SlideShare a Scribd company logo
1 of 14
HOME SECURITY SYSTEM
Team Members:
Deepthi lakshitha S
Sumithra J M
Avanthika Y
Introduction
● Closed-circuit television video surveillance (CCTV) has become more
prevalent as a result of technological advancements and the ever-increasing
need for security.
● The introduction of Artificial Intelligence continually increases sophistication
to technologies that simplify contemporary living standards and relatively, it
also has been found to play a rather important role in security and security-
based systems.
● The video surveillance market is also further expected to grow at an annual rate
of more than 10% through 2026 according to a survey.
● In accordance with this, the project proposes the development of a security
system that incorporates suspicious person detection using web cameras.
Abstract
● Thus, the proposed system, on the whole, is mainly developed with the
objective of being a security & precautionary measure to deter crimes.
● Through the home security system, any person who is captured within the
video frame is detected and recognised familiar or unfamiliar.
● If the person is unfamiliar and they are found to be present for a specific period
of time that is considered suspicious, then they are treated as a threat.
● An email alert is then sent to the resident/client who is logged in with the
system, along with the intruder’s image.
Related works
● Several contributions have been made over the years regarding security and
the most common improvisation using a surveillance camera was the
addition of an alert system.
● And this alert is sent in numerous ways: an SMS message, WhatsApp
message or an immediate call to quickly alert the owner.
● Another system has been suggested where the precise location of the
abnormality is identified and highlighted. The system transmits these images
over IOT to enable users to observe it online.
• The project involves incorporating the concept of deep learning.
• This section can be illustrated mainly as below, initially with the algorithm
behind the training model.
• In this project model CNN is used for implementation.
• Convolutional neural networks have advanced, and as a result of their improved
performance in competitions, they have become the subject of research.
• A Convolutional neural network (CNN)is a type of artificial neural network that
has one or more convolution layers and are used mainly for image processing,
classification, segmentation and also for other auto correlated data.
Methodology
• The benefit of using CNNs is their ability to develop an internal representation
of a two- dimensional image. This allows the model to learn position and scale
of faces in an image. After train the CNN it can able to recognize face in an
image One can effectively use Convolutional Neural Network for Image data.
Feature Learning, Layers, and Classification
• A CNN is composed of an input layer, an output layer, and many hidden layers in
between.These layers perform operations that alter the data with the intent of
learning features specific to the data. Three of the most common layers are :
• Convolution
• Rectified linear unit (ReLU)
• Pooling
● Alexnet has 8 layers. The first 5 are convolutional and the last 3 are fully
connected layers. In between we also have some ‘layers’ called pooling and
activation.
● AlexNet is an incredibly powerful model capable of achieving high accuracies on
very challenging datasets.
Image Capturing
● When the user is not authorized, then the image will be captured and sent to the
owner through a mail. The owner can view the image from the database.
● The owner can either register the detected person for verification or deny and
declare as unauthorized .
Proposed Implementation
● The proposed study implements a
simple interface to add users
● An alert will be sent to the owner
about the stalker along with their
image for the resident/user to follow
any precautionary measures.
● The training and testing data set is categorized of which the training data
constitutes 70% while the rest aggregates to a total of 30%.
● Further, a CNN model is developed with the essential layers and the training data
is fed to make predictions.
● The convolutional and downsampled layers of CNN are constructed by using the
convolution function and downsampling function in opencv to process the
pictures.
● One of the architecture used in CNN model is AlexNet architecture.
Detection of familiar face Detection of unknown face Storing unknown face with time
Experimental Results
Code Snippet
Conclusion
• In this paper, we have proposed a home security system using CNN and opencv.
• Due to CNN’s capacity to spot patterns in images, a convolutional neural network
(CNN) is a type of artificial neural network that is mostly used for image
recognition and processing. The security system accurately recognizes the
authorized user i.e the resident from the given data by using CNN.
• The main focus of our project is to detect unauthorized individuals i.e the stalkers
around the house and to alert the user or resident through a mail.
Future Scope
• Our future work is concentrated on building our system with frequency detection
of the unidentified person, that is to notify the user about the frequency or number
of visits of the unauthorized individual in the camera.
• And to further add an alarm to alert the user in case of theft, robbery and the
stalker’s movement are at night time.The user is notified of the potential danger.
THANK YOU

