SlideShare a Scribd company logo
ARTIFICIAL
INTELLIGENCE IN
CCTV SURVEILLANCE
HARIPRASAD MENSE 2MM20CS011
JAY SHAPURKAR 2MM20CS014
RAMA GAWDE 2MM20CS031
SHREEDHAR JAGTAP 2MM20CS036
UNDER THE GUIDANCE OF
PROF. MAHESH M
CONTENTS
 INTRODUCTION
 LITERATURE SURVEY
 EXISTING SYSTEM
 PROPOSED SYSTEM
 ARCHITECTURE
 PROJECT PIPELINE
 SYSTEM REQUIREMENTS
 PROJECT FUNCTIONALITY
 RESULTS
 CONCLUSION
INTRODUCTION
AI integration with CCTV security involves the use of machine learning algorithms to enhance the
capabilities of traditional CCTV systems. AI algorithms can detect and track objects, recognize faces,
and analyze human behavior in real-time, allowing for the identification of potential security threats.
The intersection of artificial intelligence (AI) with Closed-Circuit Television (CCTV) marks a
transformative leap in the realm of surveillance and security. As technology progresses, the integration
of AI algorithms into traditional CCTV systems elevates their capabilities to unprecedented levels.
LITERATURE SURVEY
Much research has been done in the development of this AI-based intelligent surveillance system
and some of this literature is reviewed in this section. Examples of surveillance systems previously
studied or developed to have intelligent or automation capabilities: VSAM (Abbreviated as video
surveillance and monitoring), PRISMATICA (Abbreviated as proactive integrated systems for security
management through institutional technological support and communication). AI based smart and
intelligent surveillance system solves all the problems inherent in video surveillance. It uses computer
vision and sensors to detect what is happening and what should be done about it. All this happens in
real time and saves money. Detect, prevent and report intruders when they are imminent.
EXISTING SYSTEM
The existing system for Closed-Circuit Television (CCTV) typically involves traditional surveillance
methods where cameras capture video footage, which is then stored or monitored in real-time by human
operators. These systems may have limited capabilities for automated analysis, and the focus is primarily
on recording and manual review of footage. Here are key characteristics of the existing CCTV systems:
Human Monitoring:
Human operators are responsible for monitoring live feeds or reviewing recorded footage to identify
security incidents or events.
Limited Intelligence:
The existing systems may lack advanced intelligence features such as real-time object detection,
facial recognition, or behaviour analysis.
Manual Investigation:
Investigations of security incidents often involve manual review of recorded footage, which can
be time-consuming and less efficient.
Privacy and Ethics:
Privacy concerns related to continuous monitoring and recording, as well as potential misuse
of footage, are significant considerations in the existing systems.
Scalability Challenges:
Expanding or upgrading the existing system to accommodate a growing number of cameras or
evolving security needs may present challenges.
Data Storage Concerns:
Storing and managing large volumes of video data can be resource-intensive, and retrieval for
specific events may not be as efficient.
PROPOSED SYSTEM
AI integration with Closed-Circuit Television (CCTV) aims to overcome the limitations of traditional
surveillance methods by leveraging advanced artificial intelligence technologies. Here are key features
and improvements in a proposed AI-enhanced CCTV system:
Real-Time Object Detection:
Implement AI algorithms for real-time object detection to identify and track specific entities, such as
people, vehicles, or objects of interest.
Predictive Analytics:
Implement predictive analytics using AI algorithms to identify patterns and trends, enabling proactive
security measures and threat prevention.
Automated Alerts and Notifications:
Enable the system to generate real-time alerts and notifications for security personnel based on AI
analysis, facilitating quick responses to potential incidents.
Detect Patterns
Perceive
Environment
Update,
Understand and
Decide
HOW AI CCTV WORKS
ARCHITECTURE
1. Data acquisition
2. Data processing
3. Training the model
4. Measure performance matrix
5. Testing the model
6. Deployment
PROJECT PIPELINE
FLOWCHART
SYSTEM REQUIREMENTS
 Software Requirements :
1. Arduino IDE
2. DL/ML algorithms with Jupyter Notebook IDE
 Hardware Requirements :
1. Arduino / RasberryPi
2. High end camera
3. GSM module
4. Storage system
 Modle Used :
1. CNN+LSTM (Covlstm)
1. Accident detection and performing action
2. Robbery detection
3. Real world anamolies detection like fire(burning houses,shops..etc)
PROJECT GOAL/FUNCTIONALITY
RESULTS
The system detecting the fire and sending alert to the receiver
The system detecting the motion of the people
Analysing the positions of the equipment for detecting the robbery.
CONCLUSION
The proposed system not only augments security measures but also acknowledges the importance
of ethical considerations, privacy protection, and regulatory compliance. As technology continues to
evolve, the integration of AI with CCTV systems promises to redefine the landscape of security,
providing a sophisticated and intelligent approach to safeguarding environments in an increasingly
interconnected world.
THANK YOU

