Video Camera Security and Surveillance System ICAMES 2008 Team Members : Semih Altınsoy Denis Kürov Team Advisor: Assist. Prof. M. Elif Karslıgil May,

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

ARTIFICIAL PASSENGER.
Advanced Image Processing Student Seminar: Lipreading Method using color extraction method and eigenspace technique ( Yasuyuki Nakata and Moritoshi Ando.
By : Adham Suwan Mohammed Zaza Ahmed Mafarjeh. Achieving Security through Kinect using Skeleton Analysis (ASKSA)
Simple Face Detection system Ali Arab Sharif university of tech. Fall 2012.
COLORCOLOR A SET OF CODES GENERATED BY THE BRAİN How do you quantify? How do you use?
Robust 3D Head Pose Classification using Wavelets by Mukesh C. Motwani Dr. Frederick C. Harris, Jr., Thesis Advisor December 5 th, 2002 A thesis submitted.
Facial feature localization Presented by: Harvest Jang Spring 2002.
Virtual Dart: An Augmented Reality Game on Mobile Device Supervisor: Professor Michael R. Lyu Prepared by: Lai Chung Sum Siu Ho Tung.
ICIP 2000, Vancouver, Canada IVML, ECE, NTUA Face Detection: Is it only for Face Recognition?  A few years earlier  Face Detection Face Recognition 
CONTENT BASED FACE RECOGNITION Ankur Jain 01D05007 Pranshu Sharma Prashant Baronia 01D05005 Swapnil Zarekar 01D05001 Under the guidance of Prof.
LYU0203 Smart Traveller with Visual Translator for OCR and Face Recognition Supervised by Prof. LYU, Rung Tsong Michael Prepared by: Wong Chi Hang Tsang.
Project 4 out today –help session today –photo session today Project 2 winners Announcements.
Fig. 2 – Test results Personal Memory Assistant Facial Recognition System The facial identification system is divided into the following two components:
Computer Vision I Instructor: Prof. Ko Nishino. Today How do we recognize objects in images?
Dynamic Scalable Distributed Face Recognition System Security Framework by Konrad Rzeszutek B.S. University of New Orleans, 1999.
Smart Traveller with Visual Translator. What is Smart Traveller? Mobile Device which is convenience for a traveller to carry Mobile Device which is convenience.
Smart Traveller with Visual Translator for OCR and Face Recognition LYU0203 FYP.
Face Processing System Presented by: Harvest Jang Group meeting Fall 2002.
A Vision-Based System that Detects the Act of Smoking a Cigarette Xiaoran Zheng, University of Nevada-Reno, Dept. of Computer Science Dr. Mubarak Shah,
Oral Defense by Sunny Tang 15 Aug 2003
A Brief Survey on Face Recognition Systems Amir Omidvarnia March 2007.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
TEAM-1 JACKIE ABBAZIO SASHA PEREZ DENISE SILVA ROBERT TESORIERO Face Recognition Systems.
VINCENT URIAS, CURTIS HASH Detection of Humans in Images Using Skin-tone Analysis and Face Detection.
Facial Recognition CSE 391 Kris Lord.
Vision-Based Biometric Authentication System by Padraic o hIarnain Final Year Project Presentation.
Bus. Computer Applications Supervised by: t. Ahmed Abu msameh Prepared by Mohammed fathi al – amawi ID : CCTV systems.
Date / references EBMS Solution for Police Agenda EBMS Product Range Emergency Service Sensor Solution Tracking Solution Video Solution Check.
Face Recognition Using EigenFaces Presentation by: Zia Ahmed Shaikh (P/IT/2K15/07) Authors: Matthew A. Turk and Alex P. Pentland Vision and Modeling Group,
Eigenfaces for Recognition Student: Yikun Jiang Professor: Brendan Morris.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
RAGEEVGANDHI MEMORIAL COLLEGE OF ENGINEERING AND TECHNOLOGY
Introduction to electrical and computer engineering Jan P. Allebach School of Electrical and Computer Engineering
REMOTE SITE MANAGEMENT SOLUTION. AGENDA 2  About KoçSistem  Current Situation in Base Stations  Remote Site Management System: Sitelink  Sitelink.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Facial Feature Extraction Yuri Vanzine C490/B657 Computer Vision.
CensorNet Desktop Surveillance Description, Target audience, Positioning Components, Features
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Joon Hyung Shim, Jinkyu Yang, and Inseong Kim
1 Webcam Mouse Using Face and Eye Tracking in Various Illumination Environments Yuan-Pin Lin et al. Proceedings of the 2005 IEEE Y.S. Lee.
Face Recognition: An Introduction
A Face processing system Based on Committee Machine: The Approach and Experimental Results Presented by: Harvest Jang 29 Jan 2003.
Eye regions localization Balázs Harangi – University of Debrecen Ciprian Pop – Technical University of Cluj-Napoca László Kovács – University of Debrecen.
Design of PCA and SVM based face recognition system for intelligent robots Department of Electrical Engineering, Southern Taiwan University, Tainan County,
Supervisor: Nakhmani Arie Semester: Winter 2007 Target Recognition Harmatz Isca.
Final Year Project Vision based biometric authentication system By Padraic ó hIarnain.
Irfan Ullah Department of Information and Communication Engineering Myongji university, Yongin, South Korea Copyright © solarlits.com.
Face Detection Final Presentation Mark Lee Nic Phillips Paul Sowden Andy Tait 9 th May 2006.
ACTi IVS Server 2 (Intelligent Video Surveillance) Connecting Vision.
What’s New in Fireware v WatchGuard Training.
AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM
LOGO FACE DETECTION APPLICATION Member: Vu Hoang Dung Vu Ha Linh Le Minh Tung Nguyen Duy Tan Chu Duy Linh Uong Thanh Ngoc CAPSTONE PROJECT Supervisor:
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
 Many people like the flexibility of digital images. For example:  They can be shared by attaching to /uploading to Internet  Sent via mobiles.
Content Based Coding of Face Images
EE368 Final Project Spring 2003
Introduction to Skin and Face Detection
by Konrad Rzeszutek B.S. University of New Orleans, 1999
Wavestore Integrates…
Find It VR Project (234329) Students: Yosef Albo, Bar Albo
De- rotating face - Procedure Eye detection and mouth detection
An Infant Facial Expression Recognition System Based on Moment Feature Extraction C. Y. Fang, H. W. Lin, S. W. Chen Department of Computer Science and.
Announcements Project 4 out today Project 2 winners help session today
Speaker: YI-JIA HUANG Date: 2011/12/08 Authors: C. N
VISUAL COMMUNICATION USING ADOBE PHOTOSHOP CREATIVE SUITE 5
The “Margaret Thatcher Illusion”, by Peter Thompson
Presentation transcript:

