SlideShare a Scribd company logo
1 of 6
Smart Security System for Sensitive Area by
Using Image Processing
Mr.Mandar P. Pathrikar Mr. Suhas J. Bhosale Mr. Durgesh Patil Mr. Gajanan Deshpande
Computer engineering, Computer engineering, Computer engineering, Computer engineering,
Pune University. Pune University. Pune University. Pune University.
mandarpathrikar@yahoo.com bhosale.suhas011@gmail.com patildurgesh007@gmail.com gd0011@gmail.com
Abstract —: This project describes Security system for banks. It is very suitable for remote monitoring of
confidential area. The idea behind developing this system is that there are many security systems which
contain CCTV with much Functionality which continuously capture the video and leads to wastage of
memory. We are going to develop this system because the previous security systems only capture video which
will be used as evidence after the attack is done but the system which we are going to introduce is not only
capture the video but also take the appropriate action to prevent the attack. Without using motion sensors
webcam will record live video whenever there is an intrusion in the room. Administrator can send commands
to control switch on/off of the device through mobile. It can store mobile numbers for all the
administrators/owners who need to be contacted in case ofemergency. The system keeps track/log of all the
activities. Hence detailed record of messages sent and received is maintained. Admin can see the live
streaming ofthe attack and take appropriate action. Ifadmin will not response then system will take action.
Keywords —: live streaming, remote monitoring, surveillance.
1. INTRODUCTION
This project describes mobile based remote
home control and surveillance architecture without using
motion sensors (hardware+IR). It is very suitable for
remote home monitoring etc. The idea is to set up a
computer terminal equipped with 2/3 web cameras and a
J2ME phone at home (which can be used to control the
camera’s connected to the PC by the
administrator/owner). Project provides recording and
capture image from multiple cameras).
To developed smart video security for banking
system. Overcome the memory loss of the storage.
Enhance the security of the banking system. CCTV not
only captures the image when incident is happening.
Also alert the system.
We are applying the all concept which actually
improve the video security system and give idea to
improve the working of the image processing activity.
Also main role perform by the software each step of the
algorithm is specify in well format. In the Image
processing system we are apparently dealing with
operating system feature, which support our system and
enhance the scope of the smart software
1.1. Drawbacks of previous system:
1. It leads to the wastages of memory.
2. It can be used as evidence only, not to prevent
attack.
Fig.1 Basic Structure
In the Image processing system we are
apparently dealing with operating system feature.
2. System Feature
Bank security system is secure by the CCTV
camera so that all access of that application is provides
to the administrator and owner of the bank.. The server
farms have features such as the latest cooling systems
and service optimization techniques which individual
educational institutions are unlikely to be able to afford.
“Infinite” scalability a key feature of java application
is its rapid elasticity, allowing for sudden peaks in
demand and giving the security to the impression that
the services are infinitely scalable.
1) SMS : It is a Short Message Service is the text
communication service component of phone, web or
mobile communication systems, using standardized
communications protocols that allow the exchange of
short text messages between fixed line or mobile phone
devices.
Fig.2 Architecture of the system
2) GPRS : General packet radio service is a packet
oriented mobile data service on the 2G and 3Gcellular
communication systems global system for mobile
communications (GSM). The service is available to
users in over 200 countries worldwide.
3) J2EE: The Java 2 Platform, Enterprise Edition
defines the standard for developing multitier enterprise
applications. The J2EE platform simplifies enterprise
applications by basing them on standardized, modular
components, by providing a complete set of services to
those components, and by handling many details of
application behavior automatically, without complex
programming.
2.2 Purpose and scope
This project deals with developing application in
order to provide smart video security system for the
banks. This is achieved by using image processing and
OpenCV operation. We deal with the problem of
implementing security system by using the simple
concept of CCTV and by performing operation on that
we develop the operational system.
This problem tries to obtain and verify a proof
that the data that is stored by a user at a remote data
storage in database. In this system large amount of
security is provided to the bank system all problems
related with video can overcome. Such checks must
allow the data owner to efficiently, frequently, quickly
and securely verify that the security system and get the
live operation on his phone.
3. Design and Implementation.
1) Remote access can be provided by almost any
communications means possible.
2) User can either log on to home server via internet
connection and control/monitor using appropriate
authentication.
Fig.3 System Architecture
3) Alternatively user can control the system using SMS
messages. A short application written for mobile can also
take care of sending the messages from users mobile to
home server Android Mobile. This will eliminate the
need for the mobile user to remember the long keyword a
control, etc.
4) In case none of the above communication means are
