3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13)
Automatic Interactive Security Monitoring System Akram M. Zeki1, Elbara Eldaw Elnour1 Adamu A. Ibrahim1, Chiroma Haruna2, Sameem Abdulkareem 2 1
2
Department of Information Systems International Islamic University Malaysia Kuala Lumpur, Malaysia
[email protected]
Abstract—Over the years an increasing demand for an automated security system begins to emerge. Many applications that help in protecting life and properties are being developed. Most of them are aimed at improving the work of security personnel and security agencies. However, security is a responsibility of everyone not only the security agencies or security personnel alone. This paper present an interactive security monitoring system based on passive infrared motion detection sensor, which will capture the image of any intruding persons and share it to the entire people that are using the system on both Android platform and in an online portal display. The people on the system can communicate with each other and post information to a commonly accessible board in the online system to discuss any issues or to see if anyone recognizes the felons/intruder on the images. Images of interest can then be transmitted to law enforcement authorities. This could be use in anywhere that needs to be protected against intruder. It will be best use in kindergarten, primary school and or in a neighborhood. That is why we call it neighborhood watch security system (NWSS). Preliminaries evaluation indicated an accurate image captured in a real time with an avoidance of false alarm. Keywords- passive-infrared-motion-detection-sensor; intruder detection; real-time detection; neighborhood-watch-system.
I.
INTRODUCTION
There is significant concern in monitoring activities of daily living by taking advantage of the recent development of ubiquitous technologies. Those activities could involves many things from different angles, like monitoring plants growths, monitoring children, monitoring people with mental disorder, monitoring patent in the hospital, or monitoring both indoor and outdoor area for security reasons. Over the years many new applications which helps to examine these issues emerges, base on the significant amount of research and development that is being directed towards increasing work efficiency and protection of life and properties. Years back in the 1960s, when there is no Security camera system with privacy protection into residential areas, Neighborhood watch (also known as block watch, apartment watch, home watch and community watch) grew out of a movement in the US during the late 1960s that promoted greater involvement of citizens in the prevention of crime. Since then, interest in neighborhood watch has grown considerably. However, with the recent increase in the technology of Security camera system with privacy protection like Closed-circuit television
Artificial Intelligence Department University of Malaya Kuala Lumpur, Malaysia
[email protected]
(CCTV), leads to a migration to technological base monitoring system. Video surveillance infrastructure consisting of hundreds or thousands of cameras are often seen in large scale surveillance systems, comprising of a number of CCTV cameras, installed in distributed premises and are connected to a central control station, where human operators observe the different camera views for identifying a probable security breach. In such situations, it is particularly difficult for the operator to pay attention to all camera views [1].These camera feeds are usually backhauled to a central monitoring location where some are recorded for a period of time on local view storage media, and some are displayed in realtime to one or more security personnel on a hank of video monitors. No matter how highly trained or how dedicated a human observer, it is impossible to provide full attention to more than one or two things at a time; and even then, only for a few minutes at a time. A vast majority of surveillance video is permanently lost without any useful intelligence being gained. The situation is analogous to an animal with hundreds of eyes, but one brain to process the information. This paper presents a system which will fully; substitute Security camera system especially the CCTV [2]. Because with CCTV being broadly accepted as one of the main strategies for monitoring daily activities in order to prevent crime, came alongside with a perceived high expectations as crime deterrent, but there is also a growing controversy over CCTV’s potentially unexpected limitations For example, the crime displacement where the presence of CCTV will change the locations of crime and its total number will not change, and the diffusion effects of crime control benefits where the crime prevention effect of CCTV may filter through to neighboring areas. While though is an empirical studies it is observed that crime prevention effect of the CCTV was significant, because robberies and thefts in the areas with CCTV installed reduced by 47.4%, while the areas without CCTV showed practically no change in the number of crimes [3]. One of the representing issues of the CCTV used for crime prevention is known as the balloon effect or ‘Crime Displacement’ which argues that CCTV will only relocate crimes to different places and have no effects in reduction of crime overall. The solution to this problem is automated video surveillance [4]. That is, computer software that watches video streams to determine activities, events, or behaviors that might be considered suspicious and provide
215
3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13) an appropriate response when such actions occur. The appeal of automated real-time surveillance is obvious - maximizing efficiency and effectiveness of security personnel and resources while increasing the probability of preventing a serious security breach The remains part of the paper is organized as follows: In Section II, the related work in this area is given. Section III presents an overview on the architectural frame of the system design, while, section IV present the system implementation. Finally, section V is the conclusion of the work. II.
