Professional Documents
Culture Documents
BELGAUM- 590018
Project Report
On
BACHELOR OF ENGINEERING
in
COMPUTER SCIENCE AND ENGINEERING
Submitted by
Roshan Paul Anand [4RA11CS043]
Anu M M [4RA13CS006]
Archana C P [4RA13CS007]
Betty K S [4RA13CS009]
CERTIFICATE
Certified that the project work entitled “SMART WEB CAM MOTION
DETECTION SURVEILLANCE SYSTEM” is carried out by Mr.ROSHAN PAUL
ANAND (4RA11CS043), Mr.ANU M M (4RA13CS006), Ms.ARCHANA C P
(4RA13CS007) and Ms.BETTY K S (4RA13CS009) bonafide students of RAJEEV
INSTITUTE OF TECHNOLOGY, HASSAN in partial fulfillment for the award
of BACHELOR OF ENGINEERING in COMPUTER SCIENCE AND ENGINEERING
of Visvesvaraya Technological University, Belagavi during the year 2016-2017. The project
report has been approved as it satisfies the academic requirements in respect of project work
prescribed for the said degree.
1. _______________________ _______________________
2. _______________________ _______________________
DECLARATION
Date :
Place : Hassan
Mr.ANU M M - (4RA13CS006)
Ms.ARCHANA C P - (4RA13CS007)
Ms.BETTY K S - (4RA13CS009)
ACKNOWLEDGEMENT
Apart from our effort, the success of this project work depends largely on the
encouragement and guidelines of many. We take this opportunity to express my gratitude
to the people who have been instrumental in the successful completion of this technical
seminar.
i
ABSTRACT
The Basic Idea Behind “Smart Web Cam Motion Detection Surveillance System” Is To
Stop The Intruder To Getting Into The Place Where A High End Security Is Required. This
Paper Proposes A Method For Detecting The Motion Of A Particular Object Being Observed.
The Motion Tracking Surveillance Has Gained A Lot Of Interests Over Past Few Years. This
System Is Brought Into Effect Providing Relief To The Normal Video Surveillance System
Which Offers Time-Consuming Reviewing Process. Through The Study And Evaluation Of
Products, We Propose A Motion Tracking Surveillance System Consisting Of Its Method For
Motion Detection And Its Own Graphic User Interface.
Various Methods Are Used In Motion Detection Of A Particular Interest. Each Algorithm
Is Found Efficient In One Way. But There Exits Some Limitation In Each Of Them. In Our
Proposed System Those Disadvantages Are Omitted And Combining The Usage Of Best Method
We Are Creating A New Motion Detection Algorithm For Our Proposed Motion Tracking
Surveillance System. The Proposed System In This Paper Does Not Have Its Effect Usage In
Office Alone. It Also Offers More Convenient, Effective And Efficient Usage Where High-End
Security Comes Into Picture.
ii
TABLE OF CONTENTS
Contents Page no
ACKNOWLEDGEMENT i
ABSTRACT ii
TABLE OF CONTENTS iii - iv
LIST OF ABBREVIATIONS v
LIST OF FIGURES vi
1 INTRODUCTION 1
1.1 Aim 4
1.2 Objective -
2 LITERATURE SURVEY 6
3 WORK SPECIFICATION 8
3.1 System architecture functioning -
3.1.1 Capturing phase -
3.1.2 Comparing phase 9
3.1.3 Storage phase -
3.2 System indication phase -
3.3 Image segmentation -
3.4 The two types of motion detection algorithm 10
3.4.1 Background subtraction method -
3.4.2 Frame difference method 12
3.4.3 BSFD algorithm based on the dynamic background -
4 SYSTEM STUDY 15
4.1 Existing system -
4.2 Proposed system -
4.3 Feasibility study 16
4.3.1. Economical feasibility -
4.3.2. Technical feasibility -
4.3.3. Social feasibility -
5 SYSTEM SPECIFICATION 17
iii
5.2 Hardware used -
5.3 Software used -
6 SYSTEM DESIGN 18
6.1 Data Flow Diagram 20
6.2 Motion Detectors 22
6.3 How motion detection cameras work? 26
6.4 Sensor Technology 27
6.5 Video Motion Detection 29
6.6 Principle of Operation 31
7 MODULE SPECIFICATION 39
7.1 Login -
7.2 Sign up -
-
7.3 Monitoring
-
7.4 Logout
-
7.5 Hardware setup -
7.5.1 Web camera 40
7.5.2 GSM module circuit -
7.6 Simulation and comparing frames 42
8 IMPLEMENTATION 43
8.1 Background and foreground separation -
9 CONCLUSION 44
10 FUTURE WORKS 45
REFERENCES
APPENDICES
iv
LIST OF ABBREVIATIONS
v
LIST OF FIGURES
CHAPTER 1
INTRODUCTION
In this we would just briefly look into the introduction of the project requirements
needed for it and its purpose and aim.Motion Detection surveillance and security systems
have become very common in modern days. This kind of system can easily be found in
places like retail stores, banks,supermarkets, airports, commercial buildings and even private
premises. There are twokinds of video surveillance and security systems: analogue system
and digital system.
So our idea was to take a picture from a web cam every period of time (make it the
current picture) and compare it with a previous picture and if we find a big difference
between them we will save both pictures else will free memory from the old picture and make
the new picture the current picture.
Motion detection includes detecting and recording the whole movement process. The
purpose of motion detection is to provide an automatic detection in the region of interest. The
task for motion detection is to detect motion in a region of interest. This region is always
embodied in a region of awareness or in terms of the camera geometry is called the field of
view. It is also defined as a portion of environment being monitored. The region of interest in
the present case is the environment with moving object and activity. A region of interest can
be therefore a person, an animal or an artifact, circumscribed with the term moving object.
The potential value of public surveillance technology took on new meaning in April,
2013 when investigators identified the two suspects in the Boston Marathon bombing after
sifting through video images captured by the city’s cameras.The Boston bombers were
apprehended quickly due to surveillance cameras. Yes! All agree! No dispute over how well
the public cameras were on that day. Yet, many lingering questions need to be answered now,
since we have time and opportunity to gather our wits and thoughts!
We should have surveillance cameras in public places because they ensure public
safety. Rarely will anyone attempt to harm you when they know their actions are being
recorded on camera. Cameras keep you and your personal property safe.