possible, user can simply use email to send authenticated
mails to home server account and control the system.
5) Proper authentication using mobile number, email id,
and passwords is done before the user is allowed to
control/monitor the home server.
6) Using a camera and motion detection algorithm user
is also informed about any intrusion and the image/video
is transmitted online.
7) User can also send a series of command sequences
scheduled for a later time. The commands will be
executed automatically at the server when the time
arrives. The commands may include activating /
deactivating a relay, setting threshold, etc.
8) Live Streaming Over Mobile Phone
3.2 How systemand Alert Contributes to
Flexibility
Fig.3.2 Design of System
The administrator starts the video surveillance
system. As soon as the surveillance system is started, the
system checks if the web camera is connected or not. If
the web camera is not connected to the system then it
will display an error messages. Otherwise, the system
continuously starts capturing images. A standard image
is already stored in a separate file. The captured images
are compared with this standard image and are checked
for any intrusion. In case of intrusion, a SMS will be
sent to the administrator/owner for appropriate action to
be taken.
Fig.3.2.1 Practical Implementations of System
User can then login to the surveillance web
application to view the most recent videos. The system
waits for a specified amount of time for response
commands (SMS) from any of the owners, after which it
takes necessary action itself.
3.3 Nonfunctional Requirements
3.3.1 Performance Requirements
The performance requirements for software are
stated below. The product as will be developed in Java,
it will be platform independent. Hence, it will only
require JVM of the underlying O.S. The memory
requirement as such is not predicted at this time, but
product should be optimal to use. For the database we
can use any type of software of file system. The above
stated requirements are the initial estimated values
which will vary as according to the amount of users
signing up for the account and traffic load on the server.
3.3.2 Security Requirements
The sensitive data is processed outside the
environment within the physical infrastructure of a third
party.
 Image Processing
 Privileged user access.
 Regulatory compliance.
 Data safety and segregation
 Storage, backup and recovery of data, including
response times
 Support, including investigative support, when
needed
 Reporting
Administrator
Start surveillance
Check connection
When no
connection
error
message
proceeds
Continuously capture images
Compare images
Captured images
compared with the
template images
and if intrusion is
detected then
proceed
Video recording Send notification
3.3.3 Safety Requirement
Safety is the degree to which accidental harm is
properly addressed (e.g., prevented, identified, reacted
to, and adapted to).
3.3.4 Software Quality Attributes
 Verify Content Quickly
 Software Project Management
4.1 Study of Algorithm
Euclidean Distance Method Algorithm
This is used for comparing two images to detect motion
The Euclidean distance computation using square root
algorithm, between two points in Cartesian co-ordinates
can be expressed as
Where rx and ry are the co-ordinates of the received
signal and Sxn and Syn are the co-ordinates of the nth
constellation point in two dimensional space. The
distance expression can then be written as
This calculation process needs a adder, divider,
multiplier and a square-rooter circuit, which intern needs
large silicon area and also process is time consuming.
Therefore in high speed, low cost implementations,
computation process algorithm play a major role.
On the other hand the Euclidean distance can be
visualized as the hypotenuse of the triangle with sides
‘a’ and ‘b’. In the right angled triangle the length of
hypotenuse is a function of the two sides. To understand
clearly a graph of distance for different values of the
sides ‘a’ and ‘b’ (preferably arbitrarily chosen values of
the triangle, ranging over the possible limits, is drawn as
shown (a). In QAM applications, the distance between
the constellation points depends on scaling factors used
for modulation.
The distance graph is approximated as a set of ordered
straight line segments with slope of the straight lines are
tuned such that they are digitally implementable. Lesser
the straight line segments require lesser number of
hardware’s to implement. The distance plot reveals that,
the distance function can be best approximated using
two straight lines segments as
It is very interesting to note that the distance
computation just requires only one adder and a shift
register. This can be implemented using the
combinational logic circuits and hence definitely faster.
The error with this approach is to a maximum of 6.7%.
A better distance function approximation, is attempted to
make this as an acceptable solution, wherein the distance
is expressed as
5. Technical specification
5.1 Software requirement:
 Java
 Apache tomcat server
 My SQL
 Eclipse:
Eclipse is an open source community whose projects
building tools and frameworks are used for creating
general purpose application. The most popular usage of
Eclipse is as a Java development environment.
 Eclipse is an open source community, whose projects
are focused on building an open development
platform comprised of extensible frameworks, tools
and runtimes for building, deploying and managing
software across the lifecycle.
 The independent not-for-profit corporation was
created to allow a vendor neutral and open,
transparent community to be established around
Eclipse. Today, the Eclipse community consists of
individuals and organizations from a cross section of
