Chapter 1
Chapter 1
Chapter 1
In this modern era of Internet of Things (IoT) we have all existing new
technologies to transform our life into simple means, it's a significant idea to
expand a system which can be restrained and observe from anywhere. This will be
an intelligent surveillance system which can be used for security point of view. The
main cause of this project is to design and develop a system that scans or monitors
the area in which it is executed. This system can be used in the area where there
will be no access to enter, also in area where we need to detect the unusual activity.
In this system a camera and different sensors have been used. The camera is used
to capture the images of unusual behavior happening in different direction. The
captured images are stored in USB or in particular folder in raspberry-pi for further
investigation. The images will be useful to work on then. As the sensors detect any
motion, the captured images are sent to mobile through IOT. So that the user will
get aware of crime taking place and will get real time image of things taking place.
Then the user can take necessary action. There are other categories of good quality
security systems and cameras for home security but they are much expensive. So,
we will setup a low cost easy to implement simple Raspberry Pi based theft
detection System, which not only alert consumer but also sends the picture of
Intruder.
The main telemetry framework was turned out in Chicago path in 1912. It is said to
have utilized phone lines to screen information from power plants. Telemetry
extended to climate observing during the 1930s, when a gadget known as a
radiosonde turned out to be generally used to screen climate conditions from
inflatables. In 1957 the Soviet Union propelled Sputnik, and with it the Space
Race.
This has been the section of aviation telemetry that made the premise of our
worldwide satellite interchanges today.
Expansive selection of M2M innovation started during the 1980s with wired
associations for SCADA (supervisory control and information obtaining) on the
production line floor and in home and business security frameworks. In the 1990s,
M2M started pushing toward remote advancements. ADEMCO fabricated their
own private radio system to address interruption what's more, smoke location since
sprouting cell network was as well costly. In 1995, Siemens presented the principal
cell module worked for M2M.
The Internet of Things might be a hotly debated issue in the business however it is
anything but another idea. In the mid 2000's, Kevin Ashton was laying the
preparation for what might turn into the Internet of Things (IoT) at MIT's AutoID
lab. Ashton was one of the pioneers who imagined this idea as he scanned for ways
that Delegate and Gamble could improve its business by connecting RFID data to
the Internet. The idea was basic yet amazing. On the off chance that all articles in
everyday life were furnished with identifiers and remote network, these articles
could be speak with one another and be overseen by PCs.
CHAPTER 2
Karan Siyal et.al. proposed the framework acknowledges the message and through
CAN Bus broadcasts the message to the whole vehicle network. The exact location
will be send to the owner within very less time. The GSM modem interfaced to the
microcontroller gets the message, the yield of which enacts a component that
cripples the ignition of the vehicle by using flow sensor which results in stopping
of the vehicle.
Pengfei Zhou et. al. depicted a system to alert the user if the unauthorized person
tries to take away the vehicle and stop the ignition and deactivate the gadget.
D. Jiang, V. Taliwal et. al. proposed a car security system involved with a GPS and
a GSM module. The user connects through this substructure with vehicles and
decides their present areas and status using Google Earth and the position of
alerted vehicles can be followed by client.
B.G. Nagaraja et.al. proposed motors of vehicles are controlled using GSM and
microcontroller. The secret word which has been declared needs to be sorted out
for the vehicle to start. At the point when the secret word coordinates then and at
exactly
that point ignition of the vehicle will begin. Every time secret key neglects to
match up to the three trials then framework will starts the siren and it will send the
message to the owner through GSM system.
Mingxiu Zhang presented the paper on “Real time tracking passing people using a
single camera” In this approach he examined about the location and following of
passing individuals by utilizing the bi-directional projection histogram of
histogram and furthermore utilized two casing contrasting techniques for different
individual’s division.
K.Shiva Prasad and M.Shirisha presented the paper on “Human Face Detection and
Tracking Using Raspberry PI Processor” which explains the techniques for human
face detection and tracking in real time using a modified version of algorithm
suggested by Paul viola and Michael Jones. It is based on object detection by
extracting some specific features from the image.
P. Angelov et.al. proposed a project focused on the basis to implement the object
detection and tracking based on its color, which is a visual based project i.e., the
input to the project will be the video/image data which is continuously captured
with the help of a webcam which is interfaced to the Raspberry Pi. It will detect the
object and it tracks that object by moving the camera in the direction of the
detected object.
Samreen Amir et. al. The proposed system performed according to its expectation.
The Raspberry pi offers better size but less speed. Accuracy of both systems was
similar even if the FPS rate is very different. Our algorithm can be implemented to
almost any marine environment given the task for which it is designed for.
