Closed Circuit Television in Raspberry PI Using Open CV & Python

Total Page:16

File Type:pdf, Size:1020Kb

Closed Circuit Television in Raspberry PI Using Open CV & Python ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE) _______________________________________________________________________________________________ Closed Circuit Television in Raspberry PI Using Open CV & Python 1Rajatha B, 2L Swarna Jyothi, 3UmaShankar Shetty C 1,2Dept of ECE, RRCE Bengaluru-74, India 3Manager-Services, Tenet Technetronics, Bengaluru, India Abstract- Designing an efficient and foolproof surveillance the type of background subtraction that will be used in system is a challenging task. The cost of sophisticated the system, the researchers considered the place where surveillance systems is very high. These factors made the system will be placed and also the processing speed researchers to think alternative for the existing system. of the RPI. According to one comparative study, the Raspberry Pi, a low cost, single board credit card sized basic background subtraction has the lowest processing computer is the heart of this work. The system is built on Open CV and the coding language used is Python. The speed requirement but it can't be implemented in a Open CV is released under BSD license. The BSD license complex background environment [3]. The researchers makes the Open CV software free for both academic and finally choose the basic background subtraction for commercial purpose. The Python is a script language. Face motion detection due to its low computational detection algorithm is used to precisely identify the human requirement. beings. The proposed surveillance system can be used in public places like Hotels, Coffee Shops, Malls, Offices etc. Moreover, in recent years, Motion Detection has attracted a great interest from computer vision Keywords- Raspberry Pi, Open CV, Python, Surveillance, researchers due to its promising applications in many BSD license areas, such as video surveillance, traffic monitoring or I. INTRODUCTION sign language recognition. To overcome storage spaces issue, we apply the Motion Detection algorithm for live Closed-circuit television [1] monitoring system has now camera streaming, this allows the system to analyze become indispensable in day to day life of human incoming images from cameras, and recognize when society. Supermarkets, factories, hospitals, hotels, movement occurs. The video system can collect and schools, and companies are having their own CCTV store images for the administrators review. Effective use system for 24/7 monitoring. Instead of using the of Motion Detection promotes an automated approach to traditional wireless CCTV surveillance cameras, video system reaction, and does not require an customers can now own their inexpensive security individual to start and stop recording sessions. So we systems with the tiny super computer called Raspberry can significantly decrease storage usage and save Pi. IP cameras can serve better as they can send and investment costs. receive data via computer network and internet based on internet protocol. Also resolution clarity of IP cameras is II. THEORETICAL FRAMEWORK far better than CCTV cameras. A camera module Figure 1 shows the block diagram of the whole system. connected to the Raspberry Pi will records all the The heart of the system is a single board credit card size happenings in the monitored area and live streaming can computer known as RPI (Raspberry Pi) . It is the central be viewed from any web browser, even from mobile in platform for image processing and signal alerting. An real-time. There are many problems in the video ordinary webcam captures the scene to be processed by surveillance system, such as: picture is indistinct, the RPI. The system has the capability of detecting anomalies cannot be identified automatically and a lot of motion of an object. When the moving object is storage spaces are needed to save the surveillance detected, the system can classify it as human. If there is information. detection, the system sends out alerting signal in the A. Background Subtraction form of sound and email to indicate fire or unauthorized invasion. Since the camera used is monitoring at a fixed location, background subtraction [3] algorithm can be used in In the block diagram there are components like detecting motion by the concept of frame differencing. Raspberry pi, Keyboard, Mouse, Webcam and monitor. Moving objects within a given background can be The peripherals connected to the Raspberry Pi will deduced from the difference of the current frame and a detect the motion using webcam and thus acts as a reference frame, often called the “background image”. surveillance system. There are several algorithms that can be used for motion detection like optical flow and edge analysis. One of the simplest forms of motion detection is using background subtraction. There are different types of background subtraction based from the different journals. The challenges