Smart Surveillance Using Computer Vision
Smart Surveillance Using Computer Vision
ISSN No:-2456-2165
Abstract:- Security and protection are the most important scalable face recognition. Ready-to-use transmission system.
issues in modern times. This document reviews some of Poor performance in the early stages of operations (especially
the latest developments in the field of computer vision and the high false alarm rate) has led to research on more
image processing to solve safety issues. It also describes complex solutions. Artificial intelligence concepts such as
the efforts of the development teams to incorporate some neural networks and expert systems have been integrated into
of these pioneering ideas into a consistent prototype more computer-oriented systems.
system. Computer vision expands the paradigm of image
processing, including the understanding of scene content, II. LITERATURE SURVEY
object tracking and classification. The development of
computer vision technology often takes into account very Yong-Liang Zhang, Zhi-Qin Zhang, Gang Xiao, Rui-
specific applications, and the goal of a more complete Dong Wang proposed a method to detect intruders by
understanding of computer vision systems still exists identifying human targets in the images captured by the
outside the existing technology, at least for now. In this surveillance system.
paper we are mainly stressing on the features of smart Jayathi Ghosh Dastidar, Rana Biswas proposed a method
surveillance which are monitoring feature, noise detection, for intrusion detection in critical environments, by
face identification and visitors in room detection. This can changing the focus of the camera to ensure security and
be achieved by integrating camera with python computer tracking the attacker's movement.
vision algorithms. Hang Chen zeo, Dong Chen,and Xifeng Wang proposed a
method of controlling the algorithm program of a mixed
Keywords:- Computer Vision, Object Tracking, Computer mathematical model, which is mainly based on the
Vision Algorithms, Face Identification. standard model of Gaussian mixture. After updating the
model according to the characteristics of continuous video
I. INTRODUCTION frames, the background model is divided into static
regions. And dynamic areas and update the background of
In the modern world, the security paradigm has changed different strategies. Penetration is judged based on the
from "investigating incidents" to "preventing potentially position of the target's center of mass, where the center of
catastrophic incidents." Affordable digital video surveillance gravity is in a given space. Means breaking in and calling
systems only provide the infrastructure for capturing, storing, the police.
and distributing video, leaving the task of threat detection
specifically to human functions. Human gazing of III. REQUIREMENTS
surveillance video is a completely human in depth task. It is
largely agreed that looking video feeds calls for a better Since this is software based project, it must run on
degree of visible interest than maximum regular errands. In certain hardware and operating systems, the following
particular, vigilance, that is, the power to remain targeted and requirements must be met to run this software. Any version
react to rare events, is very exacting and is susceptible to of Windows / Linux / Mac OS so that it can run on any
errors because of neglect of attention. Face recognition platform. You need to install Python on your system to run
technology has created nice strides within the past 2 decades. successfully.
Verify credentials for secure transactions, observation and
security tasks, and access management. These applications Python package required are:
usually run in a controlled environment and detection openCV
algorithms, which can take advantage of the limitations of the Skimage
environment to achieve a high level of detection accuracy. In- Numpy
depth research is ongoing in the field of intrusion detection. Tkinter
In our project, we successfully developed a reliable and
Fortunately, because of the ski-image package in to divide the image into multiple grids, as shown in the
Python, we don't have to copy all the math into Python, following figure: predict what you want to meet, apply the
because ski-image has a prebuilt function that can do all these same steps to the mark The histogram is compared with the
tasks for us just by calling the built-in functions. We captured trained model. This is how the function works.
them before, so we just need to enter them and get a masked
image with score.
VII. CONCLUSION
ACKNOWLEDGEMENT
REFERENCES