From the literature review it is observed that theft detection using IOT makes our
life more comfortable by monitoring through camera and detecting any person or
intruder. IoT has been gradually bringing a sea of technological changes in our
daily lives, which in turn helps to making our life simpler and more comfortable,
though various technologies and applications. There is innumerable usefulness of
IoT applications into all the domains including medical, manufacturing, industrial,
transportation, education, governance, mining, habitat etc. Automatic human
detection and tracking is an important and challenging field of research and is
having many applications in it.
CHAPTER 3
Fig.3.1 Block diagram for IOT Based Theft Detection and monitoring system
Raspberry Pi
Raspberry Pi Camera
Display
3.1.1 Raspberry Pi
The Raspberry Pi is a Linux and ARM based microcomputer which was built
mainly to provide developing open source game. Raspberry pi is a little credit card
measured PC fit for performing different functionalities, for example, in
observation frameworks, military applications, and so on. The working framework
utilized here is Raspbian OS. Raspbian OS must be introduced with the goal that
the picture can be transmitted to the advanced mobile phone
Higher drive capacity for analog audio out, from a separate regulator,
which means a better audio DAC quality
3.2.2 Putty
Putty is a free and open-source terminal emulator, serial console and network file
transfer application. It supports a few system conventions, including SCP, SSH,
Telnet, rlogin, and raw socket connection. It can likewise interface with a serial
port.
3.2.3 OpenCV
Let us see how to compile and install OpenCV 4 on your Raspberry Pi. OpenCV 4
was officially released on November 20th, 2018. It is also possible to pip install
OpenCV as well! As of this update however, PyPi does not contain precompiled
OpenCV 4 binaries which can be installed via pip. Therefore, if you want OpenCV
4 then you’ll need to compile from source. To learn how to install OpenCV 4 on
your Raspberry Pi, just follow steps. Install OpenCV 4 on your Raspberry Pi
In this project, we’re going to install OpenCV 4 on your Raspberry Pi. OpenCV 4
has a goal of reducing bloat, adding optimizations, and updating the deep learning
module.
From there, we’ll walk through 7 steps to compile and install OpenCV 4 on your
Raspberry Pi. Compiling from source allows us to have full control over the
compile and build. It also allows us to grab the latest code — something that pip
and apt-get don’t offer.
Finally, we’ll test our OpenCV 4 install on our Raspberry Pi with a fun project. If
we don’t already have the Raspbian Stretch OS, you’ll need to upgrade your OS to
take advantage of Raspbian Stretch’s new features. To upgrade your Raspberry Pi
3 to Raspbian Stretch, you may download it here and follow these upgrade
instructions (or these for the NOOBS route which is recommended for beginners).
The former instructions take approximately 10 minutes to download via a torrent
client and about 10 minutes to flash the SD card with Etcher or another tool. At
that point you can power up and proceed to the next section. Physical access to
your Raspberry Pi 3 so that you can open up a terminal and execute commands
Remote access via SSH or VNC. We’ll be doing the majority of this tutorial via
SSH, but as long as you have access to a terminal, you can easily follow along.
Can’t SSH? If you see your Pi on your network, but can’t ssh to it, you may need
to enable SSH. This can easily be done via the Raspberry Pi desktop preferences
menu (you’ll need an HDMI cable and a keyboard/mouse) or running sudo service
ssh start from the command line of your Pi.
After you’ve changed the setting and rebooted, you can test SSH directly on the Pi
with the localhost address. Open a terminal and type ssh [email protected] to see if it is
working. To SSH from another computer you’ll need the Pi’s IP address — you
could figure it out by looking at your router’s clients page or by running ifconfig
on the Pi itself.
Keyboard layout giving you problems? Change your keyboard layout by going to
the Raspberry Pi desktop preferences menu. I use the standard US Keyboard
layout, but you’ll want to select the one appropriate for you.
If so, the first thing you should do is expand your filesystem to include all
available space on your micro-SD card:
Figure 1: Selecting the “Advanced Options” from the raspi-config menu to expand
the Raspbian file system on your Raspberry Pi is important before installing
OpenCV 4. Next we’ll actually expand the filesystem.
However, even with my filesystem expanded, I have already used 15% of my 32GB
card.
If you are using an 8GB card you may be using close to 50% of the available
space, so one simple thing to do is to delete both LibreOffice and Wolfram engine
to free up some space on your Pi:
After removing the Wolfram Engine and LibreOffice, you can reclaim almost 1GB!
Let’s navigate to our home folder and download both opencv and opencv_contrib.
The contrib repo contains extra modules and functions which we frequently use
here on the PyImageSearch blog. You should be installing the OpenCV library
with the additional contrib modules as well.
When you’re ready, just follow along to download both the opencv and
opencv_contrib code:
Now that opencv and opencv_contrib are downloaded and ready to go, let’s set up
our environment.