More Related Content

Similar to Artificial_intelligence_in_cctv_survelliance FINAL.pptx

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
 
SIIC Hackathon
SIIC HackathonSIIC Hackathon
SIIC Hackathon
Vaishnavi Selvam
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
Vikki Choudhry
 
Forest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttogForest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttog
DhanuDhanu42
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Sabhanayagham Thirugnanasambandam
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
Akshay Surve
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IRJET Journal
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
IRJET Journal
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
shikhaohhpro
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
Puneet soni
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
IRJET Journal
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
IRJET Journal
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET Journal
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
IRJET Journal
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
IRJET Journal
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
 
Artificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillanceArtificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillance
HIGHMARK SECURITY
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
IRJET Journal
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
ijtsrd
 

Similar to Artificial_intelligence_in_cctv_survelliance FINAL.pptx (20)

Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
SIIC Hackathon
SIIC HackathonSIIC Hackathon
SIIC Hackathon
 
AI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdfAI Based Image Analysis & Analytics Solution-.pdf
AI Based Image Analysis & Analytics Solution-.pdf
 
Forest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttogForest PPT New.pptxsaftery of projecttog
Forest PPT New.pptxsaftery of projecttog
 
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdfTop 16 Applications of Computer Vision in Video Surveillance and Security.pdf
Top 16 Applications of Computer Vision in Video Surveillance and Security.pdf
 
Motion based security alarm
Motion based security alarmMotion based security alarm
Motion based security alarm
 
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
IMPLEMENTATION OF IDS (INTRUDER DETECTION SYSTEM)
 
Advance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCVAdvance Intelligent Video Surveillance System Using OpenCV
Advance Intelligent Video Surveillance System Using OpenCV
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
ATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural NetworksATM Security System Based on the Video Surveillance Using Neural Networks
ATM Security System Based on the Video Surveillance Using Neural Networks
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...IRJET -  	  Real-Time Analysis of Video Surveillance using Machine Learning a...
IRJET - Real-Time Analysis of Video Surveillance using Machine Learning a...
 
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCVAdvanced Intelligent Video Surveillance System In Elevators By Using OpenCV
Advanced Intelligent Video Surveillance System In Elevators By Using OpenCV
 
Voice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance SystemVoice Assistance Based Remote Surveillance System
Voice Assistance Based Remote Surveillance System
 
590 599
590 599590 599
590 599
 
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert ManagementIRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
 
Artificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillanceArtificial intelligence for cctv cameras, video surveillance
Artificial intelligence for cctv cameras, video surveillance
 
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEODEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
DEEP LEARNING APPROACH FOR SUSPICIOUS ACTIVITY DETECTION FROM SURVEILLANCE VIDEO
 
Video Crime Monitoring
Video Crime MonitoringVideo Crime Monitoring
Video Crime Monitoring
 

More from hariprasad279825

MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptxMARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
hariprasad279825
 
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptx
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptxArtificial_intelligence_in_cctv_survelliance FINAL-1.pptx
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptx
hariprasad279825
 
It gives what an engineer needs to do after getting into engineering.pptx
It gives what an engineer needs to do after getting into engineering.pptxIt gives what an engineer needs to do after getting into engineering.pptx
It gives what an engineer needs to do after getting into engineering.pptx
hariprasad279825
 
Various types of Pumps in mechanical engineering.pptx
Various types of Pumps in mechanical engineering.pptxVarious types of Pumps in mechanical engineering.pptx
Various types of Pumps in mechanical engineering.pptx
hariprasad279825
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptx
hariprasad279825
 

More from hariprasad279825 (8)

MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptxMARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
MARATHA MANDAL ENGINEERING COLLEGE,BELAGAVI.pptx
 
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptx
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptxArtificial_intelligence_in_cctv_survelliance FINAL-1.pptx
Artificial_intelligence_in_cctv_survelliance FINAL-1.pptx
 
finalppt ...
finalppt                                                                     ...finalppt                                                                     ...
finalppt ...
 
OS_module2. .pptx
OS_module2.                          .pptxOS_module2.                          .pptx
OS_module2. .pptx
 
WEATHER APP PPT.pptx
WEATHER APP                           PPT.pptxWEATHER APP                           PPT.pptx
WEATHER APP PPT.pptx
 
It gives what an engineer needs to do after getting into engineering.pptx
It gives what an engineer needs to do after getting into engineering.pptxIt gives what an engineer needs to do after getting into engineering.pptx
It gives what an engineer needs to do after getting into engineering.pptx
 
Various types of Pumps in mechanical engineering.pptx
Various types of Pumps in mechanical engineering.pptxVarious types of Pumps in mechanical engineering.pptx
Various types of Pumps in mechanical engineering.pptx
 
Module 3- transport_layer .pptx
Module 3- transport_layer           .pptxModule 3- transport_layer           .pptx
Module 3- transport_layer .pptx
 

Recently uploaded

Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
eCommerce Institute
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 

