RRL About Video Monitoring System
RRL About Video Monitoring System
Kaylee Kolditz (March 3, 2020), a Business and Technology Writer, mentions in his blog that Video
surveillance systems can add next-level security to the company's efforts to deter crime. Strategically
placed cameras could mean would-be burglars bypass your business for an easier target. And if a crime
does occur, the video footage can provide important evidence for both the insurance company and the
police. Video surveillance systems involve strategic placement of security cameras, monitoring motion and
activity, generating alerts, transmitting footage, and storing that footage. Cameras can be both indoors and
outside.
Queen Denise P. Cuevas, John Carlo P. Corachea, Ederlina B. Escabel, Merwina Lou A. Bautista
(2016) says, as nations develop and their economies grow bigger, social problems also intensify. One great
concern deals with peace and order as well as safety and security of the people. Various psychologists
would render different explanations to the cases of crimes but what is apparent even to the most innocent
individual is that crimes are everywhere. Anyone can be a victim of crime; which fosters fear to a lot of
people. Knowing its responsibility, the government of different nations have launched various innovations
Title: “Benefits and Reasons for Business Security Cameras and Video Surveillance”
Martin Jones (n.d.) states 25 benefits and reasons for business security cameras and video
surveillance, when it comes to the overall safety and security of your business, video surveillance and
security cameras are a must. These are the reasons why: Security Cameras Increase Overall Safety; Video
Surveillance Can Help Prevent Shoplifting & Theft; Prevent Fraud; Can Prevent Employee Theft; Improve
Safeguards; Protects Against Burglary; Improved Perception of Concern for Costumer Safety; Improves
Outside Security for Costumer and Employees; Lower The Risk of Vandalism; Improve Employee
Productivity and Business Operations; Increase Sales; 24/7 Peace of Mind; Can Help Avoid Legal Claim
and Fraud; Provide Business Compliance; Aid Law Enforcement; Cost-Effective and Scalable; Provides a
Record of All Activity in Your Business; Reduce the Need for Hiring Additional Security Personnel; Can
Increase Business Profits; Monitors Customer Transactions; Makes Good Business Sense; Can Protect
Against Robberies; Can Reduce Monetary Losses; Become Proactive in Preventing Shoplifting; Recognize
Title: “SMART SURVEILLANCE MONITORING SYSTEM USING RASPBERRY PI AND PIR SENSOR”
Prasannajit Dash (June 2018) proposed the design and implementation of Smart surveillance
monitoring system using Raspberry pi and PIR sensor for mobile devices. It increases the usage of mobile
technology to provide essential security to our homes and for other control applications The proposed
home security system captures information and transmits it via a 3G Dongle to a Smart phone using web
application. Raspberry pi operates and controls motion detectors and video cameras for remote sensing
and surveillance, streams live video and records it for future playback. It can also find the number of
persons located with the help of the Infrared sensor. For example , when motion is detected, The cameras
automatically initiate recording and the Raspberry pi device alerts the owner of the possible intrusion
having a smart phone. Raspberry - Pi has two main components interacting with each other: one is the
Web Application that executes on the mobile device's browser and server -side scripts that run in a cloud
The potential of image processing can be used to enhance the role of CCTV cameras to
generate an alert to the concerned owners or the police officials whenever an intruder is detected in the
owners’ area. The project aims at developing a security alert system based on motion detection and face
recognition techniques in image processing. The frames captured by the camera are analyze d to detect the
presence of any motion and if the motion is detected for a particular time frame, the intruder’s face is
matched with the authorized database of persons provided by the owner of the place using face recognition
techniques. If the intruder’s face is not matched with any other in the database, an alarm is generated and
the intruder’s image is sent to the concerned owners and security officials.