More Related Content

Similar to smarthome

NMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptxNMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptx
LEGENDARYTECHNICAL
 
NMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptxNMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptx
LEGENDARYTECHNICAL
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
Gopi Naidu
 

Similar to smarthome (20)

DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
NMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptxNMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptx
 
Object Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNNObject Detection and Localization for Visually Impaired People using CNN
Object Detection and Localization for Visually Impaired People using CNN
 
IRJET- Fire Detector using Deep Neural Network
IRJET-  	  Fire Detector using Deep Neural NetworkIRJET-  	  Fire Detector using Deep Neural Network
IRJET- Fire Detector using Deep Neural Network
 
NMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptxNMO IE-2 Activity Presentation.pptx
NMO IE-2 Activity Presentation.pptx
 
IRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document SharingIRJET- DocLock Application for Secure Document Sharing
IRJET- DocLock Application for Secure Document Sharing
 
YOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection SystemYOLOv4: A Face Mask Detection System
YOLOv4: A Face Mask Detection System
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Blood Cell Image Classification for Detecting Malaria using CNN
Blood Cell Image Classification for Detecting Malaria using CNNBlood Cell Image Classification for Detecting Malaria using CNN
Blood Cell Image Classification for Detecting Malaria using CNN
 
Crime Detection using Machine Learning
Crime Detection using Machine LearningCrime Detection using Machine Learning
Crime Detection using Machine Learning
 
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A PrimerMDEC Data Matters Series: machine learning and Deep Learning, A Primer
MDEC Data Matters Series: machine learning and Deep Learning, A Primer
 
Emotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.pptEmotion recognition and drowsiness detection using python.ppt
Emotion recognition and drowsiness detection using python.ppt
 
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...IRJET-  	  A Vision based Hand Gesture Recognition System using Convolutional...
IRJET- A Vision based Hand Gesture Recognition System using Convolutional...
 
IRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using YoloIRJET- Smart Traffic Control System using Yolo
IRJET- Smart Traffic Control System using Yolo
 
Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...Detecting anomalies in security cameras with 3D-convolutional neural network ...
Detecting anomalies in security cameras with 3D-convolutional neural network ...
 
Psdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visualPsdot 7 change detection algorithm for visual
Psdot 7 change detection algorithm for visual
 
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PIDETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
 
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PIDETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
DETECTION OF DIFFERENT TYPES OF SKIN DISEASES USING RASPBERRY PI
 
Object and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually ImpairedObject and Currency Detection for the Visually Impaired
Object and Currency Detection for the Visually Impaired
 
Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...Home automation in client server using NodeMcu approach along with user notif...
Home automation in client server using NodeMcu approach along with user notif...
 

More from janani603976 (12)

Security.pptx
Security.pptxSecurity.pptx
Security.pptx
 
Research.pptx
Research.pptxResearch.pptx
Research.pptx
 
Research PPT.pptx
Research PPT.pptxResearch PPT.pptx
Research PPT.pptx
 
EC8552_CAO_unit-2_S06.pptx
EC8552_CAO_unit-2_S06.pptxEC8552_CAO_unit-2_S06.pptx
EC8552_CAO_unit-2_S06.pptx
 
Unit 3.pptx
Unit 3.pptxUnit 3.pptx
Unit 3.pptx
 
Team1.pptx
Team1.pptxTeam1.pptx
Team1.pptx
 
Unit II.pptx
Unit II.pptxUnit II.pptx
Unit II.pptx
 
UNIT 5 (2).pptx
UNIT 5 (2).pptxUNIT 5 (2).pptx
UNIT 5 (2).pptx
 
agile.ppt
agile.pptagile.ppt
agile.ppt
 
EVS CHAPTER-1.pptx
EVS CHAPTER-1.pptxEVS CHAPTER-1.pptx
EVS CHAPTER-1.pptx
 
Team 5.pptx
Team 5.pptxTeam 5.pptx
Team 5.pptx
 
chapter 1 -Basic Structure of Computers.pptx
chapter 1 -Basic Structure of Computers.pptxchapter 1 -Basic Structure of Computers.pptx
chapter 1 -Basic Structure of Computers.pptx
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 