the software industry.
 The Eclipse Foundation is funded by annual dues
from our members and governed by aboard. Strategic
Developers and Strategic Consumers hold seats on
this Board, as do representatives elected by Add-in
Providers and Open Source committers. The
Foundation employs a full-time professional staff to
provide services to the community but does not
employ the open source developers, called
committers, which actually work on the Eclipse
projects.
 In general, the Eclipse Foundation provides four
services to the Eclipse community:
1) IT Infrastructure,
2) IP Management,
3) Development Process,
4) Ecosystem Development.
5.2 Hardware requirement:
 Server side System will be windows based
supporting versions windows XP onwards.
 The minimum configuration required on server
platform.
 2.4 GHZ, 80 GB HDD for installation
 512 MB RAM.
 PC
 Network Cards
 Android Phone
 Two Cameras
5.3 Legal Requirements:
 Static IP: To register Static IP (Rs. 2000-2500 p.a
required)
 Internet connection: Minimum speed 2-4 mbps.
For internet connection any Internet Service
Provider (ISP) like Airtel, Reliance, and BSNL Idea
etc can be used.
6. Module Working in the Project.
In the module working diagram there are different
modules we are using in that everyone perform the
specific work. On that basis they were going to send the
result to another module and that will send the result to
another module.
Step 1: In the first stage of system authenticate user of
the banking system login on the server and register their
authentication.
Step 2: Authenticate user now start both the cameras of
the system and store the template in the file. This image
is the part of sensitive area use as reference in the
system. This system is completely responsible for alert
procedure.
Step 3: Now authenticate user start the system and our
system start executing the module. In this module CCTV
camera continuously send the footage to the alert
module.
Fig.5.4.1 Template Image store in database
Step 4: When any intrusion is detected in the template
image. It displays the alert message to the administrator.
This message is also alert the nearest police station.
When it blows the alarm system, it starts live steaming
in the android cell phone.
Fig.5.4.2 Introsion detected show the message
Fig.5.4.3 Alert system get activated
Step 5: Live streaming display on the android system,
respective action should be taken.
7. Project Estimation:-
Sr.
no
Item
Name
Description Quantity cost
1.
laptop Intel core i3
processor,3GB
RAM,380 GB Hard
drive
2 55,000
2 Camera CCTV camera 2 5000
3 Others Documentation,
Internet charges etc. ___ 1500
Total=Rs.61,500
7.1 Advantage:-
1. It consumes less memory.
2. Unnecessary video cannot be recorded.
3. We can take the action during the attack.
4. Admin can see live streaming and take action.
7.2 Disadvantages:-
1. It completely based on video surveillance, so if
any interrupt happen then it may affect the system.
2. Alarm system is very sensitive, continuous
observation is requiring.
3. Live streaming apps always in the Wi-Fi area.
7.3 Applications of Project
1. This project will prevent the attack by taking
appropriate action.
2. Admin can see live streaming of attack.
3. It will save computer memory.
4. It will save time during analysis of recorded video.
7.4 Maintenance:-
For providing maintenance of application following
decision are taken.
1. We have to provide maintenance to this project in
every week or one day gap.
2. Provide the maintenance to Web Service within a
month.
3. Database of this project should maintain with time.
8. Conclusion:
Smart surveillance systems significantly contribute to
situation awareness. Such systems transform video
surveillance from data acquisition tool to information
and intelligence acquisition systems. Real-time video
analysis provides smart surveillance systems with the
ability to react in real-time. Our system senses the
intrusion and sends notifications to authorized persons
so that action can be taken in response to the intrusion.
Thus this security system will help us to:
 Save memory
 Save time
 Take immediate action during attack not after the
attack is done.
So we will use it where we require security. This
project describes Security system for banks. It is very
suitable for remote monitoring of confidential area.
Without using motion sensors webcam will record live
video whenever there is an intrusion in the room.
9. Acknowledgement:
It is our privilege to express our sincerest and
deepest regards to our project guide Prof. Vinod S.
Wadne head of Department of Computers for
encouraging and allowing us to present the project on
“SMART SECURITY SYSTEM FOR SENSITIVE
AREA BY USING IMAGE PROCESSING” at our
department premises for the partial fulfillment of the
requirements leading to the award of BE degree in
Computer Engineering.
10. References:
[1] Blanz and Vetter, Face recognition based on fitting
3D morphable model, IEEE PAMI, vol. 25, no. 9,
pp. 1063-1074, Sept. 2003.
[2] R.Collins et al A system for video surveillance and
monitoring, VSAM Final Report, Carnegie Mellon
Univ., Pittsburgh, PA, Tech. Rep. CMU-RI-TR-00-
12, May 2000.
[3] Combat Zones That See, U.S. Government DARPA
Project.M.W. Green, The appropriate and effective
use of security technologies in U.S.schools, A guide
for schools and law enforcement agencies, Sandia
National
[4] Laboratories,Albuquerque,NM, NCJ 178265, Sep.
1999.M. Greiffenhagen, D. Comaniciu, H. Niemann,
and V. Ramesh, Design, analysisand engineering of
video monitoring systems: An approach and case
study, Proc.IEEE, vol. 89, no. 10, pp. 1498-1517.
[5] Hampapur,S. Pankanti, A.W. Senior, Y-L. Tian, L.
Brown, and R. Bolle, Face cataloger: Multi-scale
imaging for relating identity to location, in Proc.
IEEE Conf. Advanced Video and Signal