Video Camera Security and Surveillance System ICAMES 2008 Team Members : Semih Altınsoy Denis Kürov Team Advisor: Assist. Prof. M. Elif Karslıgil May, 2008 YILDIZ TECHNICAL UNIVERSITY COMPUTER ENGINEERING DEPARTMENT

 Introduction  General System Modules  Motion Detection  Face Detection  Face Recognition  Zone  Network  Conclusions and future work

 The system is a video surveillance security system which alerts users for some situations.  The main workflow is that a fixed security camera will capture the videos continuously to checkout if there is movement in the area.  If there is any movement in the zone, the movement differentiation between the current and previous one. If the diffrence is above the predefined value, the object will be checked if it is human or not.  If the moving object is a human, its identity will be compared with current image database by face recognition module. If the face identity is not found in the database, the user will be alerted about current situation.  We will have permission rules for detection also. User can select rules for sending alarms, allow people, allow motion etc.

That system’s abilities are;  Burglar following  Prevent accessing forbidden areas  Child protection for accidents etc.

 System has five main module. - Motion Detection - Face Detection Lighting Compensation Skin Tone Detection in YCbCr Space Find eyes and mouth Resize Face - Face Recognition Compute Eigenspace Project the Training Data Identify the Test Images - Zone - Network

 Motion detection is a trigger for face detection and recognition module.  For motion detection we are looking for current and previous frame.  (Current Frame – Previous Frame) > Threshold  For this situation, we can understand that there is a motion.  Threshold is a value for motion sensitivity.

 This technique is a face detection in YCbCr color space.  Red-Green-Blue space is not a best choice for face detection.  Firstly system corrects the color with a lighting compensation technique. It uses reference white to normalize the color appearance.  The corrected RGB components are nonlinearly transformed in YCbCr color space.  Face Detection based on the cluster (Cb/Y)-(Cr/Y) subspace.  Skin-tone pixels are detected using an elliptical skin model in transformed space.