smarthome

  • 1. HOME SECURITY SYSTEM Team Members: Deepthi lakshitha S Sumithra J M Avanthika Y
  • 2. Introduction ● Closed-circuit television video surveillance (CCTV) has become more prevalent as a result of technological advancements and the ever-increasing need for security. ● The introduction of Artificial Intelligence continually increases sophistication to technologies that simplify contemporary living standards and relatively, it also has been found to play a rather important role in security and security- based systems. ● The video surveillance market is also further expected to grow at an annual rate of more than 10% through 2026 according to a survey. ● In accordance with this, the project proposes the development of a security system that incorporates suspicious person detection using web cameras.
  • 3. Abstract ● Thus, the proposed system, on the whole, is mainly developed with the objective of being a security & precautionary measure to deter crimes. ● Through the home security system, any person who is captured within the video frame is detected and recognised familiar or unfamiliar. ● If the person is unfamiliar and they are found to be present for a specific period of time that is considered suspicious, then they are treated as a threat. ● An email alert is then sent to the resident/client who is logged in with the system, along with the intruder’s image.
  • 4. Related works ● Several contributions have been made over the years regarding security and the most common improvisation using a surveillance camera was the addition of an alert system. ● And this alert is sent in numerous ways: an SMS message, WhatsApp message or an immediate call to quickly alert the owner. ● Another system has been suggested where the precise location of the abnormality is identified and highlighted. The system transmits these images over IOT to enable users to observe it online.
  • 5. • The project involves incorporating the concept of deep learning. • This section can be illustrated mainly as below, initially with the algorithm behind the training model. • In this project model CNN is used for implementation. • Convolutional neural networks have advanced, and as a result of their improved performance in competitions, they have become the subject of research. • A Convolutional neural network (CNN)is a type of artificial neural network that has one or more convolution layers and are used mainly for image processing, classification, segmentation and also for other auto correlated data. Methodology
  • 6. • The benefit of using CNNs is their ability to develop an internal representation of a two- dimensional image. This allows the model to learn position and scale of faces in an image. After train the CNN it can able to recognize face in an image One can effectively use Convolutional Neural Network for Image data. Feature Learning, Layers, and Classification • A CNN is composed of an input layer, an output layer, and many hidden layers in between.These layers perform operations that alter the data with the intent of learning features specific to the data. Three of the most common layers are : • Convolution • Rectified linear unit (ReLU) • Pooling
  • 7. ● Alexnet has 8 layers. The first 5 are convolutional and the last 3 are fully connected layers. In between we also have some ‘layers’ called pooling and activation. ● AlexNet is an incredibly powerful model capable of achieving high accuracies on very challenging datasets. Image Capturing ● When the user is not authorized, then the image will be captured and sent to the owner through a mail. The owner can view the image from the database. ● The owner can either register the detected person for verification or deny and declare as unauthorized .
  • 8. Proposed Implementation ● The proposed study implements a simple interface to add users ● An alert will be sent to the owner about the stalker along with their image for the resident/user to follow any precautionary measures.
  • 9. ● The training and testing data set is categorized of which the training data constitutes 70% while the rest aggregates to a total of 30%. ● Further, a CNN model is developed with the essential layers and the training data is fed to make predictions. ● The convolutional and downsampled layers of CNN are constructed by using the convolution function and downsampling function in opencv to process the pictures. ● One of the architecture used in CNN model is AlexNet architecture.
  • 10. Detection of familiar face Detection of unknown face Storing unknown face with time Experimental Results
  • 12. Conclusion • In this paper, we have proposed a home security system using CNN and opencv. • Due to CNN’s capacity to spot patterns in images, a convolutional neural network (CNN) is a type of artificial neural network that is mostly used for image recognition and processing. The security system accurately recognizes the authorized user i.e the resident from the given data by using CNN. • The main focus of our project is to detect unauthorized individuals i.e the stalkers around the house and to alert the user or resident through a mail.
  • 13. Future Scope • Our future work is concentrated on building our system with frequency detection of the unidentified person, that is to notify the user about the frequency or number of visits of the unauthorized individual in the camera. • And to further add an alarm to alert the user in case of theft, robbery and the stalker’s movement are at night time.The user is notified of the potential danger.