SlideShare a Scribd company logo
IP Camera Security System 
Dallan Byrne 
03381781 
4th Electronic and Computer Engineering 2007 
Supervisor: Fergal O’ Malley
Presentation Overview 
1 Project Description 
2 Technologies 
3 Software System Architecture 
4 System Implementation 
5 Conclusion
Project Description 
Create a Prototype of a Network 
Security System using IP Camera 
Technology 
 Designed for Irish home broadband user. 
 Alerts home owner to break-in by SMS. 
 Owner may view intruder faces and a live 
stream from the IP camera on a J2ME 
mobile application.
Project Description 
Functional Requirements: 
 IP Camera 
• Stream MJPEG. 
• Motion Detection Alert. 
 Server: 
• Image Processing: Face Detection/Recognition. 
• SMS & E-mail Alert. 
 Phone 
• View Intruder/Recognised Faces 
• View MJPEG Stream
Project Description
Technologies 
Communication 
Technologies 
 TCP/IP 
 HTTP Protocol 
 GPRS 
IP Camera 
Technology 
 Web Server 
• Standalone 
 Motion Detection 
Axis 207W 
© Axis Corporation 2006
Technologies 
Software Technologies 
 J2SE/J2EE 
• Servlets 
• J2SE Sockets 
 Image Processing 
• Face Detection: OpenCV 
• Eigenfaces Recognition Technique 
 J2ME 
• MIDlets 
• Sockets
Software System Architecture 
Server 
 Save Images 
 SMS & Email Alert 
 Image Processing 
 Socket Server 
Mobile Device 
 Socket Client 
 Stream MJPEG
Software System Architecture 
User Interface 
• System GUI 
• Saves Images 
• System Settings 
• Viewing MJPEG 
Servlet 
• Tomcat Container 
• Invoked by Camera 
• Image Processing 
• Socket Server 
Server
System Implementation 
User Interface 
 Saves JPEG’s to 
Server Memory 
 User may: 
• Edit and save camera, 
e-mail and SMS 
settings. 
• View MJPEG from 
camera
System Implementation 
Servlet 
 Receives Motion Alert 
from IP Camera 
 Executes Image 
Processing 
Applications 
 Issues Alerts 
• E-mail 
• SMS 
 Start Socket Server 
• Send Images
System Implementation 
Image 
Processing 
 Face Detection: C & 
OpenCV library 
• Haar Object Detection 
Technique. 
 Face Recognition: 
MATLAB 
• Eigenfaces Recognition 
Technique 
• Results determined by 
Euclidean Distance of 
Eigenfaces. 
=>
System Implementation 
J2ME Application 
 Start Socket Client 
• StreamConnection 
– “socket://server:port” 
 Save Images 
• RMS RecordStore 
 View Live Camera 
Footage 
• HttpConnection
System Implementation 
J2ME Client <–> J2SE Server 
Socket Connection 
 ISP Settings 
 Server 
• JPEG to Byte Array Conversion 
• Setup Connection on Specified Port 
 Client 
• Connect to SocketServer at an Address and Port 
• Receive Byte Array and Convert to J2ME Image 
• Display Image
Conclusion 
Requirements Vs Results. 
 All Requirements met. 
 Image Processing Results 
Overall: 
 Excellent Experience 
• Utilises a number of Software and Communication 
protocols and technologies. 
 Existing IP Surveillance Systems 
 Enhancements 
 Feasible Product?
Project Website: 
http://ohm.nuigalway.ie/0607/03byrne

More Related Content

Similar to Ip camera security system presentation 1

Ip camera security system presentation
Ip camera security system presentationIp camera security system presentation
Ip camera security system presentation
ezlink5
 
Ipcam 090727060856-phpapp02
Ipcam 090727060856-phpapp02Ipcam 090727060856-phpapp02
Ipcam 090727060856-phpapp02
azad12915
 
FYP-Final-External
FYP-Final-ExternalFYP-Final-External
FYP-Final-External
Ahmed Rik
 
Software and Machine Vision Competencies
Software and Machine Vision CompetenciesSoftware and Machine Vision Competencies
Software and Machine Vision Competencies
Amita Chitale
 
Ip Cam
Ip CamIp Cam
Ip Cam
Robert Bosch
 
Iaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detectionIaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detection
Iaetsd Iaetsd
 
Amit Dixit Resume 1
Amit Dixit Resume 1Amit Dixit Resume 1
Amit Dixit Resume 1
amit dixit
 
Ankit Vakil (2)
Ankit Vakil (2)Ankit Vakil (2)
Ankit Vakil (2)
Ankit Vakil
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messaging
Praveen Kumar
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
eG Innovations
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam
HermesDDS
 
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
ZongXian Shen
 
Webcams
WebcamsWebcams
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring StationsJava in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Eurotech
 
PD_Engg_MohitGoyal.pptxdadddddddddddddddd
PD_Engg_MohitGoyal.pptxdaddddddddddddddddPD_Engg_MohitGoyal.pptxdadddddddddddddddd
PD_Engg_MohitGoyal.pptxdadddddddddddddddd
deepak383700
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Leonardo De Moura Rocha Lima
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
Waqas Ahmed Nawaz
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
Ankit Vakil
 
People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013
Eurotech
 
Srikanth_PILLI_CV_latest
Srikanth_PILLI_CV_latestSrikanth_PILLI_CV_latest
Srikanth_PILLI_CV_latest
Srikanth Pilli
 

Similar to Ip camera security system presentation 1 (20)