More Related Content

What's hot

Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTDr. Amarjeet Singh
 
Employee Leave Management System
Employee Leave Management SystemEmployee Leave Management System
Employee Leave Management SystemMd. Mahbub Alam
 
Automatic Irrigation System Project Report
Automatic Irrigation System Project ReportAutomatic Irrigation System Project Report
Automatic Irrigation System Project ReportEr Gupta
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduinoBhawnaSingh351973
 
Automatic room-light-controller-visitor-counter
Automatic room-light-controller-visitor-counterAutomatic room-light-controller-visitor-counter
Automatic room-light-controller-visitor-counterMohit Awasthi
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printerKartik Kalpande Patil
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket bookingmrinnovater007
 
SRS for Library Management System
SRS for Library Management SystemSRS for Library Management System
SRS for Library Management SystemToseef Hasan
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainMadhu Bala
 
Project report on bidirectional visitor counter & home automation
Project report on bidirectional visitor counter & home automationProject report on bidirectional visitor counter & home automation
Project report on bidirectional visitor counter & home automationRoshan Mani
 
Automate machine for rescue operation for child
Automate machine for rescue operation for childAutomate machine for rescue operation for child
Automate machine for rescue operation for childeSAT Journals
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportChinaraja Baratam
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTDanish Mehraj
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filteringGautam Saxena
 
smart street light projet
smart street light projetsmart street light projet
smart street light projetSurya Karan
 

What's hot (20)

Women Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOTWomen Safety Night Patrolling Robot Using IOT
Women Safety Night Patrolling Robot Using IOT
 
Employee Leave Management System
Employee Leave Management SystemEmployee Leave Management System
Employee Leave Management System
 
Atm System
Atm SystemAtm System
Atm System
 
Automatic Irrigation System Project Report
Automatic Irrigation System Project ReportAutomatic Irrigation System Project Report
Automatic Irrigation System Project Report
 
Smart India Hackathon
Smart India HackathonSmart India Hackathon
Smart India Hackathon
 
Smart Door locking system using arduino
Smart Door locking system using arduinoSmart Door locking system using arduino
Smart Door locking system using arduino
 
Automatic room-light-controller-visitor-counter
Automatic room-light-controller-visitor-counterAutomatic room-light-controller-visitor-counter
Automatic room-light-controller-visitor-counter
 
Functional block diagram_of_laser_printer
Functional block diagram_of_laser_printerFunctional block diagram_of_laser_printer
Functional block diagram_of_laser_printer
 
Student Tracking System
Student Tracking SystemStudent Tracking System
Student Tracking System
 
Online movie ticket booking
Online movie ticket bookingOnline movie ticket booking
Online movie ticket booking
 
Evm electronic voting machine
Evm electronic voting machineEvm electronic voting machine
Evm electronic voting machine
 
SRS for Library Management System
SRS for Library Management SystemSRS for Library Management System
SRS for Library Management System
 
Smoothing Filters in Spatial Domain
Smoothing Filters in Spatial DomainSmoothing Filters in Spatial Domain
Smoothing Filters in Spatial Domain
 
WATER LEVEL INDICATOR
WATER LEVEL INDICATORWATER LEVEL INDICATOR
WATER LEVEL INDICATOR
 
Project report on bidirectional visitor counter & home automation
Project report on bidirectional visitor counter & home automationProject report on bidirectional visitor counter & home automation
Project report on bidirectional visitor counter & home automation
 
Automate machine for rescue operation for child
Automate machine for rescue operation for childAutomate machine for rescue operation for child
Automate machine for rescue operation for child
 
Password based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final reportPassword based door lock system using 8051 microcontroller final report
Password based door lock system using 8051 microcontroller final report
 
Automatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoTAutomatic water level monitoring and control system using IoT
Automatic water level monitoring and control system using IoT
 
Homomorphic filtering
Homomorphic filteringHomomorphic filtering
Homomorphic filtering
 
smart street light projet
smart street light projetsmart street light projet
smart street light projet
 

Viewers also liked

Security using image processing
Security using image processingSecurity using image processing
Security using image processingIJMIT JOURNAL
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometricsanoop80686
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Sandeep Kumar Panda
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identificationguest8cbcb02
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technologyVishwasJangra
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyAlfred Oboi
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management SystemPranil Dukare
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Hospital management system(database)
Hospital management system(database)Hospital management system(database)
Hospital management system(database)Iftikhar Ahmad
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system projectHimani Chopra
 

Viewers also liked (17)

Security using image processing
Security using image processingSecurity using image processing
Security using image processing
 
Final Report Biometrics
Final Report BiometricsFinal Report Biometrics
Final Report Biometrics
 
Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)Fingerprint Recognition Technique(PDF)
Fingerprint Recognition Technique(PDF)
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Security
SecuritySecurity
Security
 
biometric technology
biometric technologybiometric technology
biometric technology
 
fingerprint technology
fingerprint technologyfingerprint technology
fingerprint technology
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Hospital Management System
Hospital Management SystemHospital Management System
Hospital Management System
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Hospital management system(database)
Hospital management system(database)Hospital management system(database)
Hospital management system(database)
 
Hospital management system project
Hospital management system projectHospital management system project
Hospital management system project
 
Hospital management system
Hospital management systemHospital management system
Hospital management system
 

Similar to Smart security system for sensitive area by using image processing

Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionIRJET Journal
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaIRJET Journal
 
Java project titles
Java project titlesJava project titles
Java project titlesAshly Liza
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry PiIRJET Journal
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...IJTET Journal
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxAROCKIAJAYAIECW
 
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...IRJET Journal
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldIRJET Journal
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET Journal
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Bhaskar Nemala
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET Journal
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemIRJET Journal
 

Similar to Smart security system for sensitive area by using image processing (20)

Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
Src 147
Src 147Src 147
Src 147
 
Home Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face RecognitionHome Security System and Door Access Control Based on Face Recognition
Home Security System and Door Access Control Based on Face Recognition
 
Web-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social MediaWeb-Based Online Embedded Security System And Alertness Via Social Media
Web-Based Online Embedded Security System And Alertness Via Social Media
 
Java project titles
Java project titlesJava project titles
Java project titles
 
H028038042
H028038042H028038042
H028038042
 
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry PiIRJET-  	  Iot Based Home Visitor Monitoring System using Raspberry Pi
IRJET- Iot Based Home Visitor Monitoring System using Raspberry Pi
 
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...Two Step Design for Personal Authentication Using Finger Vein Recognition and...
Two Step Design for Personal Authentication Using Finger Vein Recognition and...
 
Multimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docxMultimodel Operation for Visually1.docx
Multimodel Operation for Visually1.docx
 
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...IRJET -  	  pyScout: Employee Monitoring System by using Screen Capturing Tec...
IRJET - pyScout: Employee Monitoring System by using Screen Capturing Tec...
 
Automated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time WorldAutomated Security Surveillance System in Real Time World
Automated Security Surveillance System in Real Time World
 
IRJET- Border Security using Computer Vision
IRJET- Border Security using Computer VisionIRJET- Border Security using Computer Vision
IRJET- Border Security using Computer Vision
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3Raspberry pi project smart motion detection system using raspberry pi 3
Raspberry pi project smart motion detection system using raspberry pi 3
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage DeviceIRJET- Optimization of Surveillance Camera for Low Cost Storage Device
IRJET- Optimization of Surveillance Camera for Low Cost Storage Device
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 

More from Mandar Pathrikar

More from Mandar Pathrikar (7)

Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Mission mumbai
Mission mumbaiMission mumbai
Mission mumbai
 
Service oriented cloud computing
Service oriented cloud computingService oriented cloud computing
Service oriented cloud computing
 
Digital spectacle by using cloud computing
Digital spectacle by using cloud computingDigital spectacle by using cloud computing
Digital spectacle by using cloud computing
 
Enhancement in Laser Tchnology
Enhancement in Laser TchnologyEnhancement in Laser Tchnology
Enhancement in Laser Tchnology
 
New world of Wireless
New world of WirelessNew world of Wireless
New world of Wireless
 
Cyber ppt
Cyber pptCyber ppt
Cyber ppt
 

Recently uploaded

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Recently uploaded (20)

Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

Smart security system for sensitive area by using image processing

  • 1. Smart Security System for Sensitive Area by Using Image Processing Mr.Mandar P. Pathrikar Mr. Suhas J. Bhosale Mr. Durgesh Patil Mr. Gajanan Deshpande Computer engineering, Computer engineering, Computer engineering, Computer engineering, Pune University. Pune University. Pune University. Pune University. mandarpathrikar@yahoo.com bhosale.suhas011@gmail.com patildurgesh007@gmail.com gd0011@gmail.com Abstract —: This project describes Security system for banks. It is very suitable for remote monitoring of confidential area. The idea behind developing this system is that there are many security systems which contain CCTV with much Functionality which continuously capture the video and leads to wastage of memory. We are going to develop this system because the previous security systems only capture video which will be used as evidence after the attack is done but the system which we are going to introduce is not only capture the video but also take the appropriate action to prevent the attack. Without using motion sensors webcam will record live video whenever there is an intrusion in the room. Administrator can send commands to control switch on/off of the device through mobile. It can store mobile numbers for all the administrators/owners who need to be contacted in case ofemergency. The system keeps track/log of all the activities. Hence detailed record of messages sent and received is maintained. Admin can see the live streaming ofthe attack and take appropriate action. Ifadmin will not response then system will take action. Keywords —: live streaming, remote monitoring, surveillance. 1. INTRODUCTION This project describes mobile based remote home control and surveillance architecture without using motion sensors (hardware+IR). It is very suitable for remote home monitoring etc. The idea is to set up a computer terminal equipped with 2/3 web cameras and a J2ME phone at home (which can be used to control the camera’s connected to the PC by the administrator/owner). Project provides recording and capture image from multiple cameras). To developed smart video security for banking system. Overcome the memory loss of the storage. Enhance the security of the banking system. CCTV not only captures the image when incident is happening. Also alert the system. We are applying the all concept which actually improve the video security system and give idea to improve the working of the image processing activity. Also main role perform by the software each step of the algorithm is specify in well format. In the Image processing system we are apparently dealing with operating system feature, which support our system and enhance the scope of the smart software 1.1. Drawbacks of previous system: 1. It leads to the wastages of memory. 2. It can be used as evidence only, not to prevent attack. Fig.1 Basic Structure In the Image processing system we are apparently dealing with operating system feature.
  • 2. 2. System Feature Bank security system is secure by the CCTV camera so that all access of that application is provides to the administrator and owner of the bank.. The server farms have features such as the latest cooling systems and service optimization techniques which individual educational institutions are unlikely to be able to afford. “Infinite” scalability a key feature of java application is its rapid elasticity, allowing for sudden peaks in demand and giving the security to the impression that the services are infinitely scalable. 1) SMS : It is a Short Message Service is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices. Fig.2 Architecture of the system 2) GPRS : General packet radio service is a packet oriented mobile data service on the 2G and 3Gcellular communication systems global system for mobile communications (GSM). The service is available to users in over 200 countries worldwide. 3) J2EE: The Java 2 Platform, Enterprise Edition defines the standard for developing multitier enterprise applications. The J2EE platform simplifies enterprise applications by basing them on standardized, modular components, by providing a complete set of services to those components, and by handling many details of application behavior automatically, without complex programming. 2.2 Purpose and scope This project deals with developing application in order to provide smart video security system for the banks. This is achieved by using image processing and OpenCV operation. We deal with the problem of implementing security system by using the simple concept of CCTV and by performing operation on that we develop the operational system. This problem tries to obtain and verify a proof that the data that is stored by a user at a remote data storage in database. In this system large amount of security is provided to the bank system all problems related with video can overcome. Such checks must allow the data owner to efficiently, frequently, quickly and securely verify that the security system and get the live operation on his phone. 3. Design and Implementation. 1) Remote access can be provided by almost any communications means possible. 2) User can either log on to home server via internet connection and control/monitor using appropriate authentication. Fig.3 System Architecture 3) Alternatively user can control the system using SMS messages. A short application written for mobile can also take care of sending the messages from users mobile to home server Android Mobile. This will eliminate the need for the mobile user to remember the long keyword a control, etc.
