Professional Documents
Culture Documents
Surveillance video has two key modes one is to watch for the The various stages of this algorithm are:
threat happening and other is to search for that threat.
Nowadays shop owner use CCTV which only records all the 1] Smoothing: It is blurring of image to remove noise
activity going on in the shop. Only recording the stuff takes
2] Finding Gradient: Edge should be marked where gradient
large amount memory in hard disk that result in unnecessary
of image has large magnitudes. 3] Non-Maxima Suppression:
usage of memory. And CCTV only records the data if any
only local maxima should be marked as edge.
theft takes place, so one must go through all the video
recordings and search for the video when theft happens. This 4] Double Thresholding: potential edge is determined by
method is time consuming and takes lot of efforts. Even most
thresholding
of the shop owners use trip wire Sensor, this is also a good
technique to monitor crime, but it takes more financial aids 5] Edge detection using hysteresis: Final edges are
for installations and these take lot of extra efforts at the time determined by suppressing all edges that are not connected
of deployment. In this technique false alarm can be to a very certain edge.
generated if a wire is cut by any insect.
2. RELATED WORK
A system should be designed which can overcome all the
downside of the existing systems in practice currently. This Problem 1:
paper overcomes the shortcomings of above mention
technique to find of crime taking place. The proposed system Traditional video surveillance systems use real time
eradicates the additional installation cost needed and no monitoring mechanism [1] which results into wastage of
upgrading of the system is required. So now the people in memory space and could become difficult to find out footage
commercial business does not have to spend a lot of money which shows theft occurred. This passive monitoring records
in installation and upgrading. The thief is detected by surveillance [1] video 24x7 and thus leads to excessive cost.
intrusion detection as soon as there is intrusion the Conventional approaches based on browsing time/camera-
information of theft is passed on to owner and police station based combinations are inadequate.
number which is stored in database.
Let’s now see how the system exactly detects the theft,
consider an example where a person is entering a diamond
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 232
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
Methodology used: of using Canny edge detection algorithm which have shown
realistic faster approach for real-time video analysis.
As opposed to the traditional video surveillance systems, the
authors are proposing real time theft detection mechanism Outcomes:
which comprises of image processing techniques which
results into faster theft detection without using The experimental evaluation shows that the Canny edge
time/camera-based combinations. Also, the anticipated detection algorithm is both fast and accurate. Our outcomes
system will start capturing video when possible theft indicate that a substantial timesaving can be accomplished
detection is analyzed. when searching video surveillance databases using the
described technique.
Outcomes:
Problem 4:
The important resultant outcome is system will take
minimum memory space and will store accurate theft Traditional video surveillance system usually consists of
detection footage. The active system will identify theft some sensor device [4] and hardware such as trip wire,
detection automatically and will store footage of theft Intruder alarm sensor [2], Identification card,
happened. Microwave/Radio signal sensor etc. This leads to drastic
increase in overall cost of the system which is directly
Problem 2: proportional to scalability of the system.
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 233
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
Module 3: Theft Detection and Alert also like to extend my sincere appreciation to all staff
members of Computer Department, without their assistance
White Pixel Calculation is done by counting pixels and and co-operation the Project would not have been a triumph.
compared by current pixel and previous one to observe any
disturbance occurrence is there in the pixel number. If there REFERENCES
is any variation in the count of pixel then intrusion happens.
The pixel count of any small object will be not as much of [1]. A. Hauptmann, "Lessons for the Future from a Decade of
human and the range of pixel count when intrusion happen Informedia Video Analysis Research", International
by human will be already fetched in the system. Theft Conference on Image and Video Retrieval, 2006.
Detection takes place by raising an alarm by informing
owner and nearby police station. And my mailing the theft [2]. M. Naphade, et al. "On the Detection of Semantic
images to owner by using JMF media file. Concepts at TRECVID", ACM International Conference on
Multimedia, 2004.
4. CONCLUSION
ACKNOWLEDGEMENT
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 234