
 
ParanaVision Presentation (English)
ParanaVision Presentation (English)ParanaVision Presentation (English)
ParanaVision Presentation (English)
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
CCTV solutions and trends about security settings
CCTV solutions and trends about security settingsCCTV solutions and trends about security settings
CCTV solutions and trends about security settings
 
Broucher Soft copy
Broucher Soft copyBroucher Soft copy
Broucher Soft copy
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
virtual reality | latest |best presentation
virtual reality | latest |best presentationvirtual reality | latest |best presentation
virtual reality | latest |best presentation
 

Recently uploaded

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 

Recently uploaded (20)

AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 

Smart Video Surveillance System

  • 1.
  • 2. Muhamed Shahid U V| Nooh KVM | Sravan P V | Sreehari S
  • 3. What is Video Surveillance ? • Observing or analysing a particular site for safety and business purposes is known as video surveillance. • Security and crime control concerns are the motivating factors for the implementation of video surveillance cameras. • Video surveillance cameras are used in shopping malls, public places, banking institutions, companies and ATM machines.
  • 4. Traditional Video Surveillance • Fixed cameras used to capture images or record video sequences. • After that captured images are stored in the server. • Stored data are used for further checking like investigation
  • 5. U Think Is It SECURE??
  • 6. What wrong with them ? • More Human effort required. • The moving object cannot be detected correctly. • No alert about the motion detection to the user. • Image cannot be retrieve at the time of motion detection.
  • 7. Are You Satisfied With This      Ordinary Inefficient Low secure Expensive Slow Security System ? WE DON’T THINK SO…..
  • 8. World Going Smart, So Surveillance • So our proposed system is to solve all these Drawbacks using Smart phones . • The moving object is identified using the OpenCV and Euclidean Distance Method • Another advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile. User will be using Android Mobile for the Retrieval of Images from the remote place to know whether those images are important and can be ignored. •
  • 9.
  • 10.
  • 16. Sequence Diagram – smart video surveillance system
  • 19.
  • 21. Open CV OpenCV (Open Source Computer Vision Library) is a library of programming functions mainly aimed at realtime computer vision, developed by Intel. It is free for use under the open source BSD license. The library is crossplatform. It focuses mainly on real-time image processing
  • 22. Euclidian’s Distance Method DifferenceSquared = (standard_red - captured_red)^2 + (standard_green captured_green)^2 + (standard_blue - captured_blue)^2 total_diff = total_diff + DifferenceSquared output = sqrt(total_diff)
  • 23. Threading In the app uses 2 separate thread for each camera.one is used for capturing images and other one is used for comparing images And extra one Thread for the checking commands from the remote user. So if number camera is two then there is 2+2+1=5 threads.
  • 24.
  • 28.
  • 29. Future Live Streaming. Video Recording Support. HAWKEYE-Mobile. Gesture & Face Detections. Web interface. IOS,Windows,Blackberry supporting.