Sei sulla pagina 1di 22

ABSTRACT

This project presents the surveillance monitoring system, a software using webcam via
cloud storage for security purpose. The interest of this particular system is to protect a person and
monitor his activities in a designated private environment. Detecting and tracking human motion
in real time is the essential goal and to understand such activities, whether there is a stranger or
housebreaker, where the result of interpreting this image (by the digital image processing
program) will feed another system at the watcher side (connected via cloud) to invoke necessary
security precaution or action. The system captures images and stores pictures even when the
intrusion does not happen. The system has features that makes it easy for the user to connect to
the internet via personal computers which has a camera at the observation area. The image
processing program at observing side was written and plugged to the main program. The main
program is being made by using Flash application for connecting the camera and cloud. PHP and
HTML language for creating webpage (the member registration part) and MySQL database for
data contents of member and authentication.

1. INTRODUCTION
1.1 Purpose
Cloud computing is an emerging commercial infrastructure paradigm that promises to
eliminate the need for maintaining expensive computing hardware. Through the use of
virtualization and resource time-sharing, clouds address with a single set of physical resources a
large user base with different needs. Thus, clouds promise to enable for their owners the benefits
of an economy of scale and, at the same time, reduce the operating costs for many applications.
In principle cloud computing can deliver existing types of computer services. Virtualisation is a
key enabling technology for cloud computing and scalability. The surveillance monitoring
system is a system that notifies the security breach in the premises or detects unwanted intrusion
at a secured place. This can also be enhanced to capture images to track down criminals.

1.2 Scope
The scope of the system is to implement the high level webcam security
system using motion sensor algorithm. The webcams used in this system are cheaper in cost and
smaller in size than CCTVs. They can be placed easily in organizations and homes, where high
level security is needed.
When the motion sensor algorithm in the system recognizes the motion of any
object, the webcam captures and records the image at that particular instance. The system will
compare the captured image with the predefined one and also checks the sensitivity range, hence
producing the internal and external alerts. System may be connected to Burglar alarm that is used
to alert the owner or security services, after it detects motion and it is used as internal alerts.
External alerts can be sent in the form of messages to the owner, e-mail with image attachment.
This interface is from a user standpoint, substantially less complex and more application
oriented.

1.3 Overview
The users can watch the screens of any computers they are monitoring from the Internet.
This works as if we have a surveillance camera pointed directly at the concern area, capturing
anything or anybody does from that side, and transmitted live to the watchers computers for
permitted people to watch. It can record the activities and provide to broadcast on a single
computer or for multi-user monitoring computers.

The written programs (which are websites and motion detection technique of the image
processing program) must be called on the sender side computer from Internet. The Homepage of
the system divided the users into 2 parts: the admin and member, so there are the screens of the
methodic steps.

2. OVERALL DESCRIPTION
2.1 Product Perspective
The research presents the surveillance monitoring system, a webcam based with a
program via cloud for security purpose. The interest of this particular system is to protect a
person and monitor his activities in a designated and privacy or personalization environment.
Detecting and tracking human motion in real time is the essential goal to understand such
activities whether there is a stranger or housebreaker, where the result of interpreting this image
(by the digital image processing program) will feed another system at the watcher side (with
connect via cloud) to invoke necessary security precaution or action. The system captures images
and stores pictures even when the intrusion does not happen.

2.2 Product Functions


Webcam is the equipment which we use basically for video chatting or taking pictures.
There is a tremendous amount of models available with prices ranging from the extremely
affordable to the very high end. In this project for practical implementation any computer with
Internet connection and night vision webcam can be used. So, for those seeking a more
economical solution, this combination of personal computer and webcam offers a budgetfriendly alternative. By using motion-detection technology, a webcam can capture and upload
images to the cloud for review both by the computers owner and the observer.

2.3 User Characteristics


The system divides the users into 2 parts: the admin and user. Here the user can register
and login into the webcam software. The admin part which is connected to the night vision
webcam is placed in the observation area and it will send message to user's phone or email when
a motion is detected. Upon receiving such an information, user can immediately launch the
browser to check out images published by the webcam. User can also launch his webcam
software and connect to the cloud via internet to check out whats going on at our observation
area by watching real-time video. Even if the user cannot use the software at that time, the
program will record the event into video clips to be viewed later.