Home Security Cameras/ Security Cameras for Home Security surveillance systems
are generally designed to monitor the movement of people in any given area. Home
monitoring systems are set up to monitor personal property, such as residences with the use
of wireless lighting and a wireless security camera, while other surveillance systems are
employed to monitor a building or complex of structures.
In a smaller scale, the use of CCTV or wireless camera security systems, motion
sensors and alarm systems for security are very common. Far more complex measures are
utilized in larger scale security surveillance, similar to that managed for national security.
These systems can usually survey the Internet and telephone activity, people getting into the
county, movement of suspicious individuals and collect data on suspicious activity. A larger
framework of national security surveillance systems will then collect data from public places.
Weather Surveillance Systems to predict and forewarn about weather disturbances, weather
surveillance systems are utilized to monitor weather patterns, usually on a daily basis, just
like newspapers or broadcast reports. This type of surveillance system can also identify
global trends, such as the recognition of El Nino and La Nina effects or the Greenhouse
effect. High-tech instruments are usually associated with weather surveillance systems, such
B.E., Dept. of CSE, RIT, Hassan Page 2
Smart Web Cam Motion Detection Surveillance System
as radars and satellites, as well as computer modeling software, to collect and key in weather
data and develop forecasts of weather disturbances. Weather surveillance systems are also
used to assess changes in weather patterns.
Background
Video surveillance and security systems have become very common in modern days.
This kind of system can easily be found in places like retail stores, banks,supermarkets,
airports, commercial buildings and even private premises. There are twokinds of video
surveillance and security systems: analogue system and digital system.In traditional systems
for security operations, cameras are used to deliver analoguevideo images to monitors or
time-lapse videocassette recorder (VCR). Although manylocal image processing functions
are possible to improve the system application, thisrequires a lot of processing resources and
high-power-consuming hardware. Althoughdigital video surveillance and security system is
widely used, analogue system stillserves as a cheaper alternative. Charge coupled devices
(CCD) camera and digitalcamera one among the most popular cameras used in the system.
Digital surveillance systems are mostly specifically designed for commercialuse and it
has always been out of reach for other users. The cost for CCD cameras,networking devices
and the software designed for this system has made it inaccessibleand unpractical for home
users with moderate requirements. Also, not all the existingproduct has the motion detection
function.
Most of the video surveillance and security systems in the market does notissue
alarms in real time, manual monitoring system are costly in term of manpower.This can be
overcome by a real time motion detection system with the ability toautomatically analyze the
video images and archive the images with moving objects.
Description
Motion Detection System can be used in surveillance and security systems. The
system that this project came up with will be useful for security in a fixed restriction area.
Therefore, the background of the targeted area is assumed to be non-moving and
considerations of sudden change in lightings are ignored as well. However, the considerations
of other factors are taken into consideration. Basically, the initial plan was to use a technique
called image segmentation to abstract the foreground image from the source image obtained
and later processed to filter out noises or small images disturbance. To perform this, we
would use Open Source Computer Vision Libraries from Intel to obtain contours from the
foreground image subtracted. We will map these contours’ pixels with the original images’ to
send raw data into the other module of the project performed by our partner on classifying
the image frame obtained on whether it’s a human motion or not. His module would return a
percentage of recognition rates on whether the motion belongs to human or not. Based on a
level on acceptable percentage that it is sure it’s a human motion, the program would detects
and displays the motion with a bounding box on the human which is in a different color to
other moving objects that caused motion as well since all moving objects are bounded by the
rectangles. The program will record down the scene when the motion event occurs.
1.1 AIM
The Aim of this project is to propose new DATA ENCRYPTION and DECRYPTION
software that amalgamates the best of many encryption algorithms creating a new unified
approach to data security, confidentiality, and authentication by bringing all these diverse
algorithms to work in tandem.
1.2 OBJECTIVE
This project would be focused on the Motion Detection module where we would
perform research on the techniques and methodology to detect motion and to develop a
module for a technique that we prefer to use in this project. This module would record down
motion and pass it into the next module that would be on object classification where it
classify human and non-human object. Thus, this project is to come up with a solution that
detects motion effectively and record it down with one or more objects that are moving and
causing motions. The purpose of this project is to help new researchers learn and further
research on their topic of interest, which in this case is the motion detection system. The
question to be addressed here in this module is, given a sequence of images, how do we
detect motion or track a moving object? The project is to mainly answer this particular
question addressed by providing a prototype to emulate or prove the algorithms or techniques
that are available to perform motion detection by an input of images in a number of frames.
The flaws of existing surveillance and security system would be overcome by areal
time motion detection system with the ability to automatically analyze the videoimages and
archive the images with moving objects. Therefore, a digital surveillancesystem based on
web camera and targeted for small-scale user is developed.
This project aims to achieve web camera application system with automaticmotion
detection capability. The main idea is to develop a low cost surveillancesystem using web
camera, which runs the software that is incorporated with motiondetection algorithm. It uses
the concept of "motion detection by vision" to achievemotion detection capability where no
hardware sensors are required.
Automatic motion detection capability helps to reduce archive space and
monitoringmanpower. The system would be a simple "do-it-yourself' system, which
meansanyone can just setup by himself/herself.
CHAPTER 2
LITERATURE SURVEY
• Content-based Retrieval and Real Time Detection from Video Sequences Acquired
by Surveillance Systems (Elena Stringa and Carlo S. Regazzoni,2001)
In this paper,We describe new techniques to detect and analyze periodic motion as
seen from both a static and moving camera. By tracking objects of interest, we compute an
object's self-similarity as it evolves in time. For periodic motion, the self-similarity measure
is also periodic, and we apply Time-Frequency analysis to detect and characterize the
periodic motion. The periodicity is also analyzed robustly using the 2-D lattice structures
inherent in similarity matrices. A real-time system has been implemented to track and classify
objects using periodicity. Examples of object classification (people, running dogs, vehicles),
person counting, and non-stationary periodicity are provided.
In this paper, Motion detection surveillance technology give ease for time-consuming
reviewing process that a normal video surveillance system offers. By using motion detection,
it save the monitoring time and cost. It has gained a lot of interests over the past few years. In
this paper, a proposed motion detection surveillance system, through the study and evaluation
of currently available different methods. The proposed system is efficient and convenient for
both office and home uses as a smart home security system technology.