RELATED WORK
A sizeable number of people are relying on the internet for home automation, supervision and day-to-day activities. Security concern has made it a requirement for home network technologies which utilizes wired and wireless infrastructure. Wireless (Universal Serial Connector) USBBased Home Security System on The Open Services Gateway Initiative (OSGi) Service Platform is already been use with a USB based wireless controller. The Universal Serial Bus is a widely used standard and is cross compatible with many devices and platforms making it a universal choice [5]. The USB controller is based on the OSGi Service Platform. The OSGi initiative framework is a module system for the Java programming language and provides a dynamic model that does not exist on a standalone Java environment or package [6]. The high performance USB controller is also be equipped with an Ethernet component allowing for network integration and internet control as well as being. Examples of items components connected to the framework include digital door locks, gas valve’s, gas sensors, magnetic sensors, infra red sensors and others [5]. The USB wireless controller provides an interesting insight into the possibilities of such a framework. The infra-red sensors used may also be used for motion and intruder detection and mixing the high bandwidth capacity of a USB port, directly integrate video streaming and image capture with the help of a USB camera. A worldwide home security system using PC-cameras and free software to allow users to monitor their homes (the e-Vigilante Network Project) has been proposed by [7]. It is implemented in Japan in order to cut-off the increase crimes that targeted private houses. The system was successful because, it was observed that the rate of arrests has decreased [7]. In another attempt, a Smart Home Security System Based on 3G project was proposed by [8], which aims at solving problems of crime in society utilizing 3G technologies to achieve remote notifications and to try to capture evidence of crimes being committed or any other situations by video transmitted in real-time through 3G connectivity. The newer 3G connectivity mode combines wireless connectivity with a higher data bandwidth thus also capable of multimedia transmission. The transmission of video of any event of concern that occurs is done by means
of buffering and transmission at the hardware level using an ARM9 processor to maximize the usage of 3G connectivity. Video is encoded and transmitted using an MPEG-4 format and algorithm There is also a Low Cost GSM/GPRS Based Wireless Home Security System proposed by [9]. Although, most systems are based on ZigBee, Bluetooth and wireless USB, but there are not energy efficient. Thus, a low power consumption system can be utilized with the use of GSM or GPRS (General Packet Radio Service) technologies. The system is composed of wireless security sensor nodes and a GSM/GPRS gateway. The GSM/GPRS gateway has the capability of informing the owner by SMS if any alarm is triggered. The system also implements an emergency alarm button that, if pressed by occupants, will inform the owner of an emergency. The gateway is connected to the various sensor nodes and alarms by means of wireless transceivers. The system also implements security features like door switches to detect unauthorized entry or infra red sensors to detect human motion and notify the owner. The gaps observed in the reviewed systems are the lack of portal on which a people will be able to directly interact, message each other and come together. There is also no method of notification when an intruder is detected. Thus, for this paper, the main issue addressed is the method of real time alarm, notification of users and social monitoring by users. III.
ARCHITECTURAL FRAMEWORK AND SYSTEM DESIGN
The architectural framework of the system composes of both an online system and an offline application (see Figure 1). The offline application will also use a database (small and only for detection information) and will at the same time be linked to the online database server for submitting of detected information.
Figure 1 Archtecural Framework
The captured images of intruders are then stored in the home owner’s computer and in an online system. The online system will be accessible from anywhere using a homeowner’s username and password and will show the captured images within the vicinity. Individual connected to the system within the vicinity will be able to communicate with each other and post information to a commonly accessible board in the online system to discuss any issues or to see if anyone recognizes the captured images. Images
216
3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13) of interest can then be transmitted to law enforcement authorities. When an intrusion is detected, the system will send an alert with information about point where the captured image is obtained. A notification to the owner’s vicinity where the image was captured is send through an SMS (Short Messaging Service) gateway to the owner’s phone or online if the owner has a Smartphone with an internet connection. The captured image is stored.
