Professional Documents
Culture Documents
This project presents the surveillance monitoring system, a software using webcam via
cloud storage for security purpose. The interest of this particular system is to protect a person and
monitor his activities in a designated private environment. Detecting and tracking human motion
in real time is the essential goal and to understand such activities, whether there is a stranger or
housebreaker, where the result of interpreting this image (by the digital image processing
program) will feed another system at the watcher side (connected via cloud) to invoke necessary
security precaution or action. The system captures images and stores pictures even when the
intrusion does not happen. The system has features that makes it easy for the user to connect to
the internet via personal computers which has a camera at the observation area. The image
processing program at observing side was written and plugged to the main program. The main
program is being made by using Flash application for connecting the camera and cloud. PHP and
HTML language for creating webpage (the member registration part) and MySQL database for
data contents of member and authentication.
1. INTRODUCTION
1.1 Purpose
Cloud computing is an emerging commercial infrastructure paradigm that promises to
eliminate the need for maintaining expensive computing hardware. Through the use of
virtualization and resource time-sharing, clouds address with a single set of physical resources a
large user base with different needs. Thus, clouds promise to enable for their owners the benefits
of an economy of scale and, at the same time, reduce the operating costs for many applications.
In principle cloud computing can deliver existing types of computer services. Virtualisation is a
key enabling technology for cloud computing and scalability. The surveillance monitoring
system is a system that notifies the security breach in the premises or detects unwanted intrusion
at a secured place. This can also be enhanced to capture images to track down criminals.
1.2 Scope
The scope of the system is to implement the high level webcam security
system using motion sensor algorithm. The webcams used in this system are cheaper in cost and
smaller in size than CCTVs. They can be placed easily in organizations and homes, where high
level security is needed.
When the motion sensor algorithm in the system recognizes the motion of any
object, the webcam captures and records the image at that particular instance. The system will
compare the captured image with the predefined one and also checks the sensitivity range, hence
producing the internal and external alerts. System may be connected to Burglar alarm that is used
to alert the owner or security services, after it detects motion and it is used as internal alerts.
External alerts can be sent in the form of messages to the owner, e-mail with image attachment.
This interface is from a user standpoint, substantially less complex and more application
oriented.
1.3 Overview
The users can watch the screens of any computers they are monitoring from the Internet.
This works as if we have a surveillance camera pointed directly at the concern area, capturing
anything or anybody does from that side, and transmitted live to the watchers computers for
permitted people to watch. It can record the activities and provide to broadcast on a single
computer or for multi-user monitoring computers.
The written programs (which are websites and motion detection technique of the image
processing program) must be called on the sender side computer from Internet. The Homepage of
the system divided the users into 2 parts: the admin and member, so there are the screens of the
methodic steps.
2. OVERALL DESCRIPTION
2.1 Product Perspective
The research presents the surveillance monitoring system, a webcam based with a
program via cloud for security purpose. The interest of this particular system is to protect a
person and monitor his activities in a designated and privacy or personalization environment.
Detecting and tracking human motion in real time is the essential goal to understand such
activities whether there is a stranger or housebreaker, where the result of interpreting this image
(by the digital image processing program) will feed another system at the watcher side (with
connect via cloud) to invoke necessary security precaution or action. The system captures images
and stores pictures even when the intrusion does not happen.
anything or anybody does from that side, and transmitted live to the observer's computer for
permitted people to watch. It can record the activities and provide to broadcast on a single
computer or for multi-user monitoring computers.
The written program (which are the website and motion detection technic of the
image processing program) must be called on the sender side computer from internet. This
program works as if it is directly connected with the server. The program is being developed to
run in web browsers so that the user can use any operating system.
The webcam should be night vision for capturing the detection images and videos with
the absence of light. The system should be connected with UPS for avoiding the power failure.
3. SPECIFIC REQUIREMENTS
Windows XP or higher
Platform
.Net
Web browser
IIS 6 or higher
Programming Language
SQL, ASP.NET,C#
SDK
Connectivity
TCP/IP
Hard Disk
5 GB recommended.
Memory
Display
Keyboard
Mouse
Others
GSM Modem.
3.5Communication Interface
TCP/IP used for passing the videos and Images through internet.
Mobile is used for message services.
Webcam
4. ABSTRACT DESIGN
Cloud
Desktop
Laptop
Phone
Sender side
Watcher side
The sender side system is used to monitor the observation area continuously. When an
intrusion is detected, the system sends the data to the cloud and as well informs the owner's
about the intrusion via message and email. The user can then log into the system and view the
recorded clips. Any person who is authorized, can view the live webcam images from the
sender's side through the internet with the help of browsers.
