This document summarizes a project to develop a semi-automated crow detection system using a quadcopter. The system aims to help researchers study crow roosting patterns. It involves assembling hardware including a quadcopter, cameras, and wireless transmission equipment. Software includes a GUI for viewing live video streams and processing images using MATLAB to detect and count crows with 86% accuracy. Future work involves improving the quadcopter, cameras, GUI, image processing, and video transmission to increase functionality and performance of the crow detection system.
The RAPIDS suite of software libraries gives you the freedom to execute end-to-end data science and analytics pipelines entirely on GPUs. It relies on NVIDIA® CUDA® primitives for low-level compute optimization, but exposes that GPU parallelism and high-bandwidth memory speed through user-friendly Python interfaces.
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsWang Kang
Time and position data of mobile devices are trusted without checking by most vendors and developers. We discover a method of GPS spoofing with low-cost SDR devices. The method can be used to alter the location status as well as the time of affected devices, which poses a security threat to location-based services. We also examine other positioning methods used by smart devices (e.g. WiFi) and how to spoof them. Advices on preventing such spoofing are given.
The RAPIDS suite of software libraries gives you the freedom to execute end-to-end data science and analytics pipelines entirely on GPUs. It relies on NVIDIA® CUDA® primitives for low-level compute optimization, but exposes that GPU parallelism and high-bandwidth memory speed through user-friendly Python interfaces.
Black Hat Europe 2015 - Time and Position Spoofing with Open Source ProjectsWang Kang
Time and position data of mobile devices are trusted without checking by most vendors and developers. We discover a method of GPS spoofing with low-cost SDR devices. The method can be used to alter the location status as well as the time of affected devices, which poses a security threat to location-based services. We also examine other positioning methods used by smart devices (e.g. WiFi) and how to spoof them. Advices on preventing such spoofing are given.
DC vs. Marvel: A Social Media ShowdownTara Clapper
When it comes to social media marketing, how do comic book entertainment giants DC and Marvel compare? View the full webinar here: https://www.semrush.com/webinars/dc-vs-marvel-social-media-showdown/
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12CRISP Project
Frank Rothman from Bosch presented the work of the IEC technical committee TC79 workshop 12 on Alarm Systems and Video surveillance at the CRISP final conference in Brussels 16 March 2017.
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben NassiCODE BLUE
In an "open skies" era in which drones fly among us, a new question arises: how can we tell whether a passing drone is being used by its operator for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)? In this talk, I present a new method that can detect whether a specific POI (point of interest) is being video streamed by a drone. I show that applying a periodic physical stimulus on a target/victim being video streamed by a drone causes a watermark to be added to the encrypted video traffic that is sent from the drone to its operator and how this watermark can be detected using interception. Based on this method, I present an algorithm for detecting a privacy invasion attack. I analyze the performance of our algorithm using four commercial drones (DJI Mavic Air, Parrot Bebop 2, DJI Spark, and DJI Mavic Pro) and show how our method can be used to (1) determine whether a detected FPV (first-person view) channel is being used to video stream a person by a drone in 2 seconds, and (2) locate a spying drone in space; we also demonstrate how the physical stimulus can be applied covertly.
From pixels to point clouds - Using drones,game engines and virtual reality t...ARDC
Presentation by Dr Tim Brown
Full webinar: https://www.youtube.com/watch?v=bl_7ClXhQlA&list=PLG25fMbdLRa5qsPiBGPaj2NHqPyG8X435&index=11
Individual snippet:https://youtu.be/PVf4zYNJlmM?list=PLG25fMbdLRa5qsPiBGPaj2NHqPyG8X435
DC vs. Marvel: A Social Media ShowdownTara Clapper
When it comes to social media marketing, how do comic book entertainment giants DC and Marvel compare? View the full webinar here: https://www.semrush.com/webinars/dc-vs-marvel-social-media-showdown/
2. crisp final conf ste fi workshop_reflections iec-tc79 wg12CRISP Project
Frank Rothman from Bosch presented the work of the IEC technical committee TC79 workshop 12 on Alarm Systems and Video surveillance at the CRISP final conference in Brussels 16 March 2017.
[CB20] Drones' Cryptanalysis - Detecting Spying Drones by Ben NassiCODE BLUE
In an "open skies" era in which drones fly among us, a new question arises: how can we tell whether a passing drone is being used by its operator for a legitimate purpose (e.g., delivering pizza) or an illegitimate purpose (e.g., taking a peek at a person showering in his/her own house)? In this talk, I present a new method that can detect whether a specific POI (point of interest) is being video streamed by a drone. I show that applying a periodic physical stimulus on a target/victim being video streamed by a drone causes a watermark to be added to the encrypted video traffic that is sent from the drone to its operator and how this watermark can be detected using interception. Based on this method, I present an algorithm for detecting a privacy invasion attack. I analyze the performance of our algorithm using four commercial drones (DJI Mavic Air, Parrot Bebop 2, DJI Spark, and DJI Mavic Pro) and show how our method can be used to (1) determine whether a detected FPV (first-person view) channel is being used to video stream a person by a drone in 2 seconds, and (2) locate a spying drone in space; we also demonstrate how the physical stimulus can be applied covertly.
