0% found this document useful (0 votes)
159 views44 pages

DVR Security System (Mini Project) - Report

This document is a project report submitted by four students for their Bachelor of Engineering degree in Computer Science and Engineering. It discusses the development of a DVR security system, including an abstract that describes the core functionality of a DVR system in recording and archiving video footage from connected cameras. The report includes chapters on the components, architecture, applications and coding of DVR security systems.

Uploaded by

Alone Thicker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
159 views44 pages

DVR Security System (Mini Project) - Report

This document is a project report submitted by four students for their Bachelor of Engineering degree in Computer Science and Engineering. It discusses the development of a DVR security system, including an abstract that describes the core functionality of a DVR system in recording and archiving video footage from connected cameras. The report includes chapters on the components, architecture, applications and coding of DVR security systems.

Uploaded by

Alone Thicker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 44

DVR SECURITY SYSTEM

A PROJECT REPORT
Submitted by

SIVANATHAN.V (711220104041)

VISHNU.K (711220104051)

MANOJ KUMAR.B (711220104028)

SHARATHY.S (711220104039)

in partial fulfillment for the award of the degree

of

BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING

JAI SHRIRAM ENGINEERING COLLEGE, TIRUPUR


ANNA UNIVERSITY : CHENNAI 600 025
MAY 2023

ANNA UNIVERSITY :: CHENNAI 600 025


DVR SECURITY SYSTEM

PROJECT REPORT
Submitted by

SIVANATHAN.V (711220104041)

VISHNU.K (711220104051)

MANOJ KUMAR.B (711220104028)

SHARATHY.S (711220104039)

in partial fulfillment for the award of the degree

of

BACHELOR OF ENGINEERING
IN
COMPUTER SCIENCE AND ENGINEERING

JAI SHRIRAM ENGINEERING COLLEGE, TIRUPUR


ANNA UNIVERSITY : CHENNAI 600 025
MAY 2023

ANNA UNIVERSITY :: CHENNAI 600 025


BONAFIDE CERIFICATE

Certificate that this project report "DVR SECURITY SYSTEM" is the


bonafide work of

SIVANATHAN.V (711220104041)
VISHNU.K (711220104051)
MANOJ KUMAR.B (711220104028)
SHARATHY.S (711220104039)

Who carried our the project work under work under my supervision.

SIGNATURE SIGNATURE
Prof.A.Gokilavani Prof.T.Kiruthiga

HEAD OF THE DEPARTMENT, SUPERVISOR,


Computer Science and Engineering, Computer Science and Engineering, Jai
Jai ShriRam Engineering College, ShriRam Engineering College,
Tirupur-638 660. Tirupur-638 660.

The candidates were examined by us in the project Vivo-Voce examination


held on ......................

INTERNAL EXAMINER EXTERNAL EXAMINER


ABSTRACT

A Digital Video Recorder (DVR) security system is a surveillance


technology designed to capture and store video footage from multiple
cameras. It provides an effective and reliable means of monitoring and
protecting residential, commercial, and industrial properties. The DVR
security system replaces traditional analog recording methods by
digitally encoding and compressing video signals, resulting in higher-
quality recordings and increased storage capacity.

The core functionality of a DVR security system lies in its ability to


record and archive video footage from connected cameras. The system
employs a standalone DVR unit that connects to cameras through
wired or wireless connections. These cameras capture video feeds and
transmit them to the DVR, which processes and compresses the signals
before storing them on a built-in hard drive or external storage devices.

One of the key advantages of a DVR security system is its ability to


provide continuous surveillance, enabling users to review recorded
footage from any specific time period. With motion detection
capabilities, the system can trigger recording when it detects movement,
saving storage space and allowing easy retrieval of relevant footage.
Moreover, modern DVR systems often offer remote access through
network connectivity, enabling users to monitor live video feeds and
playback recorded footage from their smartphones, tablets, or
computers.
TABLE OF CONTENTS

CHAPTER No. TITLE Pg no.