In this paper, Animal extinction means there is no more individual of that species
alive in the world. The animal extinction problem happen all around the world even in
Malaysia. World Bank data shows that, Malaysia record 70 of the 336 species of mammals
are threatened in 2014 and make it the seventh highest in the world in this category. One of
the cause of wildlife extinction is destruction of their natural habitat. This project Outdoor
Wildlife Motion Triggered Camera is develop to help biologist monitor and study about the
wildlife behavior and natural habitat so they can control the wildlife extinction. This project
are using 8051 microcontroller and interfacing with 3 parts that is sensor, camera and SD
card breakout board. The sensor detect the presence of wildlife and triggered the camera to
capture the scene and automatically save the shot taken into external SD card.
• Motion Detection for Security Surveillance (Prof. Joshi Vilas, Mergal Bhauso, Borate
Rohan,2016)
This paper deals with the design and implementation of smart surveillance monitoring
system using raspberry pi and CCTV camera. This design is a small portable monitoring
system for home and college security. This system will monitor when motion detected, the
Raspberry Piwill control the Raspberry Pi camera to take a picture and sent out image to the
user according to the program written in python environment. The proposed home security
system captures information and transmits it via a Raspberry towards PC. Raspberry pi
operates and controls motion detectors and CCTV camera for remote sensing and
surveillance, streams live records it for future playback. Python software plays an important
role in this project.
CHAPTER 3
WORK SPECIFICATION
In our project we have aimed to build such a surveillance system, which can not only
detect motion, but will
Storing
System
Indication
SMS on
Mobile
To detect motion we first have to capture live images of the area to be monitored and
kept under surveillance. This is done by using a web cam which continuously provides a
sequence of images in a particular speed of fps (frames per second).
Comparing the current frames captured with previous frames to detect motion: for
checking whether any motion is present in the live images, we compare the live images being
provided by the web cam with each other so that we can detect changes in these frames and
hence predict the occurrence of some motion.
Storing the frames on the memory if motion is detected: if motion is being detected,
we would require storing such motion so that the user can view it in the near future. This also
helps the user in providing a legal proof of some inappropriate activity since a video coverage
can be used as a proof in the court of law.
Indicating through an SMS when the motion is detected: the user may want to be
notified immediately that there has been some intrusion detected by the software, hence an
alarm system is included in the software. This alarm system immediately activates a wav file
format audio alarm signal if any kind of motion is detected hence. This helps in preventing
any kind of breach of security at that moment of time. As soon as the motion is detected an
location containing the pictures of the intruder are sent to the user and simultaneously an
SMS will be delivered on the user’s cell phone.
In the images research and application, imagesare often only interested in certain
parts. Theseparts are often referred to as goals or foreground (as other parts of the
background). In order toidentify and analyze the target in the image, weneed to isolate them
from the image. The imagesegmentation refers to the image is divided intoregions, each with
characteristics and to extract thetarget of interest in the process.
The image segmentation used in this paper isthreshold segmentation. To put it simply,
thethreshold of the gray scale image segmentation isto identify a range in the image of the
comparedwith the threshold and according to the results tothe corresponding pixel is divided
into twocategories, The foreground and background. Thesimplest case the image after the
single-thresholdsegmentation can be defined as
1 𝑓(𝑥, 𝑦) > 𝑇
𝑔(𝑥, 𝑦) = �
0 𝑓(𝑥, 𝑦) ≤ 𝑇
In the above steps to determine the thresholdvalue is the most critical step in partition.
In thethreshold selection, there is a best threshold basedon different goals of image
segmentation. If wecan determine an appropriate threshold, we cancorrect the image for
segmentation.
The basic idea is the first frame image stored asa background image. Then the current
image fk with the pre stored background image B subtraction, and if the pixel difference is
larger than the bound threshold, then it determines that the pixel to pixel on the moving
target, or as the background pixel. The choice of threshold of the background subtraction to
achieve the success of motion detection is very important. The success of motion detection is
very important. The threshold value is too small will produce a lot of false change points, the
threshold choice is too large will reduce the scope of changes in movement.
The appropriate threshold request adapts with the impact which be had by scenes and
camera onthe wavelength of the color, the changes of light conditions, so the choice of the
dynamic threshold should be selected. The method formula is shown as,
Input Video
Convert Frames
Reference Current
Frame Frame
Background Subtraction
Moving Object
Background subtractions used in case of the fixed cameras for motion detection. Its
advantage is easy to implement, fast, effective detection, can provide the complete feature
data of the target. The short comings are frequent in the moves of the occasions may be
difficult to obtain the background image. The immovable background difference is
particularly sensitive to the changesin dynamic scenes, such as indoor lighting gradually
change.
Frame difference method, is also known as the adjacent frame difference method, the
image sequence difference method etc.it refers to a very small time intervals Δt of the two
images before and after the pixel based on the time difference, and then thresholding to
extract the image region of the movement, according to which changes in the difference of
the specific flow chart as shown in Fig 3.4.2.
Input Video
Frame Conversion
fi fi-1
Frame Subtraction
Process
Result
Through the comparison of two moving target detection algorithms in the above
section, in this paper it presents BFSD algorithms based on the dynamic background.
Dynamic background can be achieved through the frame difference method. To overcome the
disadvantages of difference method fi, fi-5 and fi+5 frames can be chosen, so that slowly
moving object can be identified.
After updating the background image that is referenced image, the background
subtraction method performs for getting the moving object. The dynamic updating of the
background.
In the background subtraction method, we can consider that the whole scene from two
parts, the background, the foreground. The background is a static scene and which can be
seen, foreground is the moving objects which are interested in the video surveillance, such as
vehicles, pedestriansetc. however due to the scene of the monitor changes over time, the
foreground stagnation in the picture for a long time could be treated as part of the
background, so updating of the reference image periodically is essential for moving object
detection. Updating of reference image can be achieved through the frame difference method.
Three frames fi, fi-5 and fi+5 can be taken and Di-5 and Di+5 calculated. Then perform
AND operation, it gives the moving object M. Subtract M from fi itgives the background
image B. Now apply logical OR on background image B and the Reference image. It
produces the dynamic background image DB now the Reference image can be replaced by
DB, this will be the new reference image. Finally subtraction can be made between DB and
fi, then suitable threshold value should be applied to detect the moving object. The flow chart
is shown in Fig 3.5.