It begins with the general initialization of the software parameters and the configuration of the
objects. Then, once the program has started, the value of the indicator indicates whether the stop button
has been pressed or not checked. If the stop button is not pressed, it starts to read the images and then
processes them using one of the two algorithms when the operator is selected. If a motion is detected, it
triggers a series of actions, then restarts the next images, otherwise it will directly read the following
images. Each time you press the stop button, the indicator value will be reset and the program will stop, the
memory will be erased and the required results will be recorded. This terminates the program and returns
Title: “Motion Detection and Face Recognition using Raspberry Pi, as a Part of, the Internet of Things”
machine communication, the IoT may be defined as a set of technologies designed to allow the connection
of heterogeneous objects through various networks and methods of communication. The main objective is
to position intelligent devices in different locations to capture, store and manage information, making it is
This solution is standard, but from the point of view of security, it carries various risks. Therefore, a
The structure of this system consisted of: Simple devices (e.g. in this case HD cameras) that act
as sensors and are capable of collecting information about the patient’s health and the environment if
necessary. A decision element, that is a decision maker with more powerful computing resources, in this
case, the Raspberry Pi 3. Sensors can detect the non-standard movement or falls and also capture their
faces. When a person enters the room, the sensors detect activity. Depending on how the camera is
rotated and the person's face is captured, the person can be identified (conditions depend on the degree of
Raspberry Pi B+ model is a credit card sized single board computers developed in the UK by the
Raspberry Pi Foundation, which provides all the basic features of a computer. Its core architecture is built
from ARM11 (Broadcom BCM2835 SoC). This project deals with Raspberry Pi processor, stepper motor,
webcam, PIR sensors and GSM module. Raspberry Pi which is heart of system collects surveillance data
through interfaces like webcam, PIR sensors. The video stream is locally as well as remotely visualized.
Role of a stepper motor is 3600 surveillance. Further, SIM900A module is used to interface GSM/GPRS
functionality with Raspberry Pi processor. The alert notification is sent to user, when Raspberry Pi detects
living body or motion of living body in surveillance area. Raspberry Pi transmits the real-time video through
internet as well as it sends notification message to the user though GSM module. The Raspberry Pi having
these all interfaces using communication ports like GPIO, Ethernet and USB.
Title: “Security System with Face Recognition, SMS Alert and Embedded Network Video Monitoring
Terminal”
This project is a novel system to prevent robbery in highly secure areas with lesser power
consumption. This system has face-recognition technology which grants access to only authorized people
to enter that area. If others enter the place without access using some other means, then the system alerts
the security personnel and streams the video captured by the security camera. The face recognition is done
using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT. By using this
ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.
The working of the ISS is explained in the latter half of the section. When the system is started, the
external sensor keeps sensing motion outside the door and the ISS is turned on as well. If the external
sensor detects motion, it triggers the face-recognition module, which in turn makes the camera take a
picture of the person in front of the door. The face-recognition module replies the micro-controller with a
binary result whether the person is recognized or not. If he/she is recognized, then the access is granted
else simply the access is denied, and the ESS after a few seconds, it resets itself. If the access is granted,
then the ISS is turned off and the access door is opened for 30 seconds. The timing can be adjusted
depending on the need. The person should enter the room and press the entry push button to notify the
system that the person has entered the room and if he/she fails to do that, then the access door will be
closed and the ISS will be turned on which would lead to the false alarm. When the person wants to leave
the room, he/she should press the exit 1 push button inside the door for the door to open and on exiting the
room he/she should press the exit 2 push buttonoutside the room to notify the system that the person has
left the room or the system will automatically close the door in 30 seconds which is also changeable and
Yes
Trigger
EVMT
SMS Alert
In surveillance, CCTV camera is costly because of the use of computer. It reserves too much
Stop
space for continues recording and also require manpower to detect the unauthorized Activity. But
Figure 4 Software Implementation of ISS
compared to the existing system Raspberry pi system is much cheaper with better resolution and low
power consumption feature. Here pyroelectric infrared (PIR) sensors are used as a simple but powerful
people presence triggers. This system is suitable for small personal area surveillance. i.e. personal office
cabin, bank locker room, parking entrance. Whenever the motion is detected through PIR sensor inside the
room the image is captured through camera and temporarily stored in the raspberry pi module. Internet-of-
things based application can be used remotely to view the activity and get notifications when motion is
detected. System works standalone without the PC once programmed. One android Application is used to
Title: “Motion Detection and Face Recognition for CCTV Surveillance System”
This research is designed with four main processes: motion detection process, fac e detection
process, data training process, and face identification process. In general, the architectural design of the
research can be seen in diagram of Figure 1. The first step is by acquiring video images from CCTV. Those
images will be used for motion detection process. If a motion is detected, the information of time stamp and
images with detected motion will be stored. Then, the motion value will be compared to face detection
threshold. If the motion exceeds it, the face recognition process will be committed. Images with detected
motion will be the input of face detection process. This process will decide if the face object exists. If it
exists, detection information will be recorded and continued to face identification process.