Ip camera security system presentation
Ip camera security system presentationIp camera security system presentation
Ip camera security system presentation
 
Ipcam 090727060856-phpapp02
Ipcam 090727060856-phpapp02Ipcam 090727060856-phpapp02
Ipcam 090727060856-phpapp02
 
FYP-Final-External
FYP-Final-ExternalFYP-Final-External
FYP-Final-External
 
Software and Machine Vision Competencies
Software and Machine Vision CompetenciesSoftware and Machine Vision Competencies
Software and Machine Vision Competencies
 
Ip Cam
Ip CamIp Cam
Ip Cam
 
Iaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detectionIaetsd arm based remote surveillance and motion detection
Iaetsd arm based remote surveillance and motion detection
 
Amit Dixit Resume 1
Amit Dixit Resume 1Amit Dixit Resume 1
Amit Dixit Resume 1
 
Ankit Vakil (2)
Ankit Vakil (2)Ankit Vakil (2)
Ankit Vakil (2)
 
Lte attach-messaging
Lte attach-messagingLte attach-messaging
Lte attach-messaging
 
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
Choosing the Best Approach for Monitoring Citrix User Experience: Should You ...
 
從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam從傳統型IP cam走向智慧型IP cam
從傳統型IP cam走向智慧型IP cam
 
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
(CISC 2013) Real-Time Record and Replay on Android for Malware Analysis
 
Webcams
WebcamsWebcams
Webcams
 
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring StationsJava in the Air: A Case Study for Java-based Environment Monitoring Stations
Java in the Air: A Case Study for Java-based Environment Monitoring Stations
 
PD_Engg_MohitGoyal.pptxdadddddddddddddddd
PD_Engg_MohitGoyal.pptxdaddddddddddddddddPD_Engg_MohitGoyal.pptxdadddddddddddddddd
PD_Engg_MohitGoyal.pptxdadddddddddddddddd
 
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]Building a Reliable Remote Communication Device with Java ME8 [CON2285]
Building a Reliable Remote Communication Device with Java ME8 [CON2285]
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
CCNA (R & S) Module 02 - Connecting Networks - Chapter 8
 
Ankit Vakil (1)
Ankit Vakil (1)Ankit Vakil (1)
Ankit Vakil (1)
 
People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013People Counting: Internet of Things in Motion at JavaOne 2013
People Counting: Internet of Things in Motion at JavaOne 2013
 
Srikanth_PILLI_CV_latest
Srikanth_PILLI_CV_latestSrikanth_PILLI_CV_latest
Srikanth_PILLI_CV_latest
 

Recently uploaded

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 

Recently uploaded (20)

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 

Ip camera security system presentation 1

  • 1. IP Camera Security System Dallan Byrne 03381781 4th Electronic and Computer Engineering 2007 Supervisor: Fergal O’ Malley
  • 2. Presentation Overview 1 Project Description 2 Technologies 3 Software System Architecture 4 System Implementation 5 Conclusion
  • 3. Project Description Create a Prototype of a Network Security System using IP Camera Technology  Designed for Irish home broadband user.  Alerts home owner to break-in by SMS.  Owner may view intruder faces and a live stream from the IP camera on a J2ME mobile application.
  • 4. Project Description Functional Requirements:  IP Camera • Stream MJPEG. • Motion Detection Alert.  Server: • Image Processing: Face Detection/Recognition. • SMS & E-mail Alert.  Phone • View Intruder/Recognised Faces • View MJPEG Stream
  • 6. Technologies Communication Technologies  TCP/IP  HTTP Protocol  GPRS IP Camera Technology  Web Server • Standalone  Motion Detection Axis 207W © Axis Corporation 2006
  • 7. Technologies Software Technologies  J2SE/J2EE • Servlets • J2SE Sockets  Image Processing • Face Detection: OpenCV • Eigenfaces Recognition Technique  J2ME • MIDlets • Sockets
  • 8. Software System Architecture Server  Save Images  SMS & Email Alert  Image Processing  Socket Server Mobile Device  Socket Client  Stream MJPEG
  • 9. Software System Architecture User Interface • System GUI • Saves Images • System Settings • Viewing MJPEG Servlet • Tomcat Container • Invoked by Camera • Image Processing • Socket Server Server
  • 10. System Implementation User Interface  Saves JPEG’s to Server Memory  User may: • Edit and save camera, e-mail and SMS settings. • View MJPEG from camera
  • 11. System Implementation Servlet  Receives Motion Alert from IP Camera  Executes Image Processing Applications  Issues Alerts • E-mail • SMS  Start Socket Server • Send Images
  • 12. System Implementation Image Processing  Face Detection: C & OpenCV library • Haar Object Detection Technique.  Face Recognition: MATLAB • Eigenfaces Recognition Technique • Results determined by Euclidean Distance of Eigenfaces. =>
  • 13. System Implementation J2ME Application  Start Socket Client • StreamConnection – “socket://server:port”  Save Images • RMS RecordStore  View Live Camera Footage • HttpConnection
  • 14. System Implementation J2ME Client <–> J2SE Server Socket Connection  ISP Settings  Server • JPEG to Byte Array Conversion • Setup Connection on Specified Port  Client • Connect to SocketServer at an Address and Port • Receive Byte Array and Convert to J2ME Image • Display Image
  • 15. Conclusion Requirements Vs Results.  All Requirements met.  Image Processing Results Overall:  Excellent Experience • Utilises a number of Software and Communication protocols and technologies.  Existing IP Surveillance Systems  Enhancements  Feasible Product?