ABSTRACT

1. INTRODUCTION 01

2. LITERATURE SURVEY 02

2.1

BACKGROUND AND SIGNIFICANCE 04

3. COMPONENTS OF DVR SECURITY SYSTEMS 07

3.1 HARDWARE REQUIREMENTS 10

3.1.2 SOFTWARE REQUIREMENTS 13

4. DVR SYSTEM ARCHITECTURE 16

APPLICATION AREAS OF DVR SECURITY


5. 20
SYSTEMS

6. CODING 24

7. CONCLUSION 37

8. REFERENCE 38
LIST OF FIGURES

Fig.no FIGURE NAME Pg.no

2.1 Significance of DVR setup 04

2.2 Generation of DVR 06

3.1 Components of DVR 09

3.2 Types of camera 09

3.3 Camera 12

3.4 DVR Board 12

3.5 Components of camera 12

3.6 Circuit for camera system 15

3.7 Limitation chart for DVR 15

4.1 Connections of DVR 17

4.2 Architecture of DVR 19

4.3 DVR wireless connection 19

5.1 Bullet camera 22

5.2 Surveillance camera 22


CHAPTER-1
INTRODUCTION

A DVR security system is a cutting-edge surveillance solution that


revolutionizes the way we monitor and protect our homes, businesses,
and public spaces. By harnessing the power of digital technology, this
advanced system captures, stores, and manages video footage from
multiple cameras with unparalleled efficiency and convenience. With its
superior recording quality, expansive storage capabilities, and easy
accessibility, a DVR security system is the go-to choice for ensuring
safety, deterring criminal activities, and maintaining peace of mind in
today's fast-paced world.

As technology continues to advance, DVR security systems are


likely to evolve further, incorporating cutting-edge features such as
artificial intelligence-based analytics, cloud storage options, and
seamless integration with other smart devices. The future holds
immense potential for these systems, and they are poised to continue
shaping the landscape of security and surveillance, ensuring safety and
peace of mind for all.

01
CHAPTER-2
LITERATURE SURVEY
"Digital Video Surveillance and Security" by Anthony C. Caputo
(2013) This book provides a comprehensive overview of digital video
surveillance systems, including DVR technology. It covers various
aspects such as system design, image compression, storage
management, and integration with other security technologies. The
book also explores the impact of DVR systems on crime prevention and
investigation.

"Advances in Security Technology: International Conference, SecTech"


edited by Kyungpook National University (2018) This conference
proceedings book includes research papers on various security
technologies, including DVR systems. It highlights advancements in
video compression algorithms, real-time monitoring techniques, and
remote access capabilities. The book also discusses challenges and
future directions in the field of DVR security systems.

"Design and Implementation of a Digital Video Recorder for


Surveillance Systems" by Mohammed Al-Zyoud and Fadi Aloul (2015)
This research paper presents the design and implementation of a DVR
system specifically tailored for surveillance applications. It discusses the
hardware and software components of the system, focusing on video
compression techniques, storage management, and remote access
functionality. The paper also evaluates the performance of the
developed DVR system through experimental results.

02
"A Review of Video Surveillance Systems" by Siti Hajar Othman
(2016) This review article provides an overview of video surveillance
systems, including DVR technology. It examines the advantages and
limitations of DVR systems compared to other surveillance approaches.
The review also discusses emerging trends such as cloud-based DVR
systems and video analytics integration.

"Security and Privacy in Digital Video Surveillance: Requirements,


Challenges, and Solutions" by Panagiotis Karamolegkos (2020) This
research paper explores the security and privacy considerations
associated with DVR security systems. It discusses potential
vulnerabilities in DVR systems, such as unauthorized access and data
breaches. The paper also proposes solutions to enhance the security and
privacy of DVR systems, including encryption techniques and access
control mechanisms.

These selected references provide valuable insights into the design,


implementation, and challenges of DVR security systems. They offer a
foundation for understanding the technological advancements,
applications, and potential future developments in this field. Further
exploration of these sources will enable a deeper understanding of the
subject and facilitate the development of robust and efficient DVR
security systems.