Recently uploaded (16)

Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024María Carolina Martínez - eCommerce Day Colombia 2024
María Carolina Martínez - eCommerce Day Colombia 2024
 
International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 

Artificial_intelligence_in_cctv_survelliance FINAL.pptx

  • 1. ARTIFICIAL INTELLIGENCE IN CCTV SURVEILLANCE HARIPRASAD MENSE 2MM20CS011 JAY SHAPURKAR 2MM20CS014 RAMA GAWDE 2MM20CS031 SHREEDHAR JAGTAP 2MM20CS036 UNDER THE GUIDANCE OF PROF. MAHESH M
  • 2. CONTENTS  INTRODUCTION  LITERATURE SURVEY  EXISTING SYSTEM  PROPOSED SYSTEM  ARCHITECTURE  PROJECT PIPELINE  SYSTEM REQUIREMENTS  PROJECT FUNCTIONALITY  RESULTS  CONCLUSION
  • 3. INTRODUCTION AI integration with CCTV security involves the use of machine learning algorithms to enhance the capabilities of traditional CCTV systems. AI algorithms can detect and track objects, recognize faces, and analyze human behavior in real-time, allowing for the identification of potential security threats. The intersection of artificial intelligence (AI) with Closed-Circuit Television (CCTV) marks a transformative leap in the realm of surveillance and security. As technology progresses, the integration of AI algorithms into traditional CCTV systems elevates their capabilities to unprecedented levels.
  • 4. LITERATURE SURVEY Much research has been done in the development of this AI-based intelligent surveillance system and some of this literature is reviewed in this section. Examples of surveillance systems previously studied or developed to have intelligent or automation capabilities: VSAM (Abbreviated as video surveillance and monitoring), PRISMATICA (Abbreviated as proactive integrated systems for security management through institutional technological support and communication). AI based smart and intelligent surveillance system solves all the problems inherent in video surveillance. It uses computer vision and sensors to detect what is happening and what should be done about it. All this happens in real time and saves money. Detect, prevent and report intruders when they are imminent.
  • 5. EXISTING SYSTEM The existing system for Closed-Circuit Television (CCTV) typically involves traditional surveillance methods where cameras capture video footage, which is then stored or monitored in real-time by human operators. These systems may have limited capabilities for automated analysis, and the focus is primarily on recording and manual review of footage. Here are key characteristics of the existing CCTV systems: Human Monitoring: Human operators are responsible for monitoring live feeds or reviewing recorded footage to identify security incidents or events. Limited Intelligence: The existing systems may lack advanced intelligence features such as real-time object detection, facial recognition, or behaviour analysis.
  • 6. Manual Investigation: Investigations of security incidents often involve manual review of recorded footage, which can be time-consuming and less efficient. Privacy and Ethics: Privacy concerns related to continuous monitoring and recording, as well as potential misuse of footage, are significant considerations in the existing systems. Scalability Challenges: Expanding or upgrading the existing system to accommodate a growing number of cameras or evolving security needs may present challenges. Data Storage Concerns: Storing and managing large volumes of video data can be resource-intensive, and retrieval for specific events may not be as efficient.
  • 7. PROPOSED SYSTEM AI integration with Closed-Circuit Television (CCTV) aims to overcome the limitations of traditional surveillance methods by leveraging advanced artificial intelligence technologies. Here are key features and improvements in a proposed AI-enhanced CCTV system: Real-Time Object Detection: Implement AI algorithms for real-time object detection to identify and track specific entities, such as people, vehicles, or objects of interest. Predictive Analytics: Implement predictive analytics using AI algorithms to identify patterns and trends, enabling proactive security measures and threat prevention. Automated Alerts and Notifications: Enable the system to generate real-time alerts and notifications for security personnel based on AI analysis, facilitating quick responses to potential incidents.
  • 10. 1. Data acquisition 2. Data processing 3. Training the model 4. Measure performance matrix 5. Testing the model 6. Deployment PROJECT PIPELINE
  • 12. SYSTEM REQUIREMENTS  Software Requirements : 1. Arduino IDE 2. DL/ML algorithms with Jupyter Notebook IDE  Hardware Requirements : 1. Arduino / RasberryPi 2. High end camera 3. GSM module 4. Storage system  Modle Used : 1. CNN+LSTM (Covlstm)
  • 13. 1. Accident detection and performing action 2. Robbery detection 3. Real world anamolies detection like fire(burning houses,shops..etc) PROJECT GOAL/FUNCTIONALITY
  • 14. RESULTS The system detecting the fire and sending alert to the receiver
  • 15. The system detecting the motion of the people
  • 16. Analysing the positions of the equipment for detecting the robbery.
  • 17. CONCLUSION The proposed system not only augments security measures but also acknowledges the importance of ethical considerations, privacy protection, and regulatory compliance. As technology continues to evolve, the integration of AI with CCTV systems promises to redefine the landscape of security, providing a sophisticated and intelligent approach to safeguarding environments in an increasingly interconnected world.