SlideShare a Scribd company logo
1 of 19
INTELLIGENT
SURVEILLANCE
SYSTEM
Presented by
Abin T John
Agil Mathews
Objective
 Intelligent surveillance system has received growing attention
due to the increasing demand on security and safety.
 The intelligent surveillance system is capable of recognizing
faces in real time.
 The recent developments in sensor devices, computer vision,
and machine learning have an important role in enabling such
intelligent system.
 Intelligent surveillance system will automatically recognize
faces and track it on live video streams from surveillance
cameras in public or commercial places.
Introduction
 Intelligent surveillance system is envisioned to
automatically monitor the environment or
infrastructure with less or without human
intervention.
 Such monitoring tasks include automatically
detecting and tracking people and performing
further analysis and actions.
 Signal processing, image processing, and artificial
intelligence (machine learning) techniques play
important role to develop such intelligent system.
Existing systems
 Visible camera such as CCTV is the most
common modalities (device) for surveillance
system.
 It has long been in use to monitor
environments, people, events and activities.
 Extensive analysis is required for studing the
visual data which is time intensive and
requires a lot of human effort.
 It is an extremely inefficient process.
Functional Block Diagram
Start
Admin Login
New
User?
Add user
Start surveillance
Need to
play
playback?
Playback
Search in database Facebase
Display
result
Close
Methodology
Advantages
 It requires less amount of time to analysis the footages.
 It is not labor intensive.
 It is cost efficient.
 Easy to process large visual data’s.
Disadvantages
 Accuracy of algorithm
 Accuracy of face recognition during night
Results
GUI
 Login page
• Add user
• Index page
• Start
• Playback
• Search
Future Works Possible
 Number plate recognition along with face recognition to track
vehicles.
 Targeted advertisement .
 Robust object detection to track objects in the environment.
 More robust algorithm for better recognition.
GitHub Link
 Use the link to the project files
https://github.com/abiz95/intelligent_surveillance_system
Reference
 Robert T CollinsFFet al. A system for video Surveillance and
Monitoring. Technical Report CMU-Rl-TR-00-12,Carnegie Mellon
University , 2006.
 Mekenna T. Video surveillance and human activity recognition for anti-
terrorism and force protection[J]. Proceedings of IEEE Conference on
Advanced Video and Signal Based Surveillance, 2003(6):22-23.
 Crow Franklin, "Summed-area tables for texture mapping”, in
Proceedings of SIGGRAPH, Conference on Computer Graphics and
Interactive Techniques, Volume 18, No. 3, ISBN: 0-89791-138-5, pp. 207-
212, July 1984.
 Paul Viola, Michael Jones, „Rapid object detection using a boosted
cascade of simple features”, Computer Vision and Pattern Recognition,
Proceedings of the 2001 IEEE Computer Society Conference on, vol.1, pp.
I-511- I-518, 2001.
 DD Nguyen and HS Le, "Kinect Gesture Recognition: SVM vs. RVM,"
2015 Seventh International Conference on Knowledge and Systems
Engineering (KSE), Ho Chi Minh City, 2015, pp. 395-400
Reference
 Ruiquan Ge , Zhenfang Shan, Hao Kou et.al: ‘An Intelligent
Surveilance system based on motion detection’ Department of Express
and Logistics, Shijiazhuang Posts and Telecommunications Technical
College, Shijiazhuang 050021.
 Y. M. Mustafah, T. Shan, A. W. Azman, A. Bigdeli, B. C. et.al: ‘Real time
face detection and Tracking for higher resolution Smart camera system’
NICTA Ltd, 300 Adelaide Street, Brisbane, QLD 4000, Australia b ITEE,
university of Queensland, Brisbane, QLD 4072, Australia
 Yao-Jiunn Chen, Yen-Chun Lin, „Simple Face-detection Algorithm
based on Minimum Facial Features”, Industrial Electronics Society,
IECON 2007, 33rd Annual Conference of the IEEE, pp. 455-460,
November 2007.
 Petre Anghelescu, Ionut Serbanescu, Silviu Ionita et.al: ‘Surveillance
system using IP camera and Face Detection algorithm’, Department of
Electronics, Communications and Computers,University of Pitesti Pitesti,
Romania, VOL.19,
 P Viola and MJ Jones, “Robust Real Time Face Detection”, International
Journal of Computer Vision, Vol. 57, No. 2, 2004, pp.137-154
Thank You