Validation
Services
Logout
Admin
User
5. FUNCTIONAL DESIGN
5.1 Modular design diagram
Success
Webcam software
Getting
videos
Logout
Web service
Username and
password box
Initially the username and password are taken as input. If it is valid then the user can
successfully login to the webcam software. This webcam software will hold the recorded video
and the user can watch it. If it is an invalid user name or password, then the service is not
provided.
New User
Existing User
Signup()
Signup()
Sending Account Request()
Valid Account ()
Compute username and Password()
Add Account()
Sign In()
Sign In()
Sending Sign In Request () Check user name()
Check Password()
Registration
Update ()
The class diagram includes only Registration. The Registration contains many entities
like fullname, mobile no, Alertlevel, email-id, password.
STAR
T
Motion
detection
pocess
User
authentication
No
No
Membe
r?
Member
register
Intrud
er
Yes
Convert the image
stream to bit array
Yes
Start sender or receive sms
Start capture
No
Convert image
stream to bit
array
Pass the bit
array via http
Yes
Trigger image
form webcam
Receive image
and trigger
from Http
No
Aler
ting?
Convert image
stream to bit
array
Yes
Convert the
image stream
to image
Read image to
sender alert
directory
END
Here in this data flow diagram, the images will receive and
No
Logout
Yes
END
Has
new
image
Here in this system flow diagram for the image watching by watcher
or observer . If observer is logged out then it will end or it will go back to call image from
directory if any new images.
First of all, lets find the regions where these two frames are differing a bit. For the
purpose we can use Difference and Threshold filters.
_src=v;
if(_now!=null){_now.dispose();_old.dispose();}
_now=newBitmapData(v._width,v._height,false,0);
_old=newBitmapData(v._width,v._height,false,0);
This is the result of motion detector. We can highlight the motion regions if needed. The
result is below :
vararea:Rectangle=
_now.getColorBoundsRect(0xFFFFFFFF,0xFFFFFFFF,
true);
_act=(area.width>(_src._width/100)*_min||
area.height>(_src._height/
100)*_min);
if(_act)
{
_box=area;
x=_box.x+(_box.width/2);
y=_box.y+(_box.width/2);
}
On this step well get an image with white pixels on the place where the current frame is
different from the previous frame on the specified threshold value. Its already possible to count
the pixels, and if the amount of it will be greater than a predefined alarm level we can signal
about a motion event. But most cameras produce a noisy image, so well get motion in such
places, where there is no motion at all. To remove random noisy pixels, we can use an Erosion
filter, for example. So, well get now mostly only the regions where the actual motion was.
_now.draw(_src,_mtx);
_now.draw(_old,newMatrix(),null,'difference');
_now.applyFilter(_now,_now.rectangle,newPoint(),
_col);
_now.applyFilter(_now,_now.rectangle,newPoint(),
_blr);
_now.threshold(_now,_now.rectangle,newPoint(),'>',
0xFF333333,0xFFFFFFFF);
_old.draw(_src,_mtx);
Capture images
Compare
the images
with base
images
[No changes]
[Changes]
Record video
Stop recording
End service
Figure 6.2 Activity diagram for use cases
Here the activity diagram for the use case . and the diagram shows
that the activities performed for the use case .
Full
Name
Registration
Master Id
Alert Level
EmailId
Password
The E-R diagram includes only one part,that is registration. The registration may include
the attributes like fullname, mobile number,Alertlevel, email id and password.
Tbl_Registration
Reg_Masterid
Reg_FullName
Reg_Password
Reg_MobileNo
Reg_Emailid
Reg_AlertLevel
Reg_Activeflag
int
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
int
The Database Schema includes only Registration. The Registration contains many entities
like fullname, mobile no, Alertlevel, email-id, password, master id band activeflag. Master id is
taken as primary key.
Registration
Full Name
8. PRESENTATION
LAYER DESIGN
LoginName
:
8.1 User interface form
design :
Password
8.1.1 Registration
Mobileno
EmailId
AlertLevel
:
:
:Low
Mediom
High
CANCEL
Figure 8.1(a) Registration
8.1.2 Login
WEBCAM SECURITY OVER CLOUD
Login
UserName
Password
:
CANCEL
User
Sign Up
Sign In
Data Base
In this user interface flow design is having two faces , first one is registration and another one is
login.Here the first registration is needs to do first and while logging in to the system the
database will make sure that this user is exist or not . if the user is not exist , then user needs to
register first and user can login only after registration.