  • 3. 4) In case none of the above communication means are possible, user can simply use email to send authenticated mails to home server account and control the system. 5) Proper authentication using mobile number, email id, and passwords is done before the user is allowed to control/monitor the home server. 6) Using a camera and motion detection algorithm user is also informed about any intrusion and the image/video is transmitted online. 7) User can also send a series of command sequences scheduled for a later time. The commands will be executed automatically at the server when the time arrives. The commands may include activating / deactivating a relay, setting threshold, etc. 8) Live Streaming Over Mobile Phone 3.2 How systemand Alert Contributes to Flexibility Fig.3.2 Design of System The administrator starts the video surveillance system. As soon as the surveillance system is started, the system checks if the web camera is connected or not. If the web camera is not connected to the system then it will display an error messages. Otherwise, the system continuously starts capturing images. A standard image is already stored in a separate file. The captured images are compared with this standard image and are checked for any intrusion. In case of intrusion, a SMS will be sent to the administrator/owner for appropriate action to be taken. Fig.3.2.1 Practical Implementations of System User can then login to the surveillance web application to view the most recent videos. The system waits for a specified amount of time for response commands (SMS) from any of the owners, after which it takes necessary action itself. 3.3 Nonfunctional Requirements 3.3.1 Performance Requirements The performance requirements for software are stated below. The product as will be developed in Java, it will be platform independent. Hence, it will only require JVM of the underlying O.S. The memory requirement as such is not predicted at this time, but product should be optimal to use. For the database we can use any type of software of file system. The above stated requirements are the initial estimated values which will vary as according to the amount of users signing up for the account and traffic load on the server. 3.3.2 Security Requirements The sensitive data is processed outside the environment within the physical infrastructure of a third party.  Image Processing  Privileged user access.  Regulatory compliance.  Data safety and segregation  Storage, backup and recovery of data, including response times  Support, including investigative support, when needed  Reporting Administrator Start surveillance Check connection When no connection error message proceeds Continuously capture images Compare images Captured images compared with the template images and if intrusion is detected then proceed Video recording Send notification
  • 4. 3.3.3 Safety Requirement Safety is the degree to which accidental harm is properly addressed (e.g., prevented, identified, reacted to, and adapted to). 3.3.4 Software Quality Attributes  Verify Content Quickly  Software Project Management 4.1 Study of Algorithm Euclidean Distance Method Algorithm This is used for comparing two images to detect motion The Euclidean distance computation using square root algorithm, between two points in Cartesian co-ordinates can be expressed as Where rx and ry are the co-ordinates of the received signal and Sxn and Syn are the co-ordinates of the nth constellation point in two dimensional space. The distance expression can then be written as This calculation process needs a adder, divider, multiplier and a square-rooter circuit, which intern needs large silicon area and also process is time consuming. Therefore in high speed, low cost implementations, computation process algorithm play a major role. On the other hand the Euclidean distance can be visualized as the hypotenuse of the triangle with sides ‘a’ and ‘b’. In the right angled triangle the length of hypotenuse is a function of the two sides. To understand clearly a graph of distance for different values of the sides ‘a’ and ‘b’ (preferably arbitrarily chosen values of the triangle, ranging over the possible limits, is drawn as shown (a). In QAM applications, the distance between the constellation points depends on scaling factors used for modulation. The distance graph is approximated as a set of ordered straight line segments with slope of the straight lines are tuned such that they are digitally implementable. Lesser the straight line segments require lesser number of hardware’s to implement. The distance plot reveals that, the distance function can be best approximated using two straight lines segments as It is very interesting to note that the distance computation just requires only one adder and a shift register. This can be implemented using the combinational logic circuits and hence definitely faster. The error with this approach is to a maximum of 6.7%. A better distance function approximation, is attempted to make this as an acceptable solution, wherein the distance is expressed as 5. Technical specification 5.1 Software requirement:  Java  Apache tomcat server  My SQL  Eclipse: Eclipse is an open source community whose projects building tools and frameworks are used for creating general purpose application. The most popular usage of Eclipse is as a Java development environment.  Eclipse is an open source community, whose projects are focused on building an open development platform comprised of extensible frameworks, tools and runtimes for building, deploying and managing software across the lifecycle.  The independent not-for-profit corporation was created to allow a vendor neutral and open, transparent community to be established around Eclipse. Today, the Eclipse community consists of individuals and organizations from a cross section of the software industry.  The Eclipse Foundation is funded by annual dues from our members and governed by aboard. Strategic Developers and Strategic Consumers hold seats on this Board, as do representatives elected by Add-in