More Related Content

What's hot

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video SurveillanceMihika Shah
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
eyegaze communication system
eyegaze communication system eyegaze communication system
eyegaze communication system Manasa Reddy
 
Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Universitat Politècnica de Catalunya
 
Machine Learning
Machine LearningMachine Learning
Machine LearningRahul Kumar
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithmsBadiginchala Manohari
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes TechnologyColloquium
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt shivam chaddha
 
Eye gaze technology
Eye gaze technologyEye gaze technology
Eye gaze technologyKetan Hulaji
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Mobile security
Mobile securityMobile security
Mobile securityMphasis
 
Surveillance camera control system
Surveillance camera control systemSurveillance camera control system
Surveillance camera control systemkvinitha
 
Eyetracking
EyetrackingEyetracking
EyetrackingMD Shafe
 

What's hot (20)

Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Video Surveillance
Video SurveillanceVideo Surveillance
Video Surveillance
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
eyegaze communication system
eyegaze communication system eyegaze communication system
eyegaze communication system
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
 
Blue eyes technology
Blue eyes technologyBlue eyes technology
Blue eyes technology
 
Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...Learn2Sign : Sign language recognition and translation using human keypoint e...
Learn2Sign : Sign language recognition and translation using human keypoint e...
 
Machine Learning
Machine LearningMachine Learning
Machine Learning
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
Blue Eyes Technology
Blue Eyes TechnologyBlue Eyes Technology
Blue Eyes Technology
 
Brain chips seminar ppt
Brain chips seminar ppt Brain chips seminar ppt
Brain chips seminar ppt
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Eye gaze technology
Eye gaze technologyEye gaze technology
Eye gaze technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Mobile security
Mobile securityMobile security
Mobile security
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Surveillance camera control system
Surveillance camera control systemSurveillance camera control system
Surveillance camera control system
 
Eyetracking
EyetrackingEyetracking
Eyetracking
 

Similar to Intelligent surveillance system

A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniquesijtsrd
 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine LearningIRJET Journal
 
Image Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemImage Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemCSCJournals
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEOIRJET Journal
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET Journal
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET Journal
 
ASI Intelligent CCTV article
ASI Intelligent CCTV articleASI Intelligent CCTV article
ASI Intelligent CCTV articleEugene Gerstein
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesTELKOMNIKA JOURNAL
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyIRJET Journal
 
Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesSai Srinivas Mittapalli
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingvivatechijri
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET Journal
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity RecognitionIRJET Journal
 
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...IAESIJAI
 
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...IAEME Publication
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...ijseajournal
 
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET Journal
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET Journal
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 

Similar to Intelligent surveillance system (20)

A Review on Motion Detection Techniques
A Review on Motion Detection TechniquesA Review on Motion Detection Techniques
A Review on Motion Detection Techniques
 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
 
Image Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security SystemImage Processing Based Detecting and Tracking for Security System
Image Processing Based Detecting and Tracking for Security System
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
IRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action RecognitionIRJET- A Survey on Human Action Recognition
IRJET- A Survey on Human Action Recognition
 
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
IRJET- Review on Human Action Detection in Stored Videos using Support Vector...
 
ASI Intelligent CCTV article
ASI Intelligent CCTV articleASI Intelligent CCTV article
ASI Intelligent CCTV article
 
Abnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenesAbnormal activity detection in surveillance video scenes
Abnormal activity detection in surveillance video scenes
 
Motion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- SurveyMotion Detection System for Security Using IoT- Survey
Motion Detection System for Security Using IoT- Survey
 
Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart cities
 
People Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzingPeople Monitoring and Mask Detection using Real-time video analyzing
People Monitoring and Mask Detection using Real-time video analyzing
 
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural NetworksIRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
IRJET- i-Surveillance Crime Monitoring and Prevention using Neural Networks
 
Human Activity Recognition
Human Activity RecognitionHuman Activity Recognition
Human Activity Recognition
 
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...Toddler monitoring system in vehicle using single shot detector-mobilenet and...
Toddler monitoring system in vehicle using single shot detector-mobilenet and...
 
Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...Human activity detection based on edge point movements and spatio temporal fe...
Human activity detection based on edge point movements and spatio temporal fe...
 
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
Pre-Processing Image Algorithm for Fingerprint Recognition and its Implementa...
 
