Image Processing Techniques For Surveil
Image Processing Techniques For Surveil
Sangha’s
BAGALKOT-587 102
Dr. V. B. Pagi
Professor
Submitted by:
Name USN
D Teja 2BA16CS010
1
B. V. V. Sangha’s
BASAVESHWAR ENGINEERING COLLEGE (AUTONOMOUS),
BAGALKOT-587 102
CERTIFICATE
PLACE: Bagalkot
DATE: 22-11-2019
2
ACKNOWLEDGMENT
I have taken efforts in this project. However, it would not have been possible
without the kind support and help of many individuals and organizations. I
would like to extend my sincere thanks to all of them.
We would like to thank all the teaching and non-teaching staff of department of
Computer Science and Engineering for their coordination and support.
3
ABSTRACT
4
TABLE OF CONTENTS
1. INTRODUCTION
6
2. LITERATURE SURVEY 9
6. CONCLUSION 26
REFERENCES 27
5
1. INTRODUCTION
6
The Drone built on pixhawk module
Due to the great versatility and its large applications, the industry
experts are focusing on the unimaginable applications that has been never done
before.Even the development and research is also going on by communities like
pixhwak, dronecode.org, weforum.
2) Even they are used in the large construction sites(like dams) to determine
and keep monitoring the progress of work and labour.
3) Effective flood survey can be done by using drones, which will help to
provide the necessary flood relief actions.
7
Requirements and implementation details:
The images captured from the drone is sent to the control room system
using the RTMP(real time messaging protocol) which is a part of TCP protocol.
The project also includes the control room where the captured images of
drones are processed by the built neural network models and alerts the security
crew if any abnormality is detected later ,the crew can verify these images
immediately and take quick actions required.
8
2-LITERATURE SURVEY
9
to timely, cost-effective and very rich data acquisition, both, NEC Research as
well as TNO are pursuing investigations into the use of UAVs and swarms of
UAVs for scenarios where high-resolution requirements, prohibiting
environments or tight time constraints render traditional approaches ineffective.
10
implementation in the AEC domain, and outlining relevant research trends in
this setting.
9.Anuj Puri ,"A Survey of Unmanned Aerial Vehicles (UAV) for Traffic
Surveillance ",2018
The United States Department of Transportation (DOT) has been interested for
the past several years in obtaining data on traffic trends and to monitor and
control traffic in realtime. Currently, there are several methods by which the
DOT regulates and monitors road transport. Cameras mounted on towers,
detectors embedded in pavements or pneumatic tubes, and unmanned aircraft
have been proven to be expensive and time-consuming solution candidates.
However, aerial monitoring has the potential to yield detailed information to
help traffic planners, as well as commuters. Unmanned Aerial Vehicles (UAVs)
may provide a “bird’s eye view” for traffic surveillance, road conditions and
11
emergency response. The purpose of this technical report is to provide a survey
of research related to the application of UAVs for traffic management.
12
13.Isha Kalra and et al.,"DroneSURF: Benchmark Dataset for Drone-based
Face Recognition",2019
Unmanned Aerial Vehicles (UAVs) or drones are often used to reach remote
areas or regions which are inaccessible to humans. Equipped with a large field
of view, compact size, and remote control abilities, drones are deemed suitable
for monitoring crowded or disaster-hit areas, and performing aerial surveillance.
While research has focused on area monitoring, object detection and tracking,
limited attention has been given to person identification, especially face
recognition, using drones. This research presents a novel large-scale drone
dataset, DroneSURF: Drone Surveillance of Faces, in order to facilitate research
for face recognition. The dataset contains 200 videos of 58 subjects, captured
across 411K frames, having over 786K face annotations.
13
16.Eren Unlu and et al.," Deep learning-based strategies for the detection
and tracking of drones using several cameras",2019
Commercial Unmanned aerial vehicle (UAV) industry, which is publicly
known as drone, has seen a tremendous increase in last few years, making
these devices highly accessible to public. This phenomenon has immediately
raised security concerns due to fact that these devices can intentionally or
unintentionally cause serious hazards. In order to protect critical locations, the
academia and industry have proposed several solutions in recent years.
Computer vision is extensively used to detect drones autonomously compared
to other proposed solutions such as RADAR, acoustics and RF signal analysis
thanks to its robustness.
14
19.Keunhyun Park and Reid Ewing,"The Usability of Unmanned Aerial
Vehicles (UAVs) for Pedestrian Observation",2018
The monitoring of pedestrian activity is challenging, primarily because its
traffic levels are typically lower and more variable than those of motorized
vehicles. Compared with other on-the-ground observation tools, unmanned
aerial vehicles (UAVs) could be suitable for counting and mapping pedestrians
in a reliable and efficient way. Thus, this study establishes and tests a new
method of pedestrian observation using UAVs. The results show that UAV
observations demonstrate high levels of interrater reliability (intraclass
correlation coefficient = 0.99) and equivalence reliability (Cronbach’s α = .97
with on-the-ground counts and .73 with Google Street View). Practical
implications of the new tool are discussed.
15
22. Vivek Kishore Bhanse and et al.,”Face Detection and Tracking Using
Image Processing on Raspberry Pi”,2018
Image processing is nowadays used as a piece of various applications. Confront
area and its following is one of the basic frameworks used as a piece of the uses
of image processing. in this paper we have shown an application for the
improvement of the auto applications with the help of face revelation. The paper
shows the examination how the assurance of the camera impacts the edge each
seconds and respectably the perfect open door for stand up to acknowledgment.
The image processing using OpenCV for face detection, face tracking and its
recognition for automotive application is done here. We have used processor
controller and common USB camera for controlling the electrical motor which
in this way controls the motorized auto application.