Input Video
Frame Conversion
Difference Difference
Matrix Di-5 Matrix Di+5
Moving
Frame fi
Object
Reference Background
Image Image
Revised
Frame fi
Background
MOV=RBI- Frame fi
Target Object
The formula of the moving target detection algorithms based on the dynamic
background as follows,
CHAPTER 4
SYSTEM STUDY
The flaws of existing surveillance and security system would be overcome by areal
time motion detection system with the ability to automatically analyze the videoimages and
archive the images with moving objects and it alerts automatically when the motion detects
from the view of camera. Therefore, a digital surveillancesystem based on web camera and
targeted for small-scale user is developed.
The latest technologiesused in the fight against thefts and destruction are the
videosurveillance and monitoring. By using the technologies, it is possibleto monitor and
capture every inch and second of the area in interest.However, so far the technologies used
are passive in nature, i.e., themonitoring systems only help in detecting the crime but do
notactively participate in stopping or curbing the crime while it takesplace.
So our Proposed Project gives the camera the capability to capture when needed
rather than capture all the time and this leads to huge reduction in storage space.
The feasibility study is carried out to test whether the proposed system in words is
being implemented. The feasibility study is based on the following major factors.
Types of feasibility
• Economical Feasibility.
• Technical feasibility.
Economical feasibility is the most recently used method for evaluating effectiveness
of the proposed system .It is obliquely known as cost benefit analysis. This procedure
determined the benefits and savings that are expected from the proposed system and
compared with the cost of the existing system. In case of the existing system, the hardware in
the company is sufficient for system development and maintenance.
The hardware, the software and to what extent they can support the proposed system
are the keys for this study .The airways has all the required software necessary development
and maintenance. Taking into consideration of the above criteria, the proposed system is
technically feasible and further developments could be accomplished easily.
Infrastructure projects will often have significant social and environment impacts
arising from their construction and operation, which can be both positive and negative. The
impact may include flow on affects beyond the immediate project area and beyond the people
directly associated with the project. In this project the social relationship between the traffic
police and the highway group.
CHAPTER 5
SYSTEM SPECIFICATION
• Processor
• Keyboard
• Mouse
• Color Monitor
• 1GB RAM
• Camera or Web Camera
• GSM module circuit
• Windows XP
• Java
• Net Beans IDE
CHAPTER 6
SYSTEM DESIGN
In this paper we propose an advanced system of motion detection techniques along
with multimedia techniques. This system will be more securing than any other these
techniques alone and also as compared to traditional video surveillance systems.
So my idea was to take a picture from a web cam every period of time (make it the
current picture) and compare it with a previous picture and if we find a big difference
between them we will save both pictures else will free memory from the old picture and make
the new picture the current picture.
• Capturing the live video feed through a web cam: To detect motion we first have to
capture live video frames of the area to be monitored and kept under surveillance this
is done by using a web cam which continuously provides a sequence of video frames
• Comparing the current frames captured with previous frames to detect motion: For
checking whether any motion is present in the live video feed, we compare the live
video frames being provided by the web cam with each other so that we can detect
changes in these frames and hence predict the occurrence of some motion.
• Storing the frames on the memory if motion is detected: If motion is being detected,
we would require storing such motion so that the user can view it in the near future.
This also helps the user in providing a legal proof of some inappropriate activity since
• Indicating through an alarm when the motion is detected: The user may want to be
notified immediately that there has been some intrusion detected by the software,
hence an alarm system is included in the software. This alarm system immediately
activates a WAV file format audioalarm signal if any kind of motion is detected
hence. This helps in preventing any kind of breach of security at that moment of time.
And the software sends the alert message to the Nearest Police station (or) Security
services.
CAMERA
COMPARE
NEW FRAME WITH
OLD FRAME
PIXEL BY PIXEL
IF ANY CHANGE
IN RGB VALUE OF PIXELS NO
THEN
YES
ALERT SYSTEM
GENERATE SMS ALERT
SEND MESSAGE TO SMS SAVE THE NEW FRAME
The motion detection method that was selected is a background subtraction technique.
A previous frame is used as the background, and its color is subtracted from the current frame
to detect any differences in the new frame. This background frame will be resettable at any
time by the user, but the first background frame used is the first frame that is processed by the
application. A “sliding window” for the background frame was considered as well. The
sliding time window would change the background frame at intervals so that it would come
closer to what we are seeing in the current frames. This would improve the motion detection
overall, but it would also eliminate any detected blobs that stop moving. Once the blob stops
moving, the background sliding window would slowly incorporate the blobs into the
background.
First, grab image from web cam called Old. Second, grab another image from web
cam after a while, called Cur. Compare Cur&Old by comparing each pixel color. If
difference is greater than tested value (according to the quality of your web cam & light
system you are using is 60 or 50 Hz), then save the two pictures. Finally, make the old picture
the Cur picture. Back to second step (infinite loop).
Purpose– The problem of automatic recognition of human activity is one of the most
important and challenging areas of research in computer vision because of the wide range of
possible applications, for example surveillance, advanced human-computer interactions,
monitoring. This paper presents statistical computer vision approaches to automatically
recognize different human activities.
Findings– The system was tested on image sequences acquired in a real archaeological site
while some people simulated both legal and illegal actions. Four kinds of activity were
automatically classified with a high percentage of correct detections.
Practical implications – Results of time performance tests were very encouraging for the use
of the proposed method in real time surveillance applications.
Originality/value – The proposed framework can work using low cost cameras with large
view focal lenses. It does not need any a priori knowledge of the scene and no intensive user
interaction is required in the early training phase.
Did you know that a home is burglarized every 14.6 seconds? 73.9% of all burglaries
target residential properties. These statistics provided by the FBI reflect how vulnerable
residential properties are in the US.So what do you do to keep burglars at bay? How do you
keep your family and property safe? You can obviously use a baseball bat or get a dog, but
that won’t really offer you the level of security that comes with technology. To protect your
home from intruders, you may want to look into getting a motion detector.
Motion sensors and detectors have been around since the seventies and are designed
to provide effective security to home owners. Although technological advancements have
improved the functioning of motion detectors, the basic purpose and system of this device
remains the same. A motion detector is basically designed to detect motion or movement in a
designated area and may instantly send a signal to the security alarm system.