SIIC Hackathon
SIIC HackathonSIIC Hackathon
SIIC Hackathon
 
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
IRJET - Creating a Security Alert for the Care Takers Implementing a Vast Dee...
 
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
IRJET - Using Convolutional Neural Network in Surveillance Videos for Recogni...
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Intelligent surveillance system

  • 2. Objective  Intelligent surveillance system has received growing attention due to the increasing demand on security and safety.  The intelligent surveillance system is capable of recognizing faces in real time.  The recent developments in sensor devices, computer vision, and machine learning have an important role in enabling such intelligent system.  Intelligent surveillance system will automatically recognize faces and track it on live video streams from surveillance cameras in public or commercial places.
  • 3. Introduction  Intelligent surveillance system is envisioned to automatically monitor the environment or infrastructure with less or without human intervention.  Such monitoring tasks include automatically detecting and tracking people and performing further analysis and actions.  Signal processing, image processing, and artificial intelligence (machine learning) techniques play important role to develop such intelligent system.
  • 4. Existing systems  Visible camera such as CCTV is the most common modalities (device) for surveillance system.  It has long been in use to monitor environments, people, events and activities.  Extensive analysis is required for studing the visual data which is time intensive and requires a lot of human effort.  It is an extremely inefficient process.
  • 6. Start Admin Login New User? Add user Start surveillance Need to play playback? Playback Search in database Facebase Display result Close Methodology
  • 7. Advantages  It requires less amount of time to analysis the footages.  It is not labor intensive.  It is cost efficient.  Easy to process large visual data’s.
  • 8. Disadvantages  Accuracy of algorithm  Accuracy of face recognition during night
  • 15. Future Works Possible  Number plate recognition along with face recognition to track vehicles.  Targeted advertisement .  Robust object detection to track objects in the environment.  More robust algorithm for better recognition.
  • 16. GitHub Link  Use the link to the project files https://github.com/abiz95/intelligent_surveillance_system
  • 17. Reference  Robert T CollinsFFet al. A system for video Surveillance and Monitoring. Technical Report CMU-Rl-TR-00-12,Carnegie Mellon University , 2006.  Mekenna T. Video surveillance and human activity recognition for anti- terrorism and force protection[J]. Proceedings of IEEE Conference on Advanced Video and Signal Based Surveillance, 2003(6):22-23.  Crow Franklin, "Summed-area tables for texture mapping”, in Proceedings of SIGGRAPH, Conference on Computer Graphics and Interactive Techniques, Volume 18, No. 3, ISBN: 0-89791-138-5, pp. 207- 212, July 1984.  Paul Viola, Michael Jones, „Rapid object detection using a boosted cascade of simple features”, Computer Vision and Pattern Recognition, Proceedings of the 2001 IEEE Computer Society Conference on, vol.1, pp. I-511- I-518, 2001.  DD Nguyen and HS Le, "Kinect Gesture Recognition: SVM vs. RVM," 2015 Seventh International Conference on Knowledge and Systems Engineering (KSE), Ho Chi Minh City, 2015, pp. 395-400
  • 18. Reference  Ruiquan Ge , Zhenfang Shan, Hao Kou et.al: ‘An Intelligent Surveilance system based on motion detection’ Department of Express and Logistics, Shijiazhuang Posts and Telecommunications Technical College, Shijiazhuang 050021.  Y. M. Mustafah, T. Shan, A. W. Azman, A. Bigdeli, B. C. et.al: ‘Real time face detection and Tracking for higher resolution Smart camera system’ NICTA Ltd, 300 Adelaide Street, Brisbane, QLD 4000, Australia b ITEE, university of Queensland, Brisbane, QLD 4072, Australia  Yao-Jiunn Chen, Yen-Chun Lin, „Simple Face-detection Algorithm based on Minimum Facial Features”, Industrial Electronics Society, IECON 2007, 33rd Annual Conference of the IEEE, pp. 455-460, November 2007.  Petre Anghelescu, Ionut Serbanescu, Silviu Ionita et.al: ‘Surveillance system using IP camera and Face Detection algorithm’, Department of Electronics, Communications and Computers,University of Pitesti Pitesti, Romania, VOL.19,  P Viola and MJ Jones, “Robust Real Time Face Detection”, International Journal of Computer Vision, Vol. 57, No. 2, 2004, pp.137-154