03

2.1.BACKGROUND AND SIGNIFICANCE



need for effective surveillance and security
In recent years, the
measures has increased significantly. Traditional analog video
surveillance systems, with their limitations in image quality, storage
capacity, and accessibility, were unable to meet the growing demands of
modern security challenges. This led to the emergence of Digital Video
Recorder (DVR) security systems, which have revolutionized the field
of video surveillance.

The background of DVR security systems can be traced back to the


rapid advancements in digital technology. With the introduction of
digital encoding and compression techniques, video surveillance systems
underwent a transformation. DVR systems replaced the cumbersome
and time-consuming process of using tapes for recording and storing
video footage. Instead, they allowed for the digitization of video signals,
enabling efficient storage and retrieval of high-quality recordings.

Fig 2.1

04
The significance of DVR security systems lies in their numerous
advantages over analog systems. Firstly, DVR systems offer superior
image quality, thanks to digital encoding. This ensures that video
footage is captured and stored with exceptional clarity, allowing for
easier identification of individuals and events. Moreover, DVR systems
can store a significantly larger amount of data compared to analog
systems, thanks to the use of hard drives or external storage devices.
This increased storage capacity allows for longer recording durations
and the retention of crucial evidence.

Another significant aspect of DVR security systems is their ease of


use and accessibility. With remote access capabilities, users can monitor
live video feeds and access recorded footage from anywhere at any time
using smartphones, tablets, or computers. This level of flexibility and
convenience enhances the effectiveness of surveillance efforts and
enables proactive response to security incidents.

The implementation of DVR security systems has had a profound


impact on various sectors. In residential settings, homeowners can
monitor their properties remotely, enhancing safety and providing
peace of mind. In commercial environments, DVR systems help prevent
theft, monitor employee activities, and improve overall security
measures. Law enforcement agencies have also benefited greatly from
DVR systems, as they provide crucial evidence for investigations and
contribute to the prevention and deterrence of criminal activities.

05
In conclusion, the development and adoption of DVR security
systems have revolutionized video surveillance practices. These systems
offer superior image quality, increased storage capacity, and remote
accessibility, providing enhanced security measures for residential,
commercial, and public spaces. The background and significance of
DVR security systems lie in their ability to address the limitations of
analog systems and empower individuals and organizations to
proactively protect their assets and ensure the safety of their
environments.

Fig 2.2

06
CHAPTER-3
COMPONENTS OF DVR SECURITY SYSTEMS
DVR security systems consist of various components that work
together to provide effective video surveillance and security. These
components include:

Digital Video Recorder (DVR):


The DVR is the central unit of the system. It is responsible for
receiving, processing, compressing, and storing video footage from
connected cameras. The DVR typically includes a built-in hard drive or
external storage options for data storage.

Cameras:
Cameras are the primary devices that capture video footage. DVR
security systems can support multiple cameras, which can be positioned
strategically to cover different areas of interest. These cameras can be
wired or wireless, depending on the system configuration and
requirements.

Cables and Connectors:


Wired DVR security systems require cables and connectors to
establish connections between the DVR unit and the cameras. These
cables transmit video signals and power to the cameras. Common cable
types include coaxial cables, Ethernet cables, and power cables.

Power Supply:
DVR security systems require a stable power supply to operate. The
power supply provides electrical power to the DVR unit and the
connected cameras. It is important to ensure that the power supply is
reliable and capable of handling the power demands of the system.

07
Display Monitor:
A display monitor is used to view live video feeds and playback
recorded footage from the DVR unit. It allows users to monitor the
surveillance area in real-time and review past events. The display
monitor can be a dedicated monitor or a computer screen connected to
the DVR unit.

Remote Access Devices:


Many DVR security systems offer remote access capabilities,
allowing users to access live video feeds and recorded footage from
remote locations. Remote access can be achieved through smartphones,
tablets, or computers using dedicated applications or software provided
by the DVR manufacturer.

Network Connectivity:
DVR security systems often feature network connectivity options,
such as Ethernet ports or Wi-Fi connectivity. This enables the system to
connect to local networks or the internet, facilitating remote access and
integration with other devices or systems.

Software and User Interface:


DVR security systems come with software or user interfaces that
allow users to configure settings, manage recordings, and access various
features of the system. The software may include options for motion
detection, scheduling, video playback, and storage management.