From pixels to point clouds - Using drones,game engines and virtual reality t...ARDC
Presentation by Dr Tim Brown
Full webinar: https://www.youtube.com/watch?v=bl_7ClXhQlA&list=PLG25fMbdLRa5qsPiBGPaj2NHqPyG8X435&index=11
Individual snippet:https://youtu.be/PVf4zYNJlmM?list=PLG25fMbdLRa5qsPiBGPaj2NHqPyG8X435
Steve AuCoin & James Thompson's presentation at Geomatics Atlantic 2012 (www.geomaticsatlantic.com) in Halifax, June 2012. More session details at http://lanyrd.com/2012/geomaticsatlantic2012/sryrx/ .
For the full video of this presentation, please visit:
http://www.embedded-vision.com/platinum-members/videantis/embedded-vision-training/videos/pages/may-2014-embedded-vision-summit
For more information about embedded vision, please visit:
http://www.embedded-vision.com
Marco Jacobs, Vice President of Marketing at videantis, presents the "Implementing Histogram of Oriented Gradients on a Parallel Vision Processor" tutorial at the May 2014 Embedded Vision Summit.
Object detection in images is one of the core problems in computer vision. The Histogram of Oriented Gradients method (Dalal and Triggs 2005) is a key algorithm for object detection, and has been used in automotive, security and many other applications.
In this presentation, Jacobs gives an overview of the algorithm and show how it can be implemented in real-time on a high-performance, low-cost, and low-power parallel vision processor. He demonstrates the standard OpenCV based HOG with Linear SVM for Human/Pedestrian detection on VGA sequences in real-time. The SVM Vectors used are provided with OpenCV, learned from the Daimler Pedestrian Detection Benchmark Dataset and the INRIA Person Dataset.
2. Agenda
- Introduction, Background and Project Description
- Hardware Assembly
- GUI (Graphical User Interface)
- Video Transmission
- Image Processing
- Testing and Results
- Future Work
- Difficulties and What We Have Learned
3. Introduction
The University of Washington, Bothell, Biology
Department is studying the crows and plants of the
North Creek wetlands.
Professor Doug Wacker is interested in studying the
roosting patterns of the crows.
Our project is integrating the quadcopter, which is
made by the mechanical engineering team, to help
Professor Doug Wacker to take images of crows.
4. Background
From fall to late spring, over 10,000 crows roost in
the North Creek wetlands at dusk.
Professor Wacker’s research includes the following
focuses:
(1) the number of crows that roost in the dusk;
(2) whether spatial patterns exist among individual
crow roosting locations; and
(3) how, if at all, the spatial roosting patterns relate
to the location of nearby plants.
5. Project Description
Video Transmission
Taking video stream from the quadcopter and Pi camera
Transferring video stream to ground station
Ground Station Computer and GUI
Run a script, download and save the video stream
User can capture images while video is playing
Image Processing
Run a MATLAB script to process the capture image
8. GUI
Quits program
Retrieves video from
raspberry pi, converts
into a usable format and
opens video file
Opens video
inside gui
Alternates playing and
pausing current video
Skips 5 seconds
ahead in video
Stops current video
playing
Saves current
frame as JPEG
and processes it
Skips to a specific
time frame
Captures and saves
the images
corresponding to the
button clicks
}
10. Video Transmission: System
Comprises of :
- 2 dual band 2.4Ghz/5Ghz Wifi Adapters
- 2 Raspberry Pi’s
- Raspberry Pi Camera
- USB
Utilizes:
- Open source project - wifibroadcast
Inner workings:
- Monitor mode & packet injection
R.Pi
Drone
C
a
m
e
r
a
W
ifiadapter
R.Pi
W
ifiadapter
U
S
B R.Pi. Screen
live stream
12. Image Processing: System Characteristics
Characteristic Limitation Reasoning
Crow Detection
Detects, but doesn’t
recognize, crows
Cannot differentiate
between crow and
bird-shaped objects
Sports Field is clear of
debris; only crows roost on
Sports Field
Background Location
UWB Sports Field
Doesn’t work in North Creek
woods
Crows roost on Sports Field
& S.F. has relatively low
noise
Object Distance
5 - 15m
Not guaranteed to work
outside of this range
Meets contract
specifications
Time of Day
Dusk Untested at night Tested w/o infrared lights
Camera Perspective
Top-down Top-down only
Reduces noise, gimbal
shape
13. Image Processing: Active Contour
- General theory
- Main Benefit
- Autonomous & adaptive method
- Drawbacks
- Minute features ignored
- Needs adjustment to increase
accuracy
20. Testing/Results
Range test for video transmission
1. 5 dBi antenna
Distance from soccer field through trees ~183m
Distance from soccer field through short foliage ~203m
2. 9 dBi antenna
Distance from soccer field through trees 237m~
Distance from soccer field through short foliage ~291m
22. Future Improvements
- Quadcopter
○ Reduce the operating noise of quadcopter
- Camera
○ Obtain and use high-resolution thermal vision camera
- GUI
○ Add more features (such as playback bar to control the video)
- Image Processing
○ Adapting machine learning algorithm to do the pattern recognition of crows
- Video transmission
○ Change system to 2.4GHz bandwidth to increase range and reliability
23. What We Have Learned
- The difficulties of working as a team
- Importance of self-motivation → Conducting individual research
- The Value of:
- Good communication skills
- Periodic re-evaluation of the project
24. Project Difficulties
- Broken quadcopter
- Evolution of project scope
- Hardware limitations
- Crows refused to cooperate
- Coordinating with external help