Figure 2 – System Overview
Figure 2 gives an overview of the designed system that will implement the architectural frame in Figure 1 exposing the different components of the system and how they are physically linked when implemented in a house. The detection unit could be a camera or any other detection mechanism or sensor. The hardware component of the system composed of an infra-red based sensor (Figure 3A), a camera and a light for night operation has also been fabricated. All components and circuitry have been enclosed in a box and connected to an Arduino microcontroller powered by an Atmel 328 microprocessor (Figure 3B). Figure 3C shows the hardware component.
A. The component model The component model involves, the surveillance unit, which is integrated with a personal computer by means of a java interface designed to communicate with the microcontroller and issue commands to it, the java interface will also be used to switch the unit on or off. The passive Infrared motion sensor functions in the electromagnetic spectrum just as other sensors, but its core attributes is exhibited at a wavelength that is longer than visible light. Thus as human body whose radiation is strongest at a wavelength of 9.4um implies that it any external sources will not pass through many as a result the present on human within the infrared can be coded and reported. Thus the sensor output follows very closely the photometry inverse square law [10]. Motion sensors are often used in indoor spaces to control electric lighting [11]. A motion detector i.e. Passive Infrared sensor (PIR sensor) is an electronic device that is being used to measure the infrared (IR) light radiating from objects in its field of view. PIR sensors are often used in the construction of PIR-based motion detectors. Apparent motion is detected when an infrared source with one temperature, such as a wall. All objects above absolute zero emit energy in the form of radiation [10]. Usually infrared radiation is invisible to the Human eye but can be detected by electronic gadgets designed for such a purpose [11]. The term passive in this instance means that the PIR device does not emit an infrared beam but merely passively accepts incoming infrared radiation. “Infra” means below our ability to detect it visually and “Red” is because of its Color representation which shows the lowest energy level of the color RED and applies to many sources of invisible energy. Thus, a simple equation can be used to model the sensor output S ( x, ϕ ) as a function of the distance x and the angle of incidence ϕ with the target surface: S ( x, ϕ ) =
α
(1) cos ϕ + β x2 where α and β are the model parameters. The α parameter includes: the radiant intensity of the IR emitters, the spectral sensitivity of the photodiode, the gain of the amplifier, and the reflectivity coefficient of the target. The first three factors are constant, but the last factor is target dependent. Thus, the parameter α can be expressed as the product of two parameters, α 0 and α i , being α 0 constant for all the measurements and expressed in Vm 2 and α i , a dimensionless reflectivity coefficient that can vary from 0 (black target) to 1 (white target). This parameter are modeled as follows: α = α 0α1 Figure 3. (A) Passive Infra-Red motion Sensor, (B) Arduino Microcontroller, (C) Hardware Surveillance Unit
cos ϕ = 1 − sin 2 ϕ
217
3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13)
S ( x, φ ) =
From α = α 0α1
S ( x, ϕ ) =
α 0α1
α x2
( 1 − sin ϕ ) + β 2
(2)
( 1 − sin ϕ ) 2
(3) x The β parameter equals the amplifier’s offset plus ambient light effect. It can be obtained by taking a reading without IR emission. Under these conditions, this reading will correspond with the value of the parameter β . A new reading is taken immediately after IR emission is activated By subtracting the previous reading, a signal without offset β is obtained. Thus, the influence of all the light sources, even fluorescent or incandescent lights, can be removed. By naming this ‘cleaned’ signal as y, Eq. (1) can be rewritten as α (4) y ( x, ϕ ) = s ( x, ϕ ) − β = 2 cos ϕ x The influence of the angle of incidence is modelled in the above equations using the factor cos ϕ assuming nearLambertian perfect diffuse behavior of the surfaces, following Lambert’s cosine law [10]. This assumption is invalid on some polished surfaces, but in our experience, most of the examined surfaces have shown satisfactory closeness to this law for angle values in the range ⎡ −450 , + 45⎤ More complete models such as the Phong ⎣ ⎦ model [9] can be used instead, but they require more parameters to define the model and more complicated procedures to obtain these parameters. . 2