08
These components work in harmony to create a comprehensive DVR
security system, providing effective surveillance, recording, and storage
capabilities. The combination of these components ensures that users
can monitor and protect their properties, deter criminal activities, and
maintain a secure environment.

Fig 3.1

Fig 3.2

09
3.1.HARDWARE REQUIREMENTS
The hardware requirements for a DVR security system may vary
depending on the specific system and its intended use. However, here
are some common hardware components typically required for a DVR
security system:

Digital Video Recorder (DVR) Unit:


The central component of the system, the DVR unit is responsible
for receiving, processing, compressing, and storing video footage. It
typically includes a built-in hard drive for storage.

Cameras:
Cameras are essential for capturing video footage. The number and
type of cameras needed depend on the surveillance requirements and
coverage area. Cameras can be analog or IP-based, with different
resolutions and features.

Cables and Connectors:


For wired systems, cables are necessary to connect the cameras to
the DVR unit. Common cable types include coaxial cables for analog
cameras or Ethernet cables for IP cameras. Connectors such as BNC
connectors or RJ45 connectors are used to make the connections.

Power Supply:
A stable and reliable power supply is crucial to power the DVR unit
and cameras. Depending on the system, individual power adapters or a
centralized power distribution unit may be required.

10
Monitor:
A display monitor is needed to view live video feeds and playback
recorded footage from the DVR unit. The monitor can be a dedicated
monitor or a computer screen connected to the DVR unit.

Storage:
The DVR unit typically has a built-in hard drive for video storage.
The capacity of the hard drive should be sufficient to meet the storage
requirements based on factors such as the number of cameras,
recording quality, and retention period. Additionally, external storage
options such as network-attached storage (NAS) or external hard drives
can be utilized for additional storage capacity.

Network Connectivity:
If remote access or network integration is desired, the DVR unit may
require network connectivity options such as Ethernet ports or Wi-Fi
capability. This allows for network communication, remote monitoring,
and remote access to the DVR system.

Enclosures and Mounting Hardware:


Enclosures and mounting hardware are necessary to protect the
DVR unit and cameras from environmental factors and provide secure
installations. Enclosures can be weatherproof for outdoor cameras or
rack-mounted for centralized systems.

Optional Accessories:
Depending on the specific requirements of the DVR security system,
additional hardware may be needed. This could include power surge
protectors, video amplifiers, audio recording devices, PTZ (pan-tilt-
zoom) cameras for flexible camera control, or alarm systems for
integrated security functionality.

11
Fig 3.3

Fig 3.4

Fig 3.5

12
3.1.2.SOFTWARE REQUIREMENTS
The software requirements for a DVR security system play a crucial
role in ensuring proper functionality, usability, and management of the
system. Here are some common software components and requirements
for a DVR security system:

Operating System:
The DVR unit typically runs on a dedicated operating system that is
optimized for video surveillance applications. Common operating
systems used in DVR systems include embedded Linux or proprietary
firmware developed by the manufacturer.

DVR Management Software:


The DVR management software provides a user interface for
configuring and managing the DVR system. It allows users to set up
cameras, adjust recording settings, configure motion detection, schedule
recordings, and perform other administrative tasks. The software
should be intuitive and user-friendly to facilitate easy system
management.

Video Management Software (VMS):


In more advanced DVR security systems, a Video Management
Software (VMS) may be included. The VMS offers enhanced features
such as centralized management of multiple DVR units, integration
with other security systems, advanced analytics, and remote monitoring
capabilities. VMS allows for a more comprehensive and scalable
surveillance solution.

13
Remote Access Software:
Remote access software enables users to remotely monitor live video
feeds and access recorded footage from the DVR system. This software
can be in the form of dedicated mobile apps or web-based applications
that provide secure access to the DVR system over the internet. The
software should support various operating systems and devices to
ensure compatibility and ease of use.

Video Playback Software:


Video playback software is used to view recorded footage from the
DVR system. It allows users to search, browse, and playback video
recordings based on specific dates, times, or events. The software
should offer features such as fast-forward, rewind, frame-by-frame
viewing, and exporting of video clips.