in most of these algorithms are the illumination changes and processing speed. In choosing _______________________________________________________________________________________________ ISSN (PRINT) : 2320 – 8945, Volume -4, Issue -3, 2016 19 ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE) _______________________________________________________________________________________________ Keyboard Webcam IV.OPEN CV The Open CV [2] (Open Source Computer Vision Library) is a Computer Vision library written in C and Monitor R Pi Mouse C++ compatible with Linux. The purpose of this library is that it provides a simple computer vision Fig.1. Block Diagram infrastructure to prototype quickly for sophisticated applications. It has over 2500 optimized algorithms, III. RASPBERRY PI includes both a set of classical algorithms and the state of the art algorithms in Computer Vision, which is used RPI [5] Model B was utilized in the researcher's project for image processing. The library is used extensively by and it has 512MHz SDRAM, and 700MHz CPU which companies like Google, Yahoo, Microsoft, Intel, IBM, allows a typical computing environment. The external Sony, Honda, Toyota, and startups area as Applied ports of RPI being used in this research are the GPIO Minds, Video Surf and Zeitera, and research groups and port, audio port and Ethernet port. GPIO and audio ports government. It provides better portability. Open Source are used for alarming system and Ethernet port was used Computer Vision Library, Open CV for short, is a cross- to connect RPI to the monitoring device or to the platform library computer vision based on open source networking device. Shown in Figure 2 is the picture of distribution. It can run on Linux, Windows and Mac OS RPI. operating system. It's lightweight and efficient-makes up of a series of C function and a small amount of C + + class, at the same time provides the Python, Ruby, MATLAB language interface. V. PYTHON Python is a high-level, interpreted, interactive and object-oriented scripting language. Python is designed to be highly readable. It uses English keywords frequently where as other languages use punctuation, and it has fewer syntactical constructions than other languages. Python is interpreted: Python is processed at Fig. 2. Raspberry Pi runtime by the interpreter. You do not need to The proposed system uses Raspberry Pi Model B+ compile your program before executing it. This is single board computer and offers these key features: similar to PERL and PHP. • Broadcom BCM2835 SoC processor with 700 Python is Interactive: You can actually sit at a MHz ARM1176JZF-S cores Python prompt and interact with the interpreter directly to write your programs. • 512MB RAM Python is Object-Oriented: Python supports • Video core 4 GPU supports up to 1920 x1200 Object-Oriented style or technique of programming resolution that encapsulates code within objects. • 5Mpix Camera module capable of full HD video @ Python is a Beginner's Language: Python is a great 30fps language for the beginner-level programmers and • Micro SD card slot, 10/100Mbps Ethernet port, 4 x supports the development of a wide range of USB applications from simple text processing to WWW browsers to games. • 2.0 ports, HDMI, audio/video jack, GPIO header, micro USB power port, DSI and CSI ports VI. FACE DETECTION • Dual step-down (buck) power supply for 3.3V and Face detection [4] is a computer technology being used 1.8V in a variety of applications that identifies human faces in During initial setup Raspberry Pi was configured as a digital images. Face detection also refers to the miniature desktop with USB configured camera module psychological process by which humans locate and and an external monitor or mobile for viewing the attend to faces in a visual scene. captured video. The Raspberry Pi runs Raspbian OS and Face detection can be regarded as a specific case of is programmed using GNU Octave and Python, which is object class detection. In object-class detection, the task an open source. The Dynamic host Protocol is obtained is to find the locations and sizes of all objects in an for Raspberry Pi, addressed IP is fetched. After image that belong to a given class. Examples include obtaining this the system can be configured and upper torsos, pedestrians, and cars. Face-detection controlled remotely. algorithms focus on the detection of frontal human _______________________________________________________________________________________________ ISSN (PRINT) : 2320 – 8945, Volume -4, Issue -3, 2016 20 ITSI Transactions on Electrical and Electronics Engineering (ITSI-TEEE) _______________________________________________________________________________________________
Recommended publications
  • Radio Frequency Identification Based Smart