Title: “Smart Surveillance Monitoring System Using Raspberry Pi and PIR Sensor”
The design and implementation of Smart surveillance monitoring system using Raspberry pi and
PIR sensor for mobile devices. It increases the usage of mobile technology to provide essential security to
our homes and for other control applications. The proposed home security system captures information and
transmits it via a 3G Dongle to a Smart phone using web application. Raspberry pi operates and controls
motion detectors and video cameras for remote sensing and surveillance, streams live video and records it
for future playback. It can also find the number of persons located with the help of the Infrared sensor. For
example, when motion is detected, the cameras automatically initiate recording and the Raspberry pi
device alerts the owner of the possible intrusion having a smart phone. Raspberry - Pi has two main
components interacting with each other: one is the Web Application that executes on the mobile device's
browser and server-side scripts that run in a cloud which will be operated by the Raspberry Pi Hardware
tool component.
Title: “IoT Based Home Visitor Monitoring System Using Raspberry Pi”
In today’s world, face recognition is an important part for the purpose of security and surveillance.
Hence there is a need for an efficient and cost-effective system. Our goal is to explore the feasibility of
implementing Raspberry Pi based face recognition system using conventional face detection. This paper
aims at taking face recognition to a level in which the system can replace the use of passwords and RF I-
Cards for access to high security systems and buildings. With the use of the Raspberry Pi kit, we aim at
making the system cost effective and easy to use, with high performance. This paper details the design and
development of IOT based security surveillance system in buildings using Raspberry Pi single board with
Wi-Fi network connectivity. Upon detecting the face, the controller enables the camera for capturing the
event, alerts the user by placing the live video of that event on webpage that is displayed in android mobile.
The design of anti-theft security system is based on human face recognition and remote monitoring
technology. It will verify the person identity that goes near to the camera within certain distance. Only the
people who match the identity with database and key in the correct password have the right to entry. A
mobile application telegram and image processing technique LBP based have been involved in this system.
Electric door lock solenoid, keypad and LCD display will combined operate the accessibility of door.
Title: “Design and Realization of Motion Detector System for House Security”
The design and realization of motion detector system for house security-based GSM network is
presents. The development of microcontroller carried out intruder detection that supports tracking
techniques to provide vital security with control and alert operation inside and outside the home. The pivot
of security on the integration the motion detector and cameras into web applications has become more
interested. The smart surveillance Pi camera obtain the input from the motion detector and controller which
is send the video to the web server allowing the homeowner to access this video by use web applications.
An intrusion alert sends to the owner by mean of message via mobile and buzzers alarms located at
suitable distance. This system is typified proficient video camera for remote sensing and tracking with live
video for succeeding play again to offers efficient and easy implementation with omnipresent surveillance
solution.
Title: “Solar-powered, Wireless Smart Camera network: An IoT solution for outdoor Video Monitoring”
used in a variety of outdoor applications including video surveillance of public spaces, habitat and
environmental monitoring, wildfire prevention and detection, to name a few. SlugCam was designed such
that it can be deployed and left unattended for extended periods without requiring regular maintenance,
e.g., frequent battery replacement. The system is built with off-the-shelf components which not only keeps it
modular and low cost, but also facilitates its prototyping, rapid duplication, and evolution. SlugCam’s on-
board processing capability allows computer vision software to run locally and autonomously. Energy
efficiency in SlugCam is accomplished both in: (1) hardware by micro-managing low-power components; as
well as in (2) software by having the system’s operation duty cycles automatically adapt to the current state
of the battery in order to balance the trade-off between application-level requirements and power
awareness. For example, SlugCam’s smart camera node changes its monitoring behavior based on how
much battery charge remains. Additionally, using its computer vision software, the system only records and
transmits information upon event detection which contributes both to the system’s energy efficiency as well
transfer video files, as well as collaborate on tasks such as visual processing, event detection, and object
tracking. It allows node-to-node, as well as scoped- or full broadcast communication. For point-to-point
communication, SlugCam uses on-demand power-aware multi-path routing to transfer video files efficiently.