Firmware Updates:
Regular firmware updates provided by the DVR manufacturer are
essential to ensure system stability, security enhancements, bug fixes,
and compatibility with new hardware or software technologies. It is
important to have a mechanism in place to easily update the DVR unit's
firmware.

Integration APIs:
For more advanced deployments, integration APIs (Application
Programming Interfaces) may be required to integrate the DVR
security system with other security systems or third-party applications.
This allows for seamless integration with access control systems, alarm
systems, video analytics platforms, or centralized management
software.

14
Fig 3.6

Fig 3.7

15
CHAPTER-4
DVR SYSTEM ARCHITECTURE

The architecture of a Digital Video Recorder (DVR) system is a


crucial aspect that defines the structure, components, and flow of the
system. It encompasses both the hardware and software elements that
work together to enable video recording, storage, retrieval, and
management. Understanding the DVR system architecture is essential
for designing and deploying an effective surveillance solution.

Hardware Components:
The hardware components of a DVR system architecture include
the DVR unit, cameras, storage devices, and peripherals. The DVR unit
serves as the central processing unit, responsible for receiving video
feeds from cameras, encoding and compressing the video data, and
storing it onto storage devices. Cameras capture the video footage and
transmit it to the DVR unit through wired or wireless connections.
Storage devices, such as hard drives or network-attached storage
(NAS), provide the necessary capacity to store the recorded video data.
Peripherals like monitors, keyboards, and control devices allow for
system monitoring, user interaction, and configuration.

Software Components:
The software components of a DVR system architecture consist of
the operating system, DVR management software, and additional
applications. The operating system runs on the DVR unit, providing the
underlying functionality and control of the hardware components. The
DVR management software offers a user interface for system
configuration, camera management, recording settings, and
administrative tasks.

16
Video Capture and Processing:
The video capture and processing stage is a critical component of
the DVR system architecture. Cameras capture the video feeds, which
are then processed by the DVR unit. The video data is typically
encoded and compressed using industry-standard formats such as
H.264 or H.265 to optimize storage space without compromising video
quality. The DVR unit applies various processing techniques, such as
noise reduction, image enhancement, and frame rate control, to ensure
high-quality video recordings.

Storage and Data Management:


Storage and data management are integral parts of a DVR system
architecture. The DVR unit incorporates internal storage, typically in
the form of hard drives, to store the recorded video data. The storage
capacity can vary based on system requirements and the number of
cameras. The architecture may also support external storage devices,
network-attached storage (NAS), or cloud storage for expanded storage
capacity or data redundancy. Effective data management techniques
such as file indexing, metadata tagging, and data compression are
employed to optimize storage utilization and facilitate quick and
efficient retrieval of recorded footage.

Fig 4.1

17
User Interface and Remote Access:
The user interface is an important component of the DVR system
architecture, providing users with a graphical interface to interact with
the system. It allows users to configure system settings, manage
cameras, define recording schedules, and perform playback of recorded
footage. The user interface should be intuitive, user-friendly, and
accessible from both local and remote locations. Remote access is a key
feature of modern DVR systems, enabling users to monitor live video
feeds and access recorded footage remotely via web interfaces or
dedicated mobile applications.

Network Integration:
DVR systems often require network integration to facilitate
communication and integration with other systems. This can include
integration with access control systems, alarm systems, or central
management software. Network integration allows for centralized
monitoring and management of multiple DVR systems, data sharing
between different security systems, and streamlined workflows.

The architecture of a DVR system comprises hardware components,


software components, video capture and processing, storage and data
management, user interface and remote access, and network
integration. These components work together to create a robust and
efficient surveillance solution. By understanding the DVR system
architecture, users can make informed decisions during system design,
implementation, and operation, ensuring effective video surveillance
and security management.

18
Fig 4.2

Fig 4.3

19
CHAPTER-5
APPLICATION AREAS OF DVR SECURITY SYSTEMS

DVR security systems find applications in various areas where


video surveillance and security are crucial. The versatility and
effectiveness of these systems make them suitable for a wide range of
environments. Here are some common application areas where DVR
security systems are extensively used

Residential Properties:
DVR security systems are popularly installed in residential
properties, including houses, apartments, and gated communities. These
systems help homeowners protect their property, deter theft, monitor
entry points, and ensure the safety of their families.