C’ i (Y)= { (C i (Y) – C i - (Y)) ∙ Wc i / Wc i (Y) + C i - (K h ) if Y<K l or K h <Y { C i (Y) if Y Є [K l, K h ], Wc i (Y)= { WLc i + ((Y-Ymin) ∙ (Wc i - WLc i ))/ (K l - Ymin) if Y< K l { WHc i + ((Ymax-Y) ∙ (Wc i - WHc i ))/ (Ymax- K h ) if K h <Y C b - (Y)= { ((K l - Y) ∙ ( )) / (K l - Ymin) if Y< K l {108 + ((Y- K lh ) ∙ ( )) / (Ymax- K h ) if K h <Y C r - (Y)= { ((K l - Y) ∙ ( )) / (K l - Ymin) if Y< K l {154 - ((Y- K lh ) ∙ ( )) / (Ymax- K h ) if K h <Y  We calculated transformed CbCr subspace with this transformation.

 And this is the ellipse formula for skin tones. x = (cosθ * C’ b (Y)-c x ) + (sinθ * C’ r (Y)- c y ) y= (-sinθ * C’ b (Y)-c x ) + (cosθ * C’ r (Y)- c y ) (x-ec x ) 2 / a 2 + (y-ec y ) 2 / b 2 = 1 Transformed CbCr Space Reference: Face Detection in Color Images - Rein-Lien Hsuy, Student Member, IEEE, Mohamed Abdel-Mottaleb, Member, IEEE, Anil K. Jainy, Fellow, IEEE

 Find Eyes and Mouth.  The color of mouth region contains red component and weaker blue component. So the chrominance component Cr is stronger than Cb in mouth region.  Mouth Map= Cr 2 ∙ ( Cr 2 – η ∙ Cr/Cb) 2  η = 0.95 ∙ ((1/n) ∑Cr(x,y) 2 ) / ( (1/n) ∑ Cr(x,y)/Cb(x,y) )  After the facial feature detection module rejects the regions that do not contain any facial features, we will find eyes of the face with black dots in the up-half of the picture. Reference: Face Detection in Color Images - Rein-Lien Hsuy, Student Member, IEEE, Mohamed Abdel-Mottaleb, Member, IEEE, Anil K. Jainy, Fellow, IEEE

 Eigenface (Training Stage) ‏  Load The image data into memory  Produce a centered image from all  Create data matrix  Create the covariance matrix  Compute the eigenvalues and eigenspaces  Order The EigenVectors  Each Trainig data is projected into eigenspace  Every sub eigenspace stored in XML for future use

 Eigenface (Testing Stage) ‏  Pull previous XML data into memory  Test image is mean centred  Mean centred image is projected into eigenspace  The sub eigenspace is compared with all training ones  If a very close match occurs the person is identified  Otherwise you are a bad person, sorry!

 That module is responsible for the rules that will be applied on different places on the screen.  When a new frame is taken, firstly it should pass the Zone Module's rules.  -add_Policy : That sub module adds a new policy to the current screen section. The options are “allow_all”,”deny_all”,”allow_only [list of users]”,”deny_only [list of users]”. The policies are kept in linked list object.  -remove_Policy: That one removes a policy rule.  -edit_Policy: Edits the mentioned one.  -list_Policy: Gets all list that was added.  -apply_policy : It works as follow; it scans the current security list and if it gets a match, it quits. If the apply_policy gets a negative result, it is an alert.

 Networking part (server)  Collecting alert videos and images  Responsible for Authentication and Authorization  Provides safer Data transfer for clients  Sends the videos and images to mobile and other clients  Uses X.503 certificates and SSL connections  Supplies log search and management for client parts  No malicious users around !

 Networking Part (Client and Server Case Study) ‏  At the beginning Server produces its certificate(root) ‏  Minions (clients) make server sign their certificates  They are known clients and can send data to server  A stranger is inside and detection part send alert with video  Client passes the security of server and send its video  Server now can alert the other minions that it signed before  Everything is safer when it is crypted with 256 bit

 In conclusion, this system can make burglar following, prevent accessing forbidden areas, child protection for accidents etc.  This system is a real time system. So its some features like face recognition and detection can be better and more faster.  Also for the future work there can be a mobile part.  The system can be manageable by remote clients like mobile phones, PDAs and other PCs. In that way users can receive and control alerts of the system and manage logs, videos that system saved as critical.  User can connect remote desktop computer with his/her mobile phone and control, manage logs and videos that system saved.

THANK YOU ???