A motion detector is a device that detects moving objects, particularly people. Such a
device is often integrated as a component of a system that automatically performs a task or
alerts a user of motion in an area. They form a vital component of security, automated
lighting control, home control, energy efficiency, and other useful systems.
Motion detectors have found wide use in domestic and commercial applications. One
common application is activating automatic door openers in businesses and public buildings.
Motion sensors are also widely used in lieu of a true occupancy sensor in activating street
lights or indoor lights in walkways, such as lobbies and staircases. In such smart
lighting systems, energy is conserved by only powering the lights for the duration of a timer,
after which the person has presumably left the area. A motion detector may be among the
sensors of a burglar alarm that is used to alert the home owner or security service when it
detects the motion of a possible intruder. Such a detector may also trigger a security
camera to record the possible intrusion.
o These detectors come in different shapes and sizes. Here are a couple of examples;
• Passive Infrared Detectors - These are one of the most commonly used sensors
nowadays and may be found in many home security systems. The device is
designed to pick up infrared rays and detect any form of movement.
• Combined Motion Sensors - You could also choose a combined motion sensor
that is designed to detect all kinds of motion, together. These sensors could be
useful if you wish to reduce the risk of false alarms.
• Wireless Motion Sensor - Wireless motion sensors are mostly used in doors and
windows. These could be convenient to place and easy to install. When the device
detects movement or motion, it may send signals back to a base device that
triggers an alarm.
• Motion Sensor Camera - This detector is designed to capture still images when
movement is detected. Some motion sensor cameras also generate videos.
What are pet immune motion detectors and how do they work?
o Pet immune detectors, as the name suggests, are motion detectors, which are not
triggered by the movement of animals. They are designed to detect the movement of
living beings above a certain weight only and therefore when an animal gets in their
range, they do not go off.
o Depends on the complexity of the alarm that you havebuilt.Usually constructed with a
simple set of items including photocells, 741 Op Amp, a buzzer or alarm, a 9 volt
battery breadboard and a 10k potentiometer, you may find it relatively easy to use
since you built it. But keep in mind that this will require some basic knowledge of
electronics on your part.
What are DIY motion detector alarms and how do they work?
o These are motion detectors that you can construct yourself with a set of accessories
you will find in any major electronics store. Since you are building this yourself, its
working will vary according to your design. But as a general principle it will operate
just like a typical motion alarm, detecting movements in its predefined area.
o There are many different detectors that trigger different responses. The most common
motion detectors are either passive infrared (PIR), microwave, or ultrasonic. A PIR
sensor will detect temperature of a body within its proximity. A microwave sensor
when activated omits a continuous wave of radiation which will experience
disturbance if an object comes in its path, triggering the alarm. On the other hand, an
ultrasonic sensor will omits ultrasonic waves that are reflected back when an object
appears in its proximity. Sensors and detectors use different technologies to functions.
You can also opt for dual-technology motion sensors depending upon your security
needs.
o In order to keep your motion sensor on, you would need to keep in mind a few
important points. You may check if the motion sensor is connected properly to the
system, batteries are working fine, and if the system is correctly wired. If you have a
wireless system, you must make sure there is no interference in the signals.
Can you tell about motion detectors how do they use sound and light waves?
o Motion detectors make use of a beam of light, which crosses the room near the
entrance, while the photo sensor is placed on the opposite side of the room. When
someone passes through the beam causing it to break, the photo sensor identifies the
change in the amount of light, and rings a bell. This way, both sound and light waves
are used in motion detectors.
o There are different types of motion detectors, which use different technologies to
detect rays. Passive infrared detectors detect body heat or infrared rays. Microwave
detectors make use of microwave pulses and detect motion by reflection of a moving
object. Dual technology detectors have combined features of microwave and infrared
sensors. Ultrasonic detectors make use of ultrasonic waves to measure the reflection
of moving objects.
o Typically, motion detectors use infra-red rays to detect motion and they work just fine
in complete darkness. Motion detectors do not need to emit any light or infra-red of
their own, as they rely on picking up infrared radiation given off by people. So, you
would not need to light up your area for the motion detector to work properly.
o If you are using an electrical tape to stop your motion detector from working, it may
not be very effective. Although, electrical tape may look black, but it is not
completely opaque, so infrared rays can pass through the tape and are likely to be
detected by the motion detector.
o It is easy to disable those motion detectors which are battery operated or wireless. For
these motion detectors, you will only need to remove the battery. If your motion
detector has an alarm system, you will only need to switch the alarm off. However, if
you want to completely stop your detector, you would need to deconstruct it by
removing battery and cables. If you have a wired detection system, you may need
professional help to disable the motion detector.
Monitoring your data centers and building access points with CCD cameras can
represent a boon to your overall security, but you need to know a little about camera
terminology to make the best use of them. Don't think about "aim and shoot" when you think
about these cameras. Think, instead, about how you might go about detecting motion in a
series of still images.
First off, let's examine the term "CCD". This stands for "charge-coupled device". A
CCD is a silicon chip with a surface that is divided into light-sensitive pixels. When light hits
these pixels, tiny electric charges are generated. With enough of these pixels, you can get a
fairly high resolution image. With adequate "sensitivity" you can detect motion even in a
dimply lit room.
Initially designed as a memory device, CCD became a good choice for image sensing
because of its ultra-sensitivity to light. Astronomers used the technology because it was as
much as 100 times as sensitive as film and allowed previously invisible objects to be viewed.
The difference between digital cameras and security cameras is in their basic way of
working. Digital cameras store images when you tell them to. Security cameras only provide
images (save and transmit them) when they detect motion. And motion detection is basically
the process of comparing sequential images and determining whether the differences between
them represent motion. If there are significant differences between two consecutive images,
the cameras "conclude" that there has been motion within the camera view. They do this
based on a couple important settings -- sensitivity and percentage.
Most, if not all, surveillance cameras will give you the option of selecting a particular
area within the viewing screen to be monitored. In other words, you can say that you only
want to detect motion in one area -- say the door or window.
There are two types of image changes that can occur. We can have an overall change
in the pixels as we would if the lights in the room went on or off. If the room has windows
through which incoming light will enter, you probably don't want to generate motion
detection photos just because the sun is setting. So, you can select a "sensitivity" setting that
provides a contrast setting and determines how much of a change should be reported.
