security surveillance ppt
-
Upload
disha-makkar -
Category
Documents
-
view
327 -
download
62
description
Transcript of security surveillance ppt
Mid Seminar Presentation
SECURITY SURVEILLANCE AND SYSTEM INTEGRATION ByDisha Makkar Reg. No.: 090907185 Roll No.:198 , Section:D
Department of Electronics and Communication Engineering, MIT, Manipal
Contents Introduction iwatch surveillance Access control system GPS overview RFID Conclusion Scope of the work
References
Department of Electronics and Communication Engineering, MIT, Manipal
IntroductionElectronic security pertains to leveraging technology in safeguarding assets by preventing unauthorized access to people and property. The government has been a traditional and major consumer of such security services. The commercial segment also uses such devices for their employees and critical data infrastructure. Electronics Security Systems consists of following type of systems Video Surveillance/CCTV system GPS based tracking systems Access control system RFID based applications
Department of Electronics and Communication Engineering, MIT, Manipal
iWATCH surveillanceiWATCH DVR based surveillance system is the most advanced video surveillance system which is capable of not only recording and live monitoring, this system comes inbuilt with advanced video analytic and alarm notification functionalities. iWATCH CCTV Surveillance provides three type of CCTV solutions for any scenario. 1. Standalone Monitoring Solution 2. Remote monitoring Solution 3. Multi Location Remote Solution
Department of Electronics and Communication Engineering, MIT, Manipal
Stand alone system
remote monitoring system
Multi location system
Department of Electronics and Communication Engineering, MIT, Manipal
iWATCH network camera.
Network camera connection
Network Camera composition
Network camera interface
Department of Electronics and Communication Engineering, MIT, Manipal
iWATCH DVREmbedded operating system,1 SATA HDD supports max 2000 GB, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup. Model: IW E9004 (4 channel video DVR) Embedded operating system,2 SATA HDD supports max 2000 GB each, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup, Supports Alarm and PTZ, Remote view thru inbuilt web server and CMS. Model: IW A9004/08/16 (4 channel video DVR 2 Channel Audio )
Department of Electronics and Communication Engineering, MIT, Manipal
Video CompressionMJPEG, MPEG-4 and H.264 are three major video compression technologies used by the IP surveillance industry. Each technology has a different compression ratio and is intended for different applications and purposes.
MJPEG- Motion Joint Photographic Experts Group
MPEG-4
Compressed file size of MJPEG, MPEG-4 and H.264 Department of Electronics and Communication Engineering, MIT, Manipal
Video Management softwareApplication software together with the package to help users set up an IP surveillance system with ease. From the application software, Installation Wizard 2 and PC-based central management software ST7501 are included. Features: 1. Monitoring
2. Recording
Department of Electronics and Communication Engineering, MIT, Manipal
2. Video Playback
3. E-map
4. Auto back up5. Failure report
Department of Electronics and Communication Engineering, MIT, Manipal
Digital input devices
Digital output devices
Department of Electronics and Communication Engineering, MIT, Manipal
System DesignBefore deploying an IP surveillance system, having a layout map of the site at hand to identify the shooting purposes of each network camera is necessary and useful. The map gives you an overview of the installation site and helps you have an in-depth discussion with your customers. Viewing Considerations : direction, distance, angle, object Environmental considerations: day/night,light, outdoor, indoor, mounting, power outlet, Audio, bandwidth, storage System planning: Camera considerations - Indoor or outdoor, compression formats, cabling, resolution. Hardware considerations - PC, wireless access point, NVR Software considerations- central management software, browser, other s/wDepartment of Electronics and Communication Engineering, MIT, Manipal
Intelligent video systems
Video content analysis in distributed structure
Video content analysis in centralized architecture Department of Electronics and Communication Engineering, MIT, Manipal
Intelligent video systems
Intelligent Motion Detection
Tamper detection
Loitering Detection
People Counting License Plate Recognition Department of Electronics and Communication Engineering, MIT, Manipal
Access Control & Time Attendance SYSTEMAccess control is the only technology that proactively attempt to keep unauthorized individuals and vehicles out of a building or areas, and is a perfect complement to video surveillance in a comprehensive security solution proposal. Various solutions provided Biometrics Access Controller RFID reader & Controller Waist height turnstile Boom barrier (for In and Out) Ground Loop (For In & Out) System SoftwareDepartment of Electronics and Communication Engineering, MIT, Manipal