Another important contribution of SlugCam is to provide an open-source wireless camera network that can
adapt to address the requirements of future outdoor video monitoring applications. SlugCam also includes
a Web-based server where video data is stored as well as a Web-based user interface that allows end
users to interact with the system, tag, query and retrieve video files, and manage SlugCam nodes remotely.
In addition to a detailed description of SlugCam, this paper presents an extensive power characterization of
the system’s operation and showcases its deployment in a lab testbed and a real world scenario.
The house alarm system includes sensors, event, motions and all system activities has been
designed and running in MATLAB as showing in Figure above. In this design, when the system detects an
intrusion permit a certain time for alarm to be disable and otherwise calls the house owners. This system
illustrates how to use output events to derive all blocks and how to use direct event broadcasting to
coordinate between parallel states. Additionally, this model could show how to use the function call trigger
Web-based technology has improved drastically in the past decade. As a result, security
technology has become a major help to protect our daily life. In this paper, we propose a robust security
based on face recognition system (SoF). In particular, we develop this system to giving access into a home
for authenticated users. The classifier is trained by using a new adaptive learning method. The training data
are initially collected from social networks. The accuracy of the classifier is incrementally improved as the
user starts using the system. A novel method has been introduced to improve the classifier model by
human interaction and social media. By using a deep learning framework - TensorFlow, it will be easy to
SoF system experimental architecture inside a smart home. The SoF system consists of a camera
node, a cloud server, a smartphone and smart devices for interacting with users. The SoF system is shown
in Figure above.
Title: “Development of Face Recognition on Raspberry Pi for Security System Enhancement of Smart
Home System”
Nowadays, there is a growing interest in the smart home system using Internet of Things. One of
the important aspects in the smart home system is the security capability which can simply lock and unlock
the door or the gate. In this paper, we proposed a face recognition security system using Raspberry Pi
which can be connected to the smart home system. Eigenface was used the feature extraction, while
Principal Component Analysis (PCA) was used as the classifier. The output of face recognition algorithm is
then connected to the relay circuit, in which it will lock or unlock the magnetic lock placed at the door.
Results showed the effectiveness of our proposed system, in which we obtain around 90% face recognition
accuracy. We also proposed a hierarchical image processing approach to reduce the training or testing
same processing capability of a single core processor with built-in graphics which can support up to 1080p
video standard using its High Definition Media Input (HDMI) port. The ultrasonic sensor is used to detect
the human presence. The relay circuit is connected to Raspberry Pi and provides an interface to the high
voltage magnetic lock. The status could be shown using LED indicators and/or further send SMS using
GMS module, or email using internet connection, or as part of smart home system as proposed in. Finally,
the overall power required is less than 1 A, so that a compact power supply, i.e. smartphone charger, could
Title: “Smart Surveillance System using Thing Speak and Raspberry Pi”
This paper proposes the Smart Surveillance System using Thing speak and Raspberry pi. This
design is a small portable monitoring system for home and office security. The model uses hardware
mechanism such as Raspberry pi (model B), Gyro sensor and Raspberry pi camera. This system will
monitor when motion detected, the Raspberry Pi will control the Raspberry Pi camera to take a picture and
sent out an alert email with the image to the user by using Wi-Fi adaptor according to the program written in
python environment. And at the same time the sensor real time data is visualized in the form of charts in
Thing speak. The proposed system will work in standalone mode without the requirement of PC once
programmed.
The system consists of Raspberry Pi, Gyro sensor, Raspberry Pi camera, power supply and Wi-Fi
adaptor.