You can also select how much of a change in your overall viewing area or within one
or more sub-areas of interest represent motion. Maybe you want to detect a man-sized change
something that affects 50% of the pixels in an area of interest, but you don't want to respond
to a mouse running across the floor.
Setting the sensitivity and percentage settings on cameras in your data center or office
space can be time-consuming. After all, you want to know when something or someone is
moving through your space, but you probably don't want 300 images every time someone
walks through the door. Similarly, you probably don't want to be looking through shots of
your office space every time a light goes on or off or a fan blows the drapes. Generating too
many images can be as bad as generating too few because people will stop looking at them.
Setting up your cameras to detect what you want to know about and nothing else is nearly
impossible, but you can probably strike a balance that has you looking through mostly at
things that matter and only half or a quarter as many "false positives".
Microwave
o These detect motion through the principle of Doppler radar, and are similar to a radar
speed gun. A continuous wave of microwave radiation is emitted, and phase shifts in
the reflected microwaves due to motion of an object toward (or away from) the
receiver result in a heterodyne signal at a low audio frequency.
Ultrasonic
o An ultrasonic wave (sound at a frequency higher than a human ear can hear) is
emitted and reflections from nearby objects are received.[1] Exactly as in Doppler
radar, heterodyne detection of the received field indicates motion. The
detected Doppler shift is also at low audio frequencies (for walking speeds) since the
ultrasonic wavelength of around a centimeter is similar to the wavelengths used in
microwave motion detectors. One potential drawback of ultrasonic sensors is that the
sensor can be sensitive to motion in areas where coverage is undesired, for instance,
due to reflections of sound waves around corners.[2] Such extended coverage may be
desirable for lighting control, where the goal is detection of any occupancy in an
area. But for opening an automatic door, for example, a sensor selective to traffic in
the path toward the door is superior.
Tomographic motion detector
o These systems sense disturbances to radio waves as they pass from node to node of a
mesh network. They have the ability to detect over large areas completely because
they can sense through walls and other obstructions.
Video camera software
o With the proliferation of low-cost digital cameras able to shoot video, it is possible to
use the output of such a camera to detect motion in its field of view using software.
This solution is particularly attractive when the intent is to record video triggered by
motion detection, as no hardware beyond the camera and computer is needed. Since
the observed field may be normally illuminated, this may be considered
another passive technology. However it can also be used together with near-
infrared illumination to detect motion in the dark, that is, with the illumination at a
wavelength undetectable by a human eye.
Gesture detector
o Photo detectors and infrared lighting elements can support digital screens to detect
hand motions and gestures with the aid of machine learning algorithms.
o Often, PIR technology is paired with another model to maximize accuracy and
reduce energy use. PIR draws less energy than emissive microwave detection, and so
many sensors are calibrated so that when the PIR sensor is tripped, it activates a
microwave sensor. If the latter also picks up an intruder, then the alarm is sounded.
• Intruder alarms.
• Fence mounted detectors.
• Buried vibration or electric field devices.
• Active infrared devices.
• Passive infrared devices.
• Microwave devices.
• Video motion detection devices.
This chapter is concerned with Video Motion Detection devices. (VMD). These may
be within or outside the premises and, besides detecting intruders, can be used as part of a
building management system. VMD may often be used either as a stand-alone system or
integrated with other detection systems. In an ideal world, detection devices would give no
false alarms and 100% of genuine alarms. Unfortunately, this is not an ideal world, and a
certain amount of compromise is necessary. This compromise must be reduced to the most
effective and acceptable level to achieve the system objectives.
There are really only two types of alarm, genuine alarms and false alarms. Sometimes
mention is made of ‘spurious alarms’, unexplained alarms and system failures. These must
only be considered as false alarms because the system has alarmed for no apparent reason. A
genuine alarm is one created by deliberate nefarious human action, e.g. by movement of a
person or vehicle into the detection field or disturbance of the alarm system. A false alarm is
one that has no deliberate human input, such as those caused by animals, birds or any
malfunction of equipment. One measure of the efficiency of a system is the ‘False Alarm
Rate’ (FAR). This is the ratio of false alarms to a time scale, i.e. five per day. The FAR level
will depend on many local site considerations. The objective is to reduce this to the minimum
without missing any real alarms. Another measure is the ‘probability of detection’ (PD) rate,
which is the ratio of detections to the number of attempts in controlled tests. The ideal for PD
is 100%.
Uses of VMD
The primary function of a VMD system is to relieve CCTV operators from the stress
of monitoring one or many screens of information that may not change for long periods. The
VMD system will be monitoring all the cameras in its system, and only reacting when there is
suspicious activity in one of the scenes. During the long periods of inactivity the operator can
continue with other tasks, secure in the knowledge that when something occurs the system
will immediately respond. Even a moderate sized system, with eight cameras, would prove
impossible for an operator to monitor. Eight monitors could not be viewed with any degree of
concentration for more than about twenty minutes. If the monitors were set to sequence, then
activity on seven cameras is lost for most of the time and would be totally ineffective to
detect intruders. With more cameras in a system, the task of detecting intruders becomes
impossible and technology must take over the strain.
The idea of VMD systems is that the processor is continuously monitoring all the
cameras in the system. During this time, the, operator may select or sequence cameras using
the conventional switching system. The system may include an additional monitor connected
to the VMD system that will normally show a blank screen. When activity in any camera
occurs that the VMD system interprets as an intruder, the alarmed camera is immediately
switched to the blank monitor and a warning sounded to alert the operator. The operator’s
attention, is therefore, immediately focused on the camera covering the alarm. The detection
of an intruder can also set off further events, such as setting a video recorder to real time
recording, setting a matrix switching system to sequence through a specific series of cameras,
etc. The operator can analyse the scene and take the appropriate course of action.
An intruder could generate an alarm and be out of view of the camera before it is
displayed. The operator would therefore see just a blank screen and be unsure about what to
do next. To overcome this, at the time of detection, many VMD systems will capture an
alarm image sequence containing one or more freeze frames. This may be displayed as the
first view on the previously blank screen. The operator may then examine the scene at the
instant of alarm in more detail.
In the descriptions that follow reference is made to a ‘frame’ of video. Some systems
use frames and some use fields, some systems can select between the two. This also applies
to storage devices. For ease of description, the term frame is used for consistency but the
actual method used should be checked for the system being considered.