2.4 Specific constraints


The users can watch the screens of any computers they are monitoring from the internet.
This works as if a surveillance camera is pointed directly at the concerned area, capturing

anything or anybody does from that side, and transmitted live to the observer's computer for
permitted people to watch. It can record the activities and provide to broadcast on a single
computer or for multi-user monitoring computers.
The written program (which are the website and motion detection technic of the
image processing program) must be called on the sender side computer from internet. This
program works as if it is directly connected with the server. The program is being developed to
run in web browsers so that the user can use any operating system.
The webcam should be night vision for capturing the detection images and videos with
the absence of light. The system should be connected with UPS for avoiding the power failure.

2.5 General constraints


The system gets rid of the vagueness in using so it is suitable for the person who has little
computer and mobile knowledge. The person should have basic english knowledge
Then all the systems of the project is using US standard English. This project is provided
only for Ethical Usage . And we are not responsible if any one tried to miss use this project and if
any intruder or hackers have hacked.

3. SPECIFIC REQUIREMENTS

3.1 External Interface Requirements


A night vision webcam is used in observation area.
A personal computer with internet connection.

3.2 User Interface

User can register and login to the webcam software.


User gets the messages when the detection is occurred.
User will get the images to email.
User can login to the webcam software to get the video.

3.3 Hardware Interface


Operating System

Windows XP or higher

Platform

.Net

Web browser

IIS 6 or higher

Programming Language

SQL, ASP.NET,C#

SDK

VS 2010, MS SQL Management Studio

Connectivity

TCP/IP

3.4 Software Interface


Processor

133-MHz Intel Pentium-class processor.

Hard Disk

5 GB recommended.

Memory

1GB of RAM, 2GB recommended

Display

Standard output display.

Keyboard

Standard Qwerty Keyboard for Interface.

Mouse

Standard mouse with two buttons.

Others

GSM Modem.

3.5Communication Interface
TCP/IP used for passing the videos and Images through internet.
Mobile is used for message services.

3.6 Functional Requirements

A night vision webcam used in the observation area.


A personal computer with internet connection.
Observer needed a mobile to get the message.
User can login to the webcam software to get the video.

Webcam

4. ABSTRACT DESIGN
Cloud

4.1 Architectural design

Desktop

Laptop

Phone
Sender side

Watcher side

Figure 4.1 Architectural design

The sender side system is used to monitor the observation area continuously. When an
intrusion is detected, the system sends the data to the cloud and as well informs the owner's
about the intrusion via message and email. The user can then log into the system and view the
recorded clips. Any person who is authorized, can view the live webcam images from the
sender's side through the internet with the help of browsers.

4.2 Use case diagram


Login

Validation

Services

Logout

Admin

User

Figure 4.2 Use case diagram


The use case diagram is having the Admin and the user. Here the Admin will be webcam
connected to the personal computer and the user will be the observers. The webcam will do the
capturing of images of the observed area and the personal computer will compare the images
and check whether any changes has occurred. If intrusion is found, the system will send the alert
message to the user and will provide the services for the user.

5. FUNCTIONAL DESIGN
5.1 Modular design diagram

Input Username and


Password
Not Success

Success

Webcam software

Getting
videos

Logout

Figure 5.1 Modular design diagram


Web cam
software

Web service

Username and
password box

Initially the username and password are taken as input. If it is valid then the user can
successfully login to the webcam software. This webcam software will hold the recorded video
and the user can watch it. If it is an invalid user name or password, then the service is not
provided.

5.2 Sequence diagram


Data base

New User

Existing User

Signup()
Signup()
Sending Account Request()
Valid Account ()
Compute username and Password()
Add Account()

Sign In()
Sign In()
Sending Sign In Request () Check user name()

Check Password()

Find The Texts Match()


Valid username and password()

Figure 5.2 Sequence diagram

Registration

5.4 Class diagram

FullName: varchar (max)


Password: varchar (max)
Mobile No: varchar (max)
Email: varchar (max)
AlertLevel: varchar (max)
Add()

Update ()

Figure 5.3 Class diagram

The class diagram includes only Registration. The Registration contains many entities
like fullname, mobile no, Alertlevel, email-id, password.

6. CONTROL FLOW DESIGN


6.1 Complete system flow diagram

STAR
T

Motion
detection
pocess

User
authentication

No
No

Membe
r?

Member
register

Intrud
er
Yes
Convert the image
stream to bit array

Yes
Start sender or receive sms

Start capture

No

Convert image
stream to bit
array
Pass the bit
array via http

Pass the bit array


via http with alert
trigger

Yes
Trigger image
form webcam

Figure 6.1(a) Image analyzing and sending


In this system flow diagram for the image analysing and sending, here the image
analysing will be done with the first flow diagram and the sending will be done with the second
flow diagram . and this flow diagram only for the admin process , in the sense tha admin is
having only the purpose up to send the services , thet is clearly shown in the system flow
diagram

Receive image
and trigger
from Http
No
Aler
ting?

Convert image
stream to bit
array

Yes

Convert the
image stream
to image

Pass the bit


array via http

Read image to
sender alert
directory

END

Figure 6.1(b) Image receiving and recording by cloud


Call image
from directory

Here in this data flow diagram, the images will receive and

it will record by cloud to get to the observer .


Show image at
watcher screen

No
Logout
Yes
END

Has
new
image

Figure 6.1(c) Image watching by watcher

Here in this system flow diagram for the image watching by watcher
or observer . If observer is logged out then it will end or it will go back to call image from
directory if any new images.

6.2 Algorithms for logic implementation

First of all, lets find the regions where these two frames are differing a bit. For the
purpose we can use Difference and Threshold filters.

_src=v;
if(_now!=null){_now.dispose();_old.dispose();}
_now=newBitmapData(v._width,v._height,false,0);
_old=newBitmapData(v._width,v._height,false,0);

This is the result of motion detector. We can highlight the motion regions if needed. The
result is below :

vararea:Rectangle=
_now.getColorBoundsRect(0xFFFFFFFF,0xFFFFFFFF,
true);
_act=(area.width>(_src._width/100)*_min||
area.height>(_src._height/
100)*_min);
if(_act)
{
_box=area;
x=_box.x+(_box.width/2);
y=_box.y+(_box.width/2);
}
On this step well get an image with white pixels on the place where the current frame is
different from the previous frame on the specified threshold value. Its already possible to count
the pixels, and if the amount of it will be greater than a predefined alarm level we can signal
about a motion event. But most cameras produce a noisy image, so well get motion in such
places, where there is no motion at all. To remove random noisy pixels, we can use an Erosion
filter, for example. So, well get now mostly only the regions where the actual motion was.

_now.draw(_src,_mtx);
_now.draw(_old,newMatrix(),null,'difference');
_now.applyFilter(_now,_now.rectangle,newPoint(),
_col);

_now.applyFilter(_now,_now.rectangle,newPoint(),
_blr);
_now.threshold(_now,_now.rectangle,newPoint(),'>',
0xFF333333,0xFFFFFFFF);
_old.draw(_src,_mtx);

6.3 Activity diagram for use cases

Capture images

Compare
the images
with base
images

[No changes]

[Changes]

Send alert message

Record video

Upload the video

Stop recording

End service
Figure 6.2 Activity diagram for use cases
Here the activity diagram for the use case . and the diagram shows
that the activities performed for the use case .

7. ACCESS LAYER DESIGN

7.1 E-R model


Mobile
No

Full
Name

Registration

Master Id

Alert Level

EmailId

Password

Figure 7.1 E-R model

The E-R diagram includes only one part,that is registration. The registration may include
the attributes like fullname, mobile number,Alertlevel, email id and password.

7.2 Data base schema

Tbl_Registration
Reg_Masterid
Reg_FullName
Reg_Password
Reg_MobileNo
Reg_Emailid
Reg_AlertLevel
Reg_Activeflag

int
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
Varchar(MAX)
int

The Database Schema includes only Registration. The Registration contains many entities
like fullname, mobile no, Alertlevel, email-id, password, master id band activeflag. Master id is
taken as primary key.

WEBCAM SECURITY OVER CLOUD

Registration
Full Name

8. PRESENTATION
LAYER DESIGN
LoginName
:
8.1 User interface form
design :
Password
8.1.1 Registration
Mobileno
EmailId
AlertLevel

:
:
:Low

Mediom

High

CANCEL
Figure 8.1(a) Registration
8.1.2 Login
WEBCAM SECURITY OVER CLOUD

Login
UserName

Password

:
CANCEL

Figure 8.1(b) Login


Here 2 frames are given below ,and the first frame is shows that the registration part .and the
second frame is login part.

8.2 User interface flow design

User

Sign Up

Sign In

Data Base

In this user interface flow design is having two faces , first one is registration and another one is
login.Here the first registration is needs to do first and while logging in to the system the
database will make sure that this user is exist or not . if the user is not exist , then user needs to
register first and user can login only after registration.