B. The Business logic of the application The business logic module of the system is presented in Figure 4.
This module deals with the authentication of user credentials. It will also assign the type of user detected i.e. admin or basic user and the relevant webpage he would see. It will provide an interface for handling user information and details. These will include: Name, Email, Username (defaults to email), Password, Address, Phone number, Picture (User profile picture), Comments It will also provide the user the option to change their password. The detection module oversees the detections that are made and handles what is done with the images i.e. kept locally, submitted online. The message module provides users with an interface through which they can communicate privately with each other, each user is able to send and receive private messages. The public board module provides a public board upon which all users may post information or announcements and others are able to respond to these. The detection post just as discussed earlier is responsible for capturing of images of suspicious activity; the idea is that these images are then uploaded to the system. This module allows users to discuss each detection by posting information to pictures that are uploaded by the system. Users are able to post messages and respond to each other’s posts. The admin module provide avenue for the administrator of the site to control administrative privileges. He is able to add users who own an NGSS security kit to the system and provides them with a starting password and username so that they may login to the system. The administrator is also able to receive complaints and suggestions from the users in a complaints section of the website.The report generation module allows the administrator to generate detection reports of the entire neighbourhood. A user is also able to generate reports but he is mostly restricted to detections in his own home. Reports are generated in a csv format or a pdf format. Finally is the reporting module, which allows users to transmit any detected images to a police server (or a police department with the software allowing them to interface with the system in the future). IV.
SYSTEM IMPLEMENTATION
The Admin logs in ( see Figure 5) when logged in first gives a greeting interface that shows him the list of all owners registered with the systems and all unviewed detections that have been made on the right tab. Unread messages are also displayed on the right tab with their message subject. A count of detections and unread messages is also available for him on the side pane on the right. The administrator's currently chosen image is also viewable on the right tab.
Figure 4. The Business logic of the Application
218
3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13) The admin also has the ability to edit, view or delete anyone's profile and has the option of editing his own profile or sending messages to communicate with other home owners (see Figure 6). Figure 5. Admin Login interface
Figure 6. Admin viewing list detections and images.
He is also able to view all detections made by the system and post messages to individual detections. The admin can also access the front end by clicking on the "Go to Front End" link available on his sidebar, that also gives him access to all features that a normal home owner has an he interacts with the system as a home owner would. A normal user login view, display the user's home page which is a public board to which all members of the system post messages and communicate with each other. The user is also given a side panel that contains important information such as unread messages and unviewed detections in the neighborhood. The user also has access to a slide down menu that offers him access to other options of the system. (Private Messages, Detections, All homeowners, Complaints, Edit Profile). The user has a panel to the left that also shows a scrollable list of images of unviewed detections with the time and the house at which the detection has occurred.
A. Implementation of Android platform The android application will be used to basically notify the user whenever detection is made by the system. The app requires an android based Smartphone and an internet connection. The application connects to the online server to retrieve detections and information such as the house at
which the intrusion was made and the image that was captured by the system. The user can then view the image or click it to go online to the portal where he is able to view the detection and interact with it. The main interface for the android application is shown in Figure 7.
B. Online Portal Features The side panel in the website is retractable and can be removed from view using a toggle button on the top right of the webpage view. The full screen view of the website with the sidebar retracted. The sidebar can be retracted anywhere in a website to remove it from view if a user needs. Most elements in the system from buttons, to tabs, to components in the sidebar and the message inbox behave and react in a pleasantly animated fashion with the help of JavaScript programming. The system was designed in a combination of JavaScript and php programming, the JavaScript elements were made in a way to make the webpage interface also usable on a mobile phone device or a tablet interface. The website will auto detect the screen size it is viewed in and readjusts the elements to best suit the screen size. The website is viewable in three modes, a normal full view (desktop /laptop), a tablet view or a mobile phone view.