• Detection Cells
For the purposes of this chapter the following definitions are used although there are
no standard terms used at present. A CELL is a single detection block that is analysed
electronically for brightness changes. A cell may be a single pixel, a block of pixels, or the
whole screen. A ZONE is a group of cells that have been defined as an active area. The exact
meaning of ‘zone’ must be checked with a manufacturer’s specification before assuming
what area is covered and to what degree of definition. This method of comparing complete
frames therefore has severe drawbacks. The next development was to divide the picture into a
number of separate areas or cells. This was refined by being able to switch cells on or off to
define the area of the scene that is of interest. Diagram 18.4 illustrates a VMD system that
divides the picture into cells, and how only a selected part of the scene can be set for motion
detection. The shaded areas are inactive and the clear parts are the active cells. In this case,
only activity in the area of the car will create an alarm. The cells are only displayed as such
during setting up the system. Once the set-up mode is exited, the complete picture is
displayed as normal and it is not possible to see any of the cells.
The sensitivity of the cells can be adjusted to take into account local conditions. This
control though is applied across all cells to the same extent. Some systems can be pre-set to
different sensitivity levels, for instance, to make allowance for day or night operation when
the lighting levels may be different.
This type of system would not be suitable in the scene shown out of doors. This is
because external light conditions are changing frequently. Clouds moving across the sky
would cause changes in brightness and create alarms. This type is used in simple indoor
situations, where the lighting conditions are constant and anything breaking the cells could be
considered an alarm. The set-up can be refined to reduce unwanted activations. For instance,
there may be two doors in the scene, only one of which needs to be monitored. In this case,
the part of the scene of interest could be adjusted accordingly. Note that with this type of
system any change in any one or all the cells will create an alarm.
• Intelligent Cells
The next move towards reducing false alarms is to build in the computing power to
process each cell individually and create algorithms that will intelligently analyse certain
situations. In this way, decisions can be made according to the direction of movement. For
instance, one cell may be declared as a pre-alarm cell and another as a detection cell. Pre-
alarm cells do not create alarms. Instead, they instruct the system to associate detection in this
area with detection in another. Activation of detection cells alone will not create an alarm. A
combination of successive detection in adjacent cells will trigger a logical action dependant
on the program. For example, if a detection cell is activated after a pre-alarm cell an alarm
will be created. However, movement in the reverse direction, detection before pre-alarm, will
not create an alarm. In this way, all persons leaving a building will not create an alarm but
persons approaching it will do so. Also, persons moving down the right of the perimeter will
not create an alarm.
• Cell Count
Another factor that could be calculated in the processor is the number of cells caused
to change simultaneously. This would then be used as a further part of the equation, so that an
alarm would only be created if more than ‘x’ cells change contrast simultaneously. This
brings in attendant problems in some situations. Three dogs in the scene could activate the
same number of cells as one person. A major problem with cell count is that of the different
number of cells a certain size of object occupies in relation to the position of the camera.
Diagram shows that a person in the foreground occupies eight cells while one in the
background is less than half a cell. Similarly, a cat close to the camera would activate far
more cells than a person in the background. Simple cell count systems may offer some
improvement in false alarms but do not offer accurate size discrimination.
• Contrast Levels
It was stated that the detection of movement was obtained by measuring the changes
in video level (brightness) between successive frames. This is fine if a person in a dark suit
passes through a very bright scene. The change in brightness will be dramatic and
immediately evident to the processor. However, a person in a grey suit in a grey scene, with
little contrast, will cause only a small change in the brightness levels. If the sensitivity of the
system were set to detect the latter event, it would be over responsive to insignificant changes
in a bright scene. This is less important for indoor systems, but a significant factor in external
systems where the light changes frequently and greatly. In addition, where the object is
smaller than the cell, the brightness change will be a function of both the size of the object
and the contrast between the object and the background. This becomes especially critical
when detecting a person in the background when they may be only 10% of the screen height.
This can be only 0.25% of the screen area. If the person is substantially smaller than the cell,
the sensitivity would have to be very high to detect this change, but would cause many false
alarms for larger subjects providing greater contrast, although much smaller than a person.
Another problem with measuring brightness using large cells is that a small dark
object such as a cat could cause the same brightness change as a large low contrast object
such as a person.
• Camera Shake
By processing separate cells and having the power to define better algorithms, other
problems can be overcome. For instance, light changes may be ignored if all cells are affected
to the same extent. Another method to allow for global light changes is to make one reference
cell in which movement is unlikely. The other cells are then referenced to this to compensate
for light levels. This latter method can impose limitations on the system set-up and is now
infrequently used.
• Cell Sensitivity
All the systems described so far have only been able to set the overall sensitivity of all
cells. This renders them quite unsuitable for outdoor use. The next need therefore is to be able
to adjust the sensitivity of each cell individually. This obviously requires much more
computing power but is an absolute prerequisite for any VMD to be used externally.
• Processing Speed
Most simple VMD systems have one processor irrespective of the number of cameras.
If it requires three frames to analyse a scene then the processing time for one camera will be
about 0.12 seconds. This must be multiplied by the number of cameras in the system.
Therefore, with eight cameras the processing speed for each will be about one second. For
example, a 1/2” camera with a 25mm lens has a width of view of about 5m at 20m from the
camera. A person could run across this field of view in less than the processing time and not
be detected.
The previous examples have served to show the principles of simple video motion
detectors. Variations of these types are still available but their use is limited, and they should
be used with great caution in anything but the most basic applications. However, they do
have uses and can provide a very cost-effective method of motion detection when the
situation is appropriate.
The limitations of the types described for demanding external situations are as follows.
• Crime, Cost and Benefits: Public surveillance camera systems can be a cost-
effective way to deter, document, and reduce crimes. For example the cost savings
associated with crimes averted through camera systems in a city of USA saved
over four dollars for every dollar spent on the technology, while another city
yielded a 50 cent return on the dollar.
• Document and Publicize Policies. The law enforcing agencies must formulate on
how surveillance cameras can be used and what are the disciplinary consequences
for misuse. Likewise, officers should be thoroughly trained on these policies and
held accountable for abiding by them.
• Forecasting and Post-Event Investigations: The usefulness of surveillance
technology in preventing and solving crimes depends on the resources put into it.
The most effective systems are those which are monitored by trained staff, have
enough cameras to detect crimes in progress, and integrate the technology into all
manner of law enforcement activities. Use of correct video-analytics can actually
raise alarms about crimes or accidents before they take place. Correct
management software will help in tagging, archiving and retrieving the authentic
data for post-event investigation.