    ISSN (Online) 2394-6849 International Journal of Engineering Research in Electronics and Communication Engineering (IJERECE) Vol 4, Issue 2, February 2017 Embedded Web Server using Raspberry PI [1] Prof. Y. R. Risodkar, [2] Ghanshyam Talele [1] Assistant Professor [2] ME Student [1][2] Department of Electronics and Telecommunication, Sandip Institute of Technology and Research Centre, Nashik, University of pune, India Abstract: - The presented paper aims at designing embedded web server with ARM1176JZF-S 700 MHz Raspberry Pi processor and Ethernet module kit. The paper is focused on ARM-11 and Ethernet based design of an embedded web server using Apache server. The embedded web server data base includes a complete web server data with MySQL. Keywords:— Raspberry Pi Processor, Ethernet, MySQL. For web development we use PHP as a server-side I. INTRODUCTION scripting language it is also used as a general-purpose programming language. In the year 2013, PHP was An Embedded web server is a computer based installed on more than 240 million websites and 2.1 server system that processes requests via HTTP, the basic million web servers. network protocol which is used to distribute the embedded hardware related data base information onto the World The PHP stores whole numbers in platform- Wide Web. This term can be referred a choice of choosing dependent ranges, either a 64- bit or 32-bit signed an either to the entire system, or to the software that accepts integer equivalent to the C-language. All the Unsigned and supervises the HTTP requests [1]. The most common integers are converted to signed values in certain situations usage of web servers is to host the primary functions of a web server which is used to store, the process and deliver and it is also different from other programming languages.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Carefully Read This Collection of Information and License Agreements
    CAREFULLY READ THIS COLLECTION OF INFORMATION AND LICENSE AGREEMENTS. BY CLICKING THE "ACCEPT" OR "AGREE" BUTTON, OR OTHERWISE ACCESSING, DOWNLOADING, INSTALLING OR USING THE SOFTWARE, YOU AGREE ON BEHALF OF LICENSEE TO BE BOUND BY THIS INFORMATION AND LICENSE AGREEMENTS (TO THE EXTENT APPLICABLE TO THE SPECIFIC SOFTWARE YOU OBTAIN AND THE SPECIFIC MANNER IN WHICH YOU USE SUCH SOFTWARE). IF LICENSEE DOES NOT AGREE TO ALL OF THE INFORMATION AND LICENSE AGREEMENTS BELOW, DO NOT CLICK THE "ACCEPT" OR "AGREE" BUTTON OR ACCESS, DOWNLOAD, INSTALL OR USE THE SOFTWARE; AND IF LICENSEE HAS ALREADY OBTAINED THE SOFTWARE FROM AN AUTHORIZED SOURCE, PROMPTLY RETURN IT FOR A REFUND. Part One: Overview. The following information applies to certain items of third-party technology that are included along with certain Xilinx software tools. Licensee's use of the GNU compilers (including associated libraries and utilities) may cause Licensee's software application (or board-support package) to be governed by certain third-party "open source" license agreements, as further described below. Licensee can avoid this result by using alternative compilers, libraries, and utilities of its own choosing in lieu of the GNU compilers (and associated libraries and utilities). Note: Licensee is solely responsible for checking the header files and other accompanying source files of all software applications created from the use of the GNU compliers (and associated libraries and utilities) because such header and/or source files may contain or describe various copyright notices and license terms and conditions governing such files, which vary from case to case based on Licensee's usage and are beyond the control of Xilinx.
    [Show full text]
  • Advanced Smart Media Box)
    International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 5 Issue 3, March 2016 ASMB (Advanced Smart Media Box) Shiyaz.T 1, Sharfudheen.S2, Ranjith.U 3, Vipin.R 4,RemyaRamachandran5 1, 2, 3, 4 5 Student, Assistant professor, Department of Electronics & Communication, NCERC, Thrissur Abstract -Smart TV is one which can connect to internet and was believed that it would take the role of PC. Based on can stream media from internet. Buying a brand new smart the fundamental Smart TV concept, legacy Smart TV TV is a very expensive. In this project a system is introduced system architecture consists of the server providing that can be able to turn an old CRT TV into a Smart TV. It contents and applications, set-top box clients for home is just like a digital photo album to do a slideshow of photos appliances, and reasonable network devices with Internet from USB storage or from an online repository like Dropbox, Picasa, Flickr etc. It can play music, videos and connection. play some cool games from USB storage. The smart TV can Even though it had been improved its system and be controllable by an android phone. It has many features functions continuously, the independent Smart TV system like Screen mirroring, a mini web server, it has the ability of was requested to upgrade its overall. The system can voice recognition and it plays like a language translator. It process contents of only video and image which are also acts as a DLNA server for accessing files over the DLNA already pre-defined or set as a standard.