Access control system normally consists of Reader Controller Electronic lock/Turnstile/barrier etc. Based on the mechanism used to authenticate a persons identity access control system are categorized into following broad category Card Based Access control Biometric access control
Department of Electronics and Communication Engineering, MIT, Manipal
Solution providedWe propose Fingerprint and Mifare card based system as an alternative. This system uses fingerprint of the user to
authenticate the identity. As the number of user is high and todesign a machine independent system we propose to store fingerprint of the user into the Mifare card instead of the
fingerprint reader.The system consists of Mifare Card
Fingerprint & Mifare Card Reader and controllerMagnetic LockDepartment of Electronics and Communication Engineering, MIT, Manipal
Mifare Card reader and Controller We propose to use Fingerprint access control system with inbuilt Mifare card reader. This reader reads fingerprint and Mifare card both. For each door two readers are proposed, one for IN and another for OUT. OUT reader is proposed as the system will be used for time attendance purpose also. However instead of using OUT reader, EXIT switch can also be used for opening the door from the inside, in this case for registering OUT time employees has to register their out time at the IN reader. These reader supports TCP/IP connection thus any number of reader can be connected into a single server over LAN/WAN connection. ADSL Broadband/Leased line/GPRS/WiFi etc. can be used for WAN connectivity We propose single way electromagnetic lock of 600 lb holding force capacity. This lock can be fitted into any wooden/glass door.Department of Electronics and Communication Engineering, MIT, Manipal
Magnetic Lock
Software : available reports List of all users with Present / Absent status (Employee-wise, Shift-wise, Department-wise) Specific users report for a given date range Monthly report of all users Net Hours Reports List of employees in the premises at any given point of time Late Comers Reports List of all Late comers on a given date List of all Late comers for a given Month Specific Cardholders Report for a date range
Access ReportsDepartment of Electronics and Communication Engineering, MIT, Manipal
GPS OverviewHardware Section: The main function of this system is to keep a track of the position of a particular asset and its speed. The information regarding position and the speed will be provided by the GPS module.
Block Diagram:
89S52
AT24C128/ 256 Department of Electronics and Communication Engineering, MIT, Manipal
Two protocols which we will be using RMC protocol Multicast communication by means of the RMC protocol involves three key entities: the sending and receiving applications, the RMC protocol itself, and an underlying best effort multicast service, such as IP multicast. RMC is a NAK-based protocol. VTG protocol VTGCourse Over Ground and Ground Speed among the two we will prefer the VTG protocol for the simple reason that it provides with the speed in km/hr as well as in knots. Whereas RMC protocol provides us with speed only in knots.
Department of Electronics and Communication Engineering, MIT, Manipal
Software: TRAXTraX incorporates state-of-the-art GPS-based tracking, GIS based real time monitoring, an easy-to-use two way communication facility and new-age security alarm feature. It also fuses powerful reporting capabilities, enabling cost-effective maintenance.
Department of Electronics and Communication Engineering, MIT, Manipal
TraX GPS MOBILE PHONEKey Features: Frequency: GSM/DCS /PCS 850/900/1800/1900 Waterproof & Dustproof GPS: SiRF III Chipset Screen: 2.2 LCM/QVGA Dual SIM : Dual SIM/Dual Holding Battery: 1800 MAH Talk Time: 5-6 Hrs Standby Time: 300 hrs Antenna: Internal GPS/GSM Quick Keys: One key for GPS One key for SOS
SGP-20
Department of Electronics and Communication Engineering, MIT, Manipal
Key Features: Frequency: or 850/1900 Platform: Standby Platform GPS: Screen: 128x160 176x220 (opt) Dimension: mm Battery: Talk Time: Standby Time: Antenna: GPS/GSM Quick Keys: GPS GSM 900/1800 NXP Long SiRF III Chipset 1.8 65K TFT 2.2 65K TFT 106x46x15.5 1500 MAH 5-6 Hrs >1000 hrs Internal One key for One key for
TraX GPS Mobile MODEL - II
SOS Department of Electronics and Communication Engineering, MIT, Manipal
TraX GPS Vehicle Tracking SystemHumidity Dim. Weight Network Band GPS chip GSM/GPRS Module Sensitivity Accuracy 5%--95% noncondensing 87 * 64 * 26 (mm) 495g GSM/GPRS/GPS 900/1800/1900MHz or 850/900/1800/1900MH z SiRF III chip SIM300 or SIM340 -159dBm +/- 10 m
Time To First FixWork Voltage Battery Standby work current Storage Temp. Operation Temp.