  • 5. Providers and Open Source committers. The Foundation employs a full-time professional staff to provide services to the community but does not employ the open source developers, called committers, which actually work on the Eclipse projects.  In general, the Eclipse Foundation provides four services to the Eclipse community: 1) IT Infrastructure, 2) IP Management, 3) Development Process, 4) Ecosystem Development. 5.2 Hardware requirement:  Server side System will be windows based supporting versions windows XP onwards.  The minimum configuration required on server platform.  2.4 GHZ, 80 GB HDD for installation  512 MB RAM.  PC  Network Cards  Android Phone  Two Cameras 5.3 Legal Requirements:  Static IP: To register Static IP (Rs. 2000-2500 p.a required)  Internet connection: Minimum speed 2-4 mbps. For internet connection any Internet Service Provider (ISP) like Airtel, Reliance, and BSNL Idea etc can be used. 6. Module Working in the Project. In the module working diagram there are different modules we are using in that everyone perform the specific work. On that basis they were going to send the result to another module and that will send the result to another module. Step 1: In the first stage of system authenticate user of the banking system login on the server and register their authentication. Step 2: Authenticate user now start both the cameras of the system and store the template in the file. This image is the part of sensitive area use as reference in the system. This system is completely responsible for alert procedure. Step 3: Now authenticate user start the system and our system start executing the module. In this module CCTV camera continuously send the footage to the alert module. Fig.5.4.1 Template Image store in database Step 4: When any intrusion is detected in the template image. It displays the alert message to the administrator. This message is also alert the nearest police station. When it blows the alarm system, it starts live steaming in the android cell phone. Fig.5.4.2 Introsion detected show the message Fig.5.4.3 Alert system get activated Step 5: Live streaming display on the android system, respective action should be taken.
  • 6. 7. Project Estimation:- Sr. no Item Name Description Quantity cost 1. laptop Intel core i3 processor,3GB RAM,380 GB Hard drive 2 55,000 2 Camera CCTV camera 2 5000 3 Others Documentation, Internet charges etc. ___ 1500 Total=Rs.61,500 7.1 Advantage:- 1. It consumes less memory. 2. Unnecessary video cannot be recorded. 3. We can take the action during the attack. 4. Admin can see live streaming and take action. 7.2 Disadvantages:- 1. It completely based on video surveillance, so if any interrupt happen then it may affect the system. 2. Alarm system is very sensitive, continuous observation is requiring. 3. Live streaming apps always in the Wi-Fi area. 7.3 Applications of Project 1. This project will prevent the attack by taking appropriate action. 2. Admin can see live streaming of attack. 3. It will save computer memory. 4. It will save time during analysis of recorded video. 7.4 Maintenance:- For providing maintenance of application following decision are taken. 1. We have to provide maintenance to this project in every week or one day gap. 2. Provide the maintenance to Web Service within a month. 3. Database of this project should maintain with time. 8. Conclusion: Smart surveillance systems significantly contribute to situation awareness. Such systems transform video surveillance from data acquisition tool to information and intelligence acquisition systems. Real-time video analysis provides smart surveillance systems with the ability to react in real-time. Our system senses the intrusion and sends notifications to authorized persons so that action can be taken in response to the intrusion. Thus this security system will help us to:  Save memory  Save time  Take immediate action during attack not after the attack is done. So we will use it where we require security. This project describes Security system for banks. It is very suitable for remote monitoring of confidential area. Without using motion sensors webcam will record live video whenever there is an intrusion in the room. 9. Acknowledgement: It is our privilege to express our sincerest and deepest regards to our project guide Prof. Vinod S. Wadne head of Department of Computers for encouraging and allowing us to present the project on “SMART SECURITY SYSTEM FOR SENSITIVE AREA BY USING IMAGE PROCESSING” at our department premises for the partial fulfillment of the requirements leading to the award of BE degree in Computer Engineering. 10. References: [1] Blanz and Vetter, Face recognition based on fitting 3D morphable model, IEEE PAMI, vol. 25, no. 9, pp. 1063-1074, Sept. 2003. [2] R.Collins et al A system for video surveillance and monitoring, VSAM Final Report, Carnegie Mellon Univ., Pittsburgh, PA, Tech. Rep. CMU-RI-TR-00- 12, May 2000. [3] Combat Zones That See, U.S. Government DARPA Project.M.W. Green, The appropriate and effective use of security technologies in U.S.schools, A guide for schools and law enforcement agencies, Sandia National [4] Laboratories,Albuquerque,NM, NCJ 178265, Sep. 1999.M. Greiffenhagen, D. Comaniciu, H. Niemann, and V. Ramesh, Design, analysisand engineering of video monitoring systems: An approach and case study, Proc.IEEE, vol. 89, no. 10, pp. 1498-1517. [5] Hampapur,S. Pankanti, A.W. Senior, Y-L. Tian, L. Brown, and R. Bolle, Face cataloger: Multi-scale imaging for relating identity to location, in Proc. IEEE Conf. Advanced Video and Signal