As IoT grows, devices become more cheaply available and facial recognition develops rapidly, the
need for a system using these three components arises. Combining these three technologies will allow
tackling a diversity of use cases, from replacing door locks to smart CCTV systems. The result of the
presented project is a working system using facial recognition with OpenCV, IoT over the MQTT protocol
and Clients on the Raspberry Pi as well as on an Android mobile application. The thesis builds a foundation
using these three components on a system applicable in many further scenarios of facial recognition in
Starting from the Raspberry Pi in the Figure above, the achieved system has a camera connected
to the Pi over USB. The Raspberry Pi is responsible for detecting the homeowner’s face. It will handle
dataset generation, machine learning and recognition. As soon as the owner’s face gets recognized or an
unknown face enters the apartment, a notification will be sent to the user’s mobile phone. For this
functionality a message is sent to an IoT hub/server which will then forward it to our mobile phone. When
the application receives a message from the server, it will then notify the user through notification on the
phone.
the Pi's core software, notably its default operating system, known as Raspbian. The bespoke OS is
designed to get the best out of the Pi hardware and loaded with free software -- both the everyday basics
like a web browser and office suite, but also tools for learning to code. Yet the official support is only half
the story, with much of the board's usability coming from the plethora of community-created guides and
tutorials -- with the answer to many questions only a Google away. Beyond the staunch community support,
the Pi can be augmented by a broad ecosystem of boards and kits that extend its capabilities, turning the
board into everything from a robot to a virtual assistant. The Pi also strikes a shrewd balance between price
and capability.
One interesting innovation of Video Monitoring System made by Saddam (November 11, 2016)
is Visitors Monitoring System with Image capture functionality. Interfacing Pi camera with Raspberry Pi to
capture the image of every visitor which has entered through the Gate or door. In this project, whenever
any person is arrived at the Gate, he has to press a button to open the Gate, and as soon as he/she press
the button, his/her picture will be captured and saved in the system with the Date and time of the entry. This
can be very useful for security and surveillance purpose. This system is very useful in offices or factories
where visitor entry record is maintained for visitors and attendance record is maintained for employees.
This Monitoring system will digitize and automate the whole visitor entries and attendances, and there will
be no need to maintain them manually. This system can be either operated by the person himself or there
Sameer Gode, Devendra Hande, Atharva Hinge, and Madhuri Ghuge (2019) proposed Embedded
Real-time video monitoring system based on ARM is designed, in which the embedded chip and the
programming techniques are used. The central computing microprocessor which uses Raspberry pi is the
core of the whole system. Real time video transmission is widely employed in police investigation,
conferencing, media broadcasting and applications that include remote assistance. First, Raspberry’s
Camera Module video data are collected by the embedded Linux system. All information is processed,
compressed and transferred by the processing chip. Then, video information is sent to the monitor client by
wireless network. This embedded observance system is to overcome the weak points of the traditional
video surveillance systems, such as complex structure, instability, and expensive cost. It can be widely
According to the News Security Guides (April 23, 2021). A motion sensor is a security device that
is installed in buildings to detect unauthorized movement in restricted areas, particularly after hours. The
device is used in commercial and residential properties, as well as on industrial and military premises.
There are various types of motions sensors on the market today. Motion sensors for homes are
manufactured with personal security and convenience in mind, and motion sensors for businesses are
designed to protect property as well, just on a larger scale. Motion sensors have become more advanced
in recent years, and now, they can even work with smartphone apps for remote activation from any
location. With motion sensors for homes, households enjoy advanced levels of security that keep family
Tuscano, Cynthia; Lopes, Blossom; Machado, Stephina; Rane, Pradnya (April, 2013) The basic
idea behind “smart web cam motion detection surveillance system” is to stop the intruder to getting into the
place where a high-end security is required. This paper proposes a method for detecting the motion of a
particular object being observed. The motion tracking surveillance has gained a lot of interests over past
few years. This system is brought into effect providing relief to the normal video surveillance system which
offers time consuming reviewing process. Through the study and evaluation of products, we propose a
motion tracking surveillance system consisting of its method for motion detection and its own graphic user
interface. Various methods are used in motion detection of a particular interest. Each algorithm is found
efficient in one way. But there exits some limitation in each of them. In our proposed system those
disadvantages are omitted and combining the usage