Reacquisition Cold status Warm status Hot status
0.1s 45s 35s 1s
DC 9V30V Chargeable changeable 3.7V / 1.2Ah Li-ion battery < 30mA
-40C to +85C -20C to +70C
ST-X200
Department of Electronics and Communication Engineering, MIT, Manipal
On Route Replay
Department of Electronics and Communication Engineering, MIT, Manipal
Implementation :: On-Premises ModelThe product model is targeted for Companies who are willing to host the product in house. The Control Room will be located in their premises with all required software and hardware.Department of Electronics and Communication Engineering, MIT, Manipal
Implementation :: Service ModelThe product model is targeted for Companies who are willing to take the complete service from us with no infrastructur e setup required at Clients end.
Department of Electronics and Communication Engineering, MIT, Manipal
RFID- Radio Frequency IdentificationNew frontier in the field of information technology One form of Automatic Identification Provides unique identification or serial number of an object
RFID System
Department of Electronics and Communication Engineering, MIT, Manipal
RFID System Tags consists of antenna and a microchip Readers consists of a transmitter, receiver, and one or more antennas Management system Communication protocol Computer Networks
Department of Electronics and Communication Engineering, MIT, Manipal
RFID TAG Tag is a device used to transmit information such as a serial number to the reader in a contact less manner. Classified as : Passive Active Semi-passive
Department of Electronics and Communication Engineering, MIT, Manipal
Classification of Passive and Active tag
Department of Electronics and Communication Engineering, MIT, Manipal
RFID Reader Also known an interrogator Reader powers the tag by sending it RF energy Can be handheld or stationary Consists of: Transmitter Receiver Antenna Microprocessor Memory Controller or Firmware Communication channels PowerDepartment of Electronics and Communication Engineering, MIT, Manipal
EPC vs. UPC (Barcodes)Both are forms of Automatic identification technologies Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do not UPC require optical reader to read whereas EPC reader reads via radio waves EPC (Electronic Product Code) tags possess a memory and can be written while UPC do not. EPC UPC
Department of Electronics and Communication Engineering, MIT, Manipal
conclusionSurveillance is, quite simply, observations conducted to gain information. This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance. Many of these are recognizable through common knowledge produced by popular culture. The most well known methods include stationary surveillance, technical surveillance (typically covert video or audio recordings), electronic surveillance (digital observations, keystroke counting), and many more. .One of the most desired high end security system features is integrating video surveillance and electronic access control systems. Increasing penetration of the Internet and the development of innovative technologies have encouraged rapid growth of the IP surveillance industry, driving changes in the video surveillance market. It is expected that IP surveillance will be dominating the video surveillance market in the near future, with network cameras and video servers being major trends.
Department of Electronics and Communication Engineering, MIT, Manipal
Scope of further workThe market for electronic security equipment in India is largely untapped and underserved. Additionally, the consumers in the country need to be awakened to its importance, which will prove to be a daunting task for players operating in this segment. Mixed with the price sensitivity of Indian consumers, India will be a challenging market for such companies to operate in. The market holds immense potential for those players who are able to find the right mix of price, technology and awareness - the synergies of which will pay rich dividends for a companys investments in the electronic security industry in India. In a nutshell Residential and educational sectors, which have been largely untapped, will help provide a boost to the electronic security industry. Countrys southern region ranks first in the usage of security products followed by the western, northern and eastern parts of the country. Current taxation policies have yet to encourage domestic players to compete with international companies The main objective of the project is to figure out the best approach to integrate video surveillance with other security systems. While the industry conversation centres on the value of integration, the real challenge is how to make this happen, effectively, costefficiently and simply. Department of Electronics and Communication Engineering, MIT, Manipal
References[1] Sehgal, V.K. , "An Embedded Interface for GSM Based Car Security System Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference . [2] Sedky, M.H. Moniri, M. ; Chibelushi, C.C. , Classification of smart video surveillance systems for commercial applications, IEEE International Conference on Advanced Video and Signal based Surveillance
Department of Electronics and Communication Engineering, MIT, Manipal
END
Department of Electronics and Communication Engineering, MIT, Manipal