16
will do a literature review on the previous worked from different researcher has
done on their research paper.
25. Ajay Talele and Aseem Patil,”Detection of Real Time Objects Using
Tensor Flow and OpenCV”,2019
17
3.ISSUES AND CHALLENGES
2. Most drones are designed to operate at a speed of 20mph ,thus we cannot use
them in an area withhigh wind speed
3. Cost:- Buying a drone fitted with all features needed foryour use maybe very
expensive.
18
4.Motivation,Scope and Problem Definition
The main motivation for the developing of this project is to provide the
better surveillance using these drones so security forces can take quick actions
and they will be also having the proof of security threats through which they can
catch the culprits responsible for it.
These are the several advantages of these drones which motivated for the
development of this project
Advantages:
Flexible: They can be armed with night vision cameras and thermal
sensors,allowing them to see what a human eye cant detect.
19
These are the several applications of image processing drones:
Security for Public Events, large events, festivals, concerts, and sports
Environmental Management
Data Generation
Surveying
Anti-terror operations
Border surveillance
Police-related activities
20
5.STATE DIAGRAM FOR THE PROPOSED SOLUTION
DESCRIPTION:
The General Proposed solution for surveillance drone is shown in the above
image, where
2. Record the video and stream it using the RTMP server to the surveillance
monitor.
3. Captures the images of unusual and abnormal activities and alert the security
crew by sharing those images and location where it took place.
4. Drone travel around the specified region and return back to land.
21
ACTIVITY DIAGRAM FOR THE PROPOSED SOLUTION
Step1) Initial state: The drone is started with the necessary power supply for
its operation.
22
Step2) Location & altitude drone: The drone is placed at a certain
Step3) Surveillance mode: After the drone has been placed it is kept
in surveillance mode which will continuously monitor the the geographical area
for detecting the abnormality.
Step4) Video streaming: The captured footages with time stamp, geographical
coordinates are continuously directed to the the system in the control room
where the neural network model will process, capture data from these images.
Step5) Abnormality detection: if image processed is not the normal one, then
immediately it alerts the crew regarding the abnormality.
Step6) Verify: The security crew will verify abnormal image and data extracted
from the image and take further actions according to judiciary immediately.
STEPS INVOLVED
Step 1: Stream the drone's video to a computer/laptop (drone -> your computer)
Step 2: Run an object detection model on the streaming video and display
results (on the your computer)
23
Step 3: Train your own object detection model (to detect new kinds of events).
The existing methods for dealing with this are by specifying for objects such as
simple geometric objects (e,g., Polyhedron), human faces, printed or hand-
written characters, or vehicles.
24
Recognition: One or several pre-specified or learning objects or object
25
CONCLUSION
The security threats have been increasing gradually, there is a need for
identifying and delivering the information regarding these threats to the security
forces quickly. So, they can take actions early, we are using the drones which
make surveillance in the particular geographical area and live streaming of the
images to the control room where the captured images are interpreted, analyzed,
processed and gives an alert message the security forces automatically
26
REFERENCES
27
13. Isha Kalra, Maneet Singh, Shruti Nagpal,"DroneSURF: Benchmark Dataset
for Drone-based Face Recognition",IIIT-Delhi, India,Year: 2019
14.Vroegindeweij, B.A.," Autonomous unmanned aerial vehicles for
agricultural applications",Research output of Wageningen University &
Research staff,Year: 2014
15.Dr. Markus Kückelhaus,"UNMANNED AERIAL VEHICLE IN
LOGISTICS",DHL Customer Solutions & Innovation ,Year: 2014
16.Eren Unlu,Emmanuel Zenou,Nicolas Riviere," Deep learning-based
strategies for the detection and tracking of drones using several
cameras",Springer link,Year: 24 July 2019
17.Rachel Rhodes, Natalie Spiegel, "Of The Effects Of Unmanned Aircraft
Systems On Seabirds And Marine Mammals",NOAA | Greater Farallones
National Marine Sanctuary,Year:2017
18.Dennis Vincenzi," Public Perception of Unmanned Aerial Systems (UAS): A
Survey of Public Knowledge Regarding Roles, Capabilities, and Safety While
Operating Within the National Airspace System (NAS) ",Scholarly Commons
Citation,Year:8-2013
19.Keunhyun Park, Reid Ewing, "The Usability of Unmanned Aerial Vehicles
(UAVs) for Pedestrian Observation",journals.sagepub.com,Year:October 19,
2018
20.Dr. Jangala. Sasi Kiran,"A Literature Survey on Digital Image Processing
Techniques in Character Recognition of Indian Languages",International
Journal of Computer Science and Information Technologies,Year:May 2015
21.SSurbhi Jainurbhi Jain and et al.,”Image Enhancement on OpenCV based on
the Tools: Python 2.7”,International Journal for Research in Applied Science &
Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ
Impact Factor:6.887 Volume 5 Issue VII, July 2017
22.Vivek Kishore Bhanse and et al.,”Face Detection and Tracking Using Image
Processing on Raspberry Pi”,Publisher: IEEE, 2018 International Conference.
23.Sudeshna Bhosale and et al.,”Face Detection and Recognition Techniques: A
Survey”,International Journal of Advanced Research in Computer and
Communication Engineering Vol. 7, Issue 11, November 2018
28
25.Ajay Talele and Aseem Patil,”Detection of Real Time Objects Using Tensor
Flow and OpenCV”,Asian Journal of Convergence in Technology Volume V
Issue I,ISSN NO: 2350-1146 I.F-5.11
29