Virtual environments will allow you to run different versions of Python software in
isolation on your system. Today we’ll be setting up just one environment, but you
could easily have an environment for each project.
Let’s go ahead and install virtualenv and virtualenvwrapper now — they allow for
Python virtual environments:
Using a terminal text editor such as vi /vim or nano , add the following lines to your
~/.profile :
You can (and should) name your environment(s) whatever you’d like — I like to
keep them short and sweet while also providing enough information so I’ll
remember what they are for. For example, I like to name my environments like
this:
py3cv4
py3cv3
py2cv2
etc.
Let’s verify that we’re in the cv environment by using the workon command:
Navigate back to your OpenCV repo and create + enter a build directory:
Once CMake is finished, it’s important that you inspect the output. Your output
should look similar to mine below:
Figure 4: Ensure that “Non-free algorithms” is set to “YES”. This will allow you to
use patented algorithms such as SIFT/SURF for educational purposes.
Figure 5: The CMake command allows us to generate build files for compiling
OpenCV 4 on the Raspberry Pi. Since we’re using virtual environments, you
should inspect the output to make sure that the compile will use the proper
interpreter and NumPy.
Take a second now to ensure that the Interpreter points to the correct Python 3
binary. Also check that numpy points to our NumPy package which is installed
inside the virtual environment.
If you do not perform this step it’s very likely that your Pi will hang.
backup your .img file after installing OpenCV + Python just in case your card dies
unexpectedly early. You can read more about large swap sizes corrupting memory
cards on this page.
Compile OpenCV 4
Now we’re ready to compile OpenCV 4:
Here you can see OpenCV 4 has compiled without any errors:
If you see that you have version 4.0.0 installed, then you’re now fully armed and
dangerous + ready to perform computer vision and image processing.
3.2.4. RASPBIAN OS
Raspbian is a free working framework dependent on Debian enhanced for the
Raspberry Pi equipment. A working framework is the arrangement of fundamental
projects and utilities that make your Raspberry Pi run.
3.2.5 PYTHON
Python is an exceptionally incredible high level, object-oriented programming
language. It is a deciphered language. Driving the Raspberry Pi's I/O lines requires
a touch of programming and Python is the most favored in light of the fact that
Raspbian comes preloaded with Python, the official programming language of the
Raspberry Pi and IDLE.
3.3 Flow chart of IOT based Theft detection & Monitoring System
The project mainly emphasizes the importance of security and privacy in all
required places and thus this project produces a satisfactory solution for a long-
term standing problem.
Stage 2: It is then sent to the picture and video processing module where the face
and traits of the individual utilizing the framework is altogether checked and
contrasted and the models that is being set by the client through a remote systems
administration channel.
Stage 3: If the face/body and the qualities coordinate with the endorsed guidelines,
at that point the alarming module gets latent and the hinder is headed to zero. In the
event that the face and trait doesn't coordinate with the measures, at that point the
hinder is headed to one and the control is given to the administrator notice
framework.
Stage 5: This picture is then sent as an email to the client given email-id. At that
point the security enactment process is embraced. The image of the intruder is
taken and is sent to the email which will unmistakably recognize the picture of the
gatecrasher.
Chapter 4
4. Result
4.1 Email Notification
So as to consider email notifications to send, the OS needs a program that takes
into consideration mails to be sent. Basic Mail Transfer Protocol (SMTP) is a
program that permits a framework to convey an email from a neighborhood PC to a
mail host. It doesn't get mail yet can convey mail. SMTP is perfect for
circumstances where alarms are should have been sent, in this manner it is valuable
when sending warnings. A python content can be utilized to accomplish this. It
might simply send a warning without picture or can be altered to send a connection
alongside the caution message. For SMTP to help transmission of an appended
record, Multipurpose Internet Mail Extension (MIME) is required.
CONCLUSION
References
[3] Wai Zhao, Jayanand Jegatheesan and Son Chee Loon (2015) Exploring “IOT
Application Using Raspberry Pi, InterCheanational Journal of Computer Networks
and Applications”,Vol 2, Issue 1, January - February,2015.
[4] Yi Gu1, Myoungjin Kim1, Yun Cui1and Hanku (2014) ,“An UPnP-Based
Surveillance Camera System for Home Security”, International Journal of
Distributed Sensor Networks Vol 5,2014.
[5] Padmashree A. Shake and Sumedha S. Borde(2015), “Designing Approach of
an Intruder Realtime Ubiquitous Embedded Surveillance System”, Journal of
Theoretical and Applied Information Technology Vol 79,2015.
[8] Priya B. Patel, Viraj M. Choksi, Swapna Jadhav, M.B. Potdar, PhD(2016)
“Smart Motion Detection System using Raspberry Pi”, International Journal of
Applied Information Systems (IJAIS), Vol10 – No.5, February 2016.