219
3rd International Conference on Research and Innovation in Information Systems – 2013 (ICRIIS’13) V.
CONCLUSION
This paper present social monitoring system that is capable of engaging everyone in monitoring certain vicinity. The objectives have been achieved, and Android Smartphone application for the system is appeared flexible in the sense that once its connected to the internet then it works as exactly as the desktop version. The system is currently limited to only capturing images and further enhancements can be made to the android app to add more functionality that the website has and to give the app functionality to also switch the system on and off remotely. It should not be too difficult to convert the image capture to video capture to be stored locally and images taken from the video frames to be uploaded to the online portal. REFERENCES [1]
Figure 7. Main android interface with sample detection
The only major change in tablet view is the way the sidebar is toggled and that is shown in the top right view. The same webpage in a mobile phone screen view is the same with online. The side tab fills the screen and the user can toggle it with the button labelled "menu" on the top right of the screen. To toggle the tabs that used to be on the left side on top in the normal view, the user can click on the button on the top left.
C. Desktop Graphical User Interface The desktop application is made in the Java programming language. It offers an interface to enable and disable the security system and also shows images of detections made. The desktop application links to both the hardware and the online database. It is necessary and acts as a bridge. It also contains easy access to the public board to show the last posts made by neighbors and allows a homeowner to also reply to those posts directly from the desktop application without having to go online and access the system on a browser.
Terry Boult, Ross J. Micheals, Xiang Gao, and Michael Eckmann. Into the woods: Visual surveillance of noncooperative and camouaged targets in compex outdoor settings. Proceedings of the IEEE, 89(10):1382{1402, October 2001. [2] R.M. Bolle, J.H. Connell, S. Pankanti, N.K. Ratha, and A.W. Senior. Guide to Biometrics: Selection and Use Springer-Verlag, New York, 2003. [3] Hyeon Ho Park, Gyeong Seok Oh, Seung Yeop Paek. Measuring the crime displacement and diffusion of benefit effects of open-street CCTV in South Korea. International Journal of Law, Crime and Justice, Vol 40 no.3, 2012, pp. 179-191. [4] Y. Wei, R. Torah, K. Yang, S. Beeby, and J. Tudor, "A novel fabrication process for capacitive cantilever structures for smart fabric applications," in Symposium on Design, Test, Integration & Packaging of MEMS/MOEMS, Cannes, France, 2012. [5] Hee-Sun Kim, Chang-Goo Lee, "Wireless USB-Based Home Security System on The OSGi Service Platform," in Consumer Electronics, 2007. ICCE 2007. Digest of Technical Papers. International Conference on, 2007, pp. 1-2. [6] Alves, Alexander de Castro, OSGi in Depth, First ed., 2011. [7] K.Hagiwara, Y.Chigira, N.Yoshiura, Y.Fujii, "Proposal for a world wide home security system using PC-cameras (the e-Vigilante Network Project)," presented at the SICE Annual Conference in Sapporo, Hokkaido Institute of Technology, Japan, 2004. [8] Y. Zhang, Guozhen Zhao, Yongjian Zhang, "A Smart Home Security System Based on 3G " presented at the International Forum on Computer Science-Technology and Applications, 2009. [9] Y. Zhao, Zhaohui Ye, "A Low Cost GSM/GPRS Based Wireless Home Security System," pp. 567 - 572, 2008. [10] Yoon-Sik Tak, Jongik Kim, Eenjun Hwang. Hierarchical querying scheme of human motions for smart home environment. Engineering Applications of Artificial Intelligence, Vol. 25 no. 7, 2012, pp. 13011312. [11] C. Tsai, Ying-Wen Bai, Chun-An Chu, Chih-Yu Chung and Ming-Bo Lin, “PIR-sensor-based Light-ing Device with Ultra-low Standby Power Consump-tion,” in Proc. IMTC, pp. 1524-1529, May,2011. [12] J. DiMaggio, W. Vernon, Forensic Podiatry: Principles and Methods, Humana Press, New York, 2011.
220