Coefficient of Thermal Expansion and their Importance.pptx
Motion based security alarm
1.
2. GROUP MEMBERS
AKSHATA MOHITE
MANGESH NIKAM
PRATIK NAIK
KIRTI MADHAVI
UNDER THE GUIDANCE OF
Ms. SHOBHANA GAIKWAD
3. Existing System
Limitations of Existing System
Proposed System
Algorithm
Data Flow Diagram
Advantages of Proposed System
Real Time Applications
Soft. & Hardware Specification
References
4. CCTV
Now a Days CCTV (Closed circuit Television) Is
Most Popular System For Security Purpose.
5. It Gives Evidence After Incident.
It’s Difficult To Maintain Heavy Amount Of
Raw Video Data
Human Interaction.
Require Higher Bandwidth For Transmitting
The Visual Data.
6. We Propose a Robust Security Alarming
System Based On Detection Of Moving
Objects In Video Streams And An Efficient
Security System.
8. MODULE 1 :
Taking Snapshot Of Images.
MODULE 2 :
This Images Will Converted To Gray Images.
MODULE 3 :
Detect Edges Of Images By Using Canny Detector.
MODULE 4 :
Edges Of Images Will Compared With Default
Images.
MODULE 5 :
If Suspicious Image Is Detected Then Alert
Administrator.
9. CANNY EDGE DETECTOR
The Algorithm Runs In 5 Separate Steps
1. Smoothing
2. Finding Gradients
3. Non-Maximum Suppression
4. Double Thresholding
5. Edge Tracking By Hysteresis
10. EDGES COMPARISON
This Module Will Extract The Moving Object
From The Edged Images And Give The
Coordinate And Area Acquired By The Object
This object Will Be Compared With The
Previously Stored the Default Behavior Of The
Object In Restricted Area
If Any Conflicting Behaviour Apart From
Default Stored Context Is Detected; It Will
Send To The Alarming Module
11. ALARMING AND REPORT
If Module 4 Sends Report Of Any Suspicious
Activity Then This Module Will Be Activated. It
Will Alert The Administrator
As The Alarm Rings The System Will Enter
New Record In Database Which Will Have
Information For Analysis Of Event
12.
13. Helpful In Identifying People In The Crime Scenes etc.
Don’t need to monitor videos manually by the person
Keep Track Of Information Video Data For Future Use
Reduce The Large Data Storage
Does Not Require Large Bandwidth
Provide a Robust Alarming System To Alert The
System Administrator
14. Indoor/Outdoor Security.
Real Time Crime Detection.
Traffic Monitoring.
High Security Area,
BANKS.
AIRPORTS.
ATM CENTERS.
MALLS.
15. SOFTWARE
SPECIFICATION
• Operating System
Windows XP,7
• Programming
language :
• Java(JDK 1.6)
SOFTWARE
TOOLS
• IBM RAD
,Rational Rose
• Backend
Microsoft
Access
HARDWARE
SPECIFICATION
•PROCESSOR: Speed
minimum: PIII 800 MHz
•RAM: Minimum: 128 MB,
256 MB
•Web camera
16. PAPER REFERENCE
• ICCTAI'2011 paper on “Motion Based Security Alarming System for
Video surveillance” by G. Raja Raman, M. Sarath Chandran, and S. R.
Vinotha”
WEB REFERENCES
• http://www.filestub.com
• http://www.ebookee.org
• http://www.google.com