Commercial Buildings:
DVR security systems are widely deployed in commercial buildings,
such as offices, retail stores, warehouses, and factories. These systems
enable business owners to monitor employee activities, prevent
unauthorized access, deter vandalism, and enhance overall security.

Public Spaces:
Public spaces like parks, shopping malls, airports, train stations,
and bus terminals benefit from the presence of DVR security systems.
These systems help monitor crowd movement, detect suspicious
activities, prevent incidents, and enhance public safety.

20
Educational Institutions:
DVR security systems are crucial for ensuring the safety of
students, staff, and property in schools, colleges, and universities. They
help monitor classrooms, hallways, parking areas, and common spaces
to deter violence, identify intruders, and resolve disputes.

Healthcare Facilities:
Hospitals, clinics, and nursing homes rely on DVR security systems
to maintain a secure environment for patients, staff, and valuable
medical equipment. These systems monitor entrances, hallways, waiting
areas, and critical areas to prevent theft, ensure patient safety, and
protect sensitive information.

Government Buildings:
Government buildings, including courthouses, city halls, police
stations, and public offices, require robust security measures. DVR
security systems play a vital role in monitoring these facilities,
identifying security breaches, and providing evidence in legal
proceedings.

Industrial Sites:
Industrial sites, such as manufacturing plants, refineries, and
construction sites, implement DVR security systems to protect valuable
assets, ensure worker safety, and monitor critical processes. These
systems help identify safety violations, detect equipment malfunctions,
and prevent unauthorized access to restricted areas.

21
Fig 5.1

Fig 5.2

22
Transportation:
DVR security systems are widely used in transportation
environments, including buses, trains, subways, and taxis. These
systems enhance passenger safety, monitor driver behavior, prevent
vandalism, and provide evidence in case of accidents or disputes.

Hospitality Industry:
Hotels, resorts, and restaurants utilize DVR security systems to
ensure guest safety, monitor public areas, and protect valuable assets.
These systems help prevent theft, maintain a secure environment, and
investigate incidents that may occur on the premises.

Critical Infrastructure:
DVR security systems play a crucial role in protecting critical
infrastructure such as power plants, water treatment facilities, and
telecommunications centers. These systems help monitor sensitive areas,
detect security breaches, and ensure the uninterrupted operation of
essential services.

The application areas of DVR security systems are diverse and


expansive, demonstrating their importance in safeguarding people,
property, and assets in various settings. These systems offer proactive
surveillance, real-time monitoring, and evidence collection capabilities,
contributing to the overall safety and security of individuals and
organizations.

23
CHAPTER-6
CODING

C PROGRAM:
#include <stdio.h>
#include <stdlib.h>
#include <string.h>

#define MAX_RECORDINGS 100

struct Recording
{
int day;
int month;
int year;
int duration;
};

struct DVR
{
struct Recording recordings[MAX_RECORDINGS];
int count;
};

void initializeDVR(struct DVR *dvr)


{
dvr->count = 0;
}

void addRecording(struct DVR *dvr)


{

24
if (dvr->count < MAX_RECORDINGS)
{
struct Recording newRecording;
printf("Enter the date (DD MM YYYY): ");
scanf("%d %d %d", &newRecording.day, &newRecording.month,
&newRecording.year);
dvr->recordings[dvr->count] = newRecording;
dvr->count++;
printf("Recording added successfully.\n");
} else
{
printf("Maximum number of recordings reached.\n");
}
}

void displayRecordings(struct DVR *dvr) {


printf("Recordings:\n");
for (int i = 0; i < dvr->count; i++) {
printf("Date: %02d/%02d/%04d, Duration: %d minutes\n",
dvr->recordings[i].day,
dvr->recordings[i].month,
dvr->recordings[i].year,
dvr->recordings[i].duration
);
}
}

int main()
{
struct DVR dvr;
initializeDVR(&dvr);