    [Show full text]
  • Putty User Manual
    PuTTY User Manual PuTTY is a free (MIT-licensed) Windows Telnet and SSH client. This manual documents PuTTY, and its companion utilities PSCP, PSFTP, Plink, Pageant and PuTTYgen. Note to Unix users: this manual currently primarily documents the Windows versions of the PuTTY utilities. Some options are therefore mentioned that are absent from the Unix version; the Unix version has features not described here; and the pterm and command-line puttygen utilities are not described at all. The only Unix-specific documentation that currently exists is the man pages. This manual is copyright 1997-2017 Simon Tatham. All rights reserved. You may distribute this documentation under the MIT licence. See appendix C for the licence text in full. Chapter 1: Introduction to PuTTY 1.1 What are SSH, Telnet and Rlogin? 1.2 How do SSH, Telnet and Rlogin differ? Chapter 2: Getting started with PuTTY 2.1 Starting a session 2.2 Verifying the host key (SSH only) 2.3 Logging in 2.4 After logging in 2.5 Logging out Chapter 3: Using PuTTY 3.1 During your session 3.2 Creating a log file of your session 3.3 Altering your character set configuration 3.4 Using X11 forwarding in SSH 3.5 Using port forwarding in SSH 3.6 Making raw TCP connections 3.7 Connecting to a local serial line 3.8 The PuTTY command line Chapter 4: Configuring PuTTY 4.1 The Session panel 4.2 The Logging panel 4.3 The Terminal panel 4.4 The Keyboard panel 4.5 The Bell panel 4.6 The Features panel 4.7 The Window panel 4.8 The Appearance panel 4.9 The Behaviour panel 4.10 The Translation panel 4.11
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • List of Programmers 1 List of Programmers
    List of programmers 1 List of programmers This list is incomplete. This is a list of programmers notable for their contributions to software, either as original author or architect, or for later additions. A • Michael Abrash - Popularized Mode X for DOS. This allows for faster video refresh and square pixels. • Scott Adams - one of earliest developers of CP/M and DOS games • Leonard Adleman - co-creator of RSA algorithm (the A in the name stands for Adleman), coined the term computer virus • Alfred Aho - co-creator of AWK (the A in the name stands for Aho), and main author of famous Dragon book • JJ Allaire - creator of ColdFusion Application Server, ColdFusion Markup Language • Paul Allen - Altair BASIC, Applesoft BASIC, co-founded Microsoft • Eric Allman - sendmail, syslog • Marc Andreessen - co-creator of Mosaic, co-founder of Netscape • Bill Atkinson - QuickDraw, HyperCard B • John Backus - FORTRAN, BNF • Richard Bartle - MUD, with Roy Trubshaw, creator of MUDs • Brian Behlendorf - Apache • Kent Beck - Created Extreme Programming and co-creator of JUnit • Donald Becker - Linux Ethernet drivers, Beowulf clustering • Doug Bell - Dungeon Master series of computer games • Fabrice Bellard - Creator of FFMPEG open codec library, QEMU virtualization tools • Tim Berners-Lee - inventor of World Wide Web • Daniel J. Bernstein - djbdns, qmail • Eric Bina - co-creator of Mosaic web browser • Marc Blank - co-creator of Zork • Joshua Bloch - core Java language designer, lead the Java collections framework project • Bert Bos - author of Argo web browser, co-author of Cascading Style Sheets • David Bradley - coder on the IBM PC project team who wrote the Control-Alt-Delete keyboard handler, embedded in all PC-compatible BIOSes • Andrew Braybrook - video games Paradroid and Uridium • Larry Breed - co-developer of APL\360 • Jack E.
    [Show full text]
  • Safeguard for Privileged Passwords 6.7 Release Notes 2 L One Identity for Privileged Sessions Is Part of One Identity's Privileged Access Management Portfolio
    Safeguard for Privileged Passwords 6.7 Release Notes 04 September 2020, 12:49 These release notes provide information about the Safeguard for Privileged Passwords 6.7 release. If you are updating a Safeguard for Privileged Passwords version prior to this release, read the release notes for the version found at: One Identity Safeguard for Privileged Passwords Technical Documentation. Release options Safeguard for Privileged Passwords includes two release versions: l Long Term Support (LTS) maintenance release, version 6.0.7 LTS l Feature release, version 6.7 The versions align with Safeguard for Privileged Sessions. For more information, see Long Term Support (LTS) and Feature Releases on page 20. About this release Safeguard for Privileged Passwords Version 6.7 is minor feature release with new features, resolved issues, and known issues. For more details, see: l New features l Resolved issues Safeguard for Privileged Passwords 6.7 1 Release Notes l Known issues NOTE: For a full list of key features in Safeguard for Privileged Passwords, see the Safeguard for Privileged Passwords Administration Guide. About the Safeguard product line The Safeguard for Privileged Passwords 3000 and 2000 Appliances are built specifically for use only with the Safeguard for Privileged Passwords privileged management software, which is pre-installed and ready for immediate use. The appliance is hardened to ensure the system is secured at the hardware, operating system, and software levels. The hardened appliance approach protects the privileged management software from attacks while simplifying deployment and ongoing management and shortening the time frame to value. Safeguard for Privileged Passwords virtual appliances and cloud applications are also available.
    [Show full text]