• Mix of Man and Machine: People should be out on the streets and work-places
trying to prevent crime or losses. CCTV cameras are just a less effective
alternative to having police walk the streets or security personnel on patrolling and
physical surveillance. As with any technology, the use of cameras is by no means
a substitute for good old-fashioned ground work. The camera footage provides
additional leads in an investigation and aids in securing witness cooperation. The
video footage serves as a complement to – but not a replacement for – eyewitness
evidence in the courtroom.
CHAPTER 7
MODULE SPECIFICATION
7.1 LOGIN
The users who are created by the master can login into the system using this
module. The user will have to enter their username and password. The GUI has boxes
to enter the username and password and a login button to login.
7.2 SIGN UP
The username and password of the respective users are created using this
module by the master or the admin. For this module there are boxes to specify the
username, his/her password and other details.
7.3 MONITORING
In this module, when the system is started then it will monitor an area,
according to the capturing capacity of camera, it will compare frames and if it founds
any variations in the frame when compared to other frames, then the corresponding
frame will be saved to the computer and at the same time a sms will be send to the
registered user.
7.4 LOGOUT
The master or the admin user for exiting application when the job done, we
providing logout button. This are secure exiting option.
7.5HARDWARE SETUP
The first stage is setting up the system of which consists of PC and web camera. The
web camera is only operable with the web camera driver installed in the PC.Our Project
recognize the installed Hardware (WEB CAM), It provides control for the setting facilities of
camera such as Resolution, size of the frame in pixels, and Rate of frame to be captured.
System capture the view at particular rate of speed as specified at the settings of
camera.Captured image is stored temporarily.
Web camera has a wide variety of usage in many different fields. It was usedin
astronomical observation and photography, animal observation, robotic webcam(Web Cam
World 2001), recreation of 3 D modeling (3D Webcam 2003), weather observation in Alaska
(Alaska Climate 2003) and many others. Generally, its usagecan be classified according to its
function and place where the web camera is installed,e.g. scenery cam, personal cam, weather
cam, building cam, etc. For different usageobjectives and purposes, different supporting
hardware and software may be required(Churchill 2001).
New application of web camera is developed every now and then.The new
applications of web camera require software or both hardware and softwareto achieve the
desired function.
motion detection algorithm finds any motion, PIC microcontroller sends commands to
GSM module. GSM module send SMS or make call according to selection of user.
SIM900A GSM module: GSM module used in this project to either send SMS to user or
to make call to user on his/her cell number. GSM module communicates with pic
microcontroller through AT commands. You should make sure to connect GSM module
with pic microcontroller which has same operating voltages as operating voltages of
pic18f452. If your GSM module works on 5 volt, you can connect it directly with
PIC18F452. Because PIC18F452 also works on same operating voltages. But if your
GSM module works on 3.3 volt, you need to use a interfacing circuit between them. So
here in the project we are using an external power for the SIM to work, GSM module
communicate with pic microcontroller through serial communication UART(universal
asynchronous receiver/transmitter).
An external power supply is also used for the working of the circuit.
So these are the main components used in home security system or SMS based home
alarm system. The SIM900 is a complete quad band GSM module which delivers
GSM/850/900/1800/1900MHz performance for SMS and data with low power consumption.
In this stage first, grab image from web cam called Old. Second, grab another image
from web cam after a while, called Current. Compare Current&Old by comparing each pixel
color. If difference is greater than tested value (according to the quality of your web cam &
light system you are using is 60 or 50 Hz), then save the two pictures. Finally, make the old
picture the Cur picture. Back to second step (infinite loop)
In the third stage, implementation process is done by coding the motion detection
software using Java. The algorithm that was successfully simulated isused as the reference for
forming the working mechanism in creating motion detectionsoftware.
In this stage the new frames will be stored at specified Locations, and GSM based
message alert for anybody.
CHAPTER 8
IMPLEMENTATION
In the above figure, an input stream of images will be provided to the system which is
then subject to background separation. Subtraction takes place based on the predefined
threshold value and resultant is the foreground image which we obtain.
CHAPTER 9
CONCLUSION
The latest technologies used in the fight against thefts and destruction are the video
surveillance and monitoring. By using the technologies, it is possible to monitor and capture
every inch and second of the area in interest. Motion detection is the most important feature
in digital video surveillance system. It gives the camera the capability to capture when
needed rather than capture all the time and this leads to huge reduction in storage space.
Alarm can also be triggered when unexpected motion is detected. This relieves the Personnel
in monitoring at all time.
The motion detector patches up for the need of a cheap and small security system in
day-to-day life. Computerized home-based security can develop a lot with the coming future.
Future is promising and easier with innovative technologies.
CHAPTER 10
FUTURE WORKS
There are still many areas which can be further researched from this point onwards.
For example, the techniques introduced may be enhanced to suit some problem specific
applications or some domain specific applications. Also the techniques may be further
enhanced by implementing more useful methods and algorithms such as those involving with
tracking the object which causes the motion events such as those using optical flows or also
known as image flows. Here, human motions are being detected. However, future works may
also want to recognize the pose or gesture of the human body registered by the algorithm
implemented here in the prototype system
REFERENCES
APPENDIX A
A.1 SCREENSHOTS
In our database already saved user id and password with help of jdbc connector will respond
login time.
This statement says to close the motion detection panel whenever we press the logout
button.
This statement is used to access the default system webcam with standard resolutions.
webcam = Webcam.getDefault();
webcam.setCustomViewSizes(nonStandardResolutions);
webcam.setViewSize(WebcamResolution.VGA.getSize());
Here the webcam is opened and the threshold frequency is set to 30` and the detection is
started.
if (detector.isMotion()) {
g.setStroke(new BasicStroke(2));
g.setColor(Color.RED);
g.drawOval(cog.x , cog.y, 50, 50);
If the motion is detected a red circle has to come on that particular area.
Here the default filename is set to the current time and path to save the file is set.
So that the system display the output “motion detected” and the SMS has been send.
System.out.println("Motion Detected");
SendSMS a=new SendSMS();
if(a.send()==true)
{
System.out.println("Message has been send");
}
else
{
System.out.println("Message not send");
And here is the alert message that delivered to the connected phone number.