25
int choice;
while (1)
{
printf("\nDVR Tracking System\n");
printf("1. Add Recording\n");
printf("2. Display Recordings\n");
printf("3. Exit\n");
printf("Enter your choice: ");
scanf("%d", &choice);
switch (choice)
{
case 1:
addRecording(&dvr);
break;
case 2:
displayRecordings(&dvr);
break;
case 3:
printf("Exiting...\n");
exit(0);
default:
printf("Invalid choice. Please try again.\n");
}
}

return 0;
}

26
HTML PROGRAM:
<!DOCTYPE html>
<html>
<head>
<title>DVR Security System Dashboard</title>
<style>
body
{
font-family: Arial, sans-serif;
background-color: #f1f1f1;
margin: 0;
padding: 0;
}

.container
{
max-width: 800px;
margin: 0 auto;
padding: 20px;
background-color: #fff;
border-radius: 8px;
box-shadow: 0 2px 4px rgba(0, 0, 0, 0.1);
}
h1
{
text-align: center;
color: #333;
font-size: 24px;
}
h2
{

27
color: #007bff;
font-size: 20px;
}
.dashboard-section
{
margin-top: 40px;
}

.history
{
margin-bottom: 20px;
}

.history-item
{
display: flex;
align-items: center;
padding: 10px;
border-bottom: 1px solid #ccc;
}

.date
{
font-weight: bold;
margin-right: 10px;
color: #555;
}

.day-number
{

28
margin-right: 10px;
color: #888;
}

.camera-status
{
margin-right: 10px;
color: #888;
}

.login-logout
{
margin-right: 10px;
color: #888;
}

.server-status
{
margin-right: 10px;
color: #2ecc71;
font-weight: bold;
}

.server-status span
{
color: #555;
font-weight: normal;
}

.account-section
{

29
margin-top: 40px;
}
.account-form
{
background-color: #f9f9f9;
padding: 20px;
border-radius: 8px;
}

.account-form h3
{
margin-bottom: 10px;
}

.account-form label
{
display: block;
margin-bottom: 8px;
color: #555;
}

.account-form input
{
width: 100%;
padding: 8px;
border: 1px solid #ccc;
border-radius: 4px;
}

.account-form button {
padding: 10px 20px;

30
background-color: #007bff;
color: #fff;
border: none;
border-radius: 4px;
cursor: pointer;
}

.account-form button:hover
{
background-color: #0069d9;
}

.dvr-info
{
margin-top: 40px;
text-align: center;
}

.dvr-info img
{
max-width: 100%;
height: auto;
}

.dvr-info p
{
margin-top: 10px;
color: #555;

31
{
color: #007bff;
text-decoration: none;

}
</style>
</head>
<body>
<div class="container">
<h1>DVR Security System Dashboard</h1>

ANDROID STUDIO PROGRAM:


import android.Manifest;
import android.content.pm.PackageManager;
import android.hardware.Camera;
import android.media.MediaRecorder;
import android.os.Bundle;
import android.view.SurfaceHolder;
import android.view.SurfaceView;
import android.view.View;
import android.widget.Button;
import android.widget.Toast;
import androidx.appcompat.app.AppCompatActivity;
import androidx.core.app.ActivityCompat;
import androidx.core.content.ContextCompat;
import java.io.IOException;
public class MainActivity extends AppCompatActivity implements
SurfaceHolder.Callback
{

32
private Camera camera;
private SurfaceView surfaceView;
private MediaRecorder mediaRecorder;
private SurfaceHolder surfaceHolder;
private boolean isRecording = false;

private static final int REQUEST_PERMISSION = 200;

@Override
protected void onCreate(Bundle savedInstanceState)
{
super.onCreate(savedInstanceState);
setContentView(R.layout.activity_main);

surfaceView = findViewById(R.id.surfaceView);
surfaceHolder = surfaceView.getHolder();
surfaceHolder.addCallback(this);

Button recordButton = findViewById(R.id.recordButton);


recordButton.setOnClickListener(new View.OnClickListener()
{
@Override
public void onClick(View v)
{
if (isRecording)
{
stopRecording();
} else
{
startRecording();
}} }); }

33
private void startRecording()
{
if (ContextCompat.checkSelfPermission(this,
Manifest.permission.CAMERA) ==
PackageManager.PERMISSION_GRANTED &&
ContextCompat.checkSelfPermission(this,
Manifest.permission.RECORD_AUDIO) ==
PackageManager.PERMISSION_GRANTED)
{
try {
camera = Camera.open();
camera.unlock();
mediaRecorder = new MediaRecorder();
mediaRecorder.setCamera(camera);
mediaRecorder.setAudioSource(MediaRecorder.AudioSource.CAMC
ORDER);

mediaRecorder.setVideoSource(MediaRecorder.VideoSource.CAME
RA);

mediaRecorder.setOutputFormat(MediaRecorder.OutputFormat.MP
EG_4);

mediaRecorder.setAudioEncoder(MediaRecorder.AudioEncoder.AM
R_NB);

mediaRecorder.setVideoEncoder(MediaRecorder.VideoEncoder.MPE
G_4_SP);
mediaRecorder.setOutputFile("/sdcard/video.mp4");

34
mediaRecorder.setPreviewDisplay(surfaceHolder.getSurface());
mediaRecorder.prepare();
mediaRecorder.start();
isRecording = true;
Toast.makeText(this, "Recording started",
Toast.LENGTH_SHORT).show();
}
catch (IOException e)
{
e.printStackTrace();
}
} else
{
ActivityCompat.requestPermissions(this, new String[]
{Manifest.permission.CAMERA,
Manifest.permission.RECORD_AUDIO},
REQUEST_PERMISSION);
}
}

private void stopRecording()


{
if (isRecording)
{
mediaRecorder.stop();
mediaRecorder.release();
camera.lock();
camera.release();
isRecording = false;
Toast.makeText(this, "Recording stopped",
Toast.LENGTH_SHORT).show();

35
}
}
@Override
public void surfaceCreated(SurfaceHolder holder)
{
camera = Camera.open();
try {
camera.setPreviewDisplay(holder);
camera.startPreview();
} catch (IOException e)
{
e.printStackTrace();
}
}

@Override
public void surfaceChanged(SurfaceHolder holder, int format, int
width, int height) {

@Override
public void surfaceDestroyed(SurfaceHolder holder)
{
if (isRecording)
{
stopRecording();
}
camera.release();
}
}

36
CHAPTER-7
CONCLUSION

The integration capabilities of DVR security systems further


enhance their effectiveness. Integration with access control systems,
alarm systems, and video analytics platforms enables a comprehensive
security ecosystem. This integration facilitates seamless communication
and coordination between different security components, resulting in a
more robust and efficient security infrastructure. In today's rapidly
evolving security landscape, DVR security systems continue to evolve
and adapt to meet the changing needs and challenges. Technological
advancements in video quality, storage capacity, and remote access
capabilities further enhance the performance and usability of these
systems. DVR security systems offer a reliable and comprehensive
solution for protecting people, property, and assets. Their ability to
deter criminal activities, provide real-time monitoring, and gather
crucial evidence makes them an indispensable tool in ensuring safety
and security. By investing in a DVR security system, individuals and
organizations can gain peace of mind, knowing that their premises are
effectively monitored and protected.

37
CHAPTER-8
REFERENCE
Manufacturer Websites:
Visit the websites of leading manufacturers in the security industry.
They often provide detailed information about their DVR security
systems, including specifications, features, and technical
documentation.

Security System Blogs and Magazines:


Explore online blogs and magazines that focus on security systems
and surveillance technology. They often publish articles, reviews, and
industry insights related to DVR security systems.

Research Papers and Journals:


Consult academic databases, research papers, and journals related to
the field of security systems and video surveillance. These sources may
provide in-depth studies, analyses, and technical information about
DVR security systems.

Professional Associations:
Check the websites of professional associations or organizations
dedicated to the security industry. They may have resources,
publications, and white papers that cover DVR security systems.

When using information from external sources, it's important to


properly cite and reference them according to the required citation style
or guidelines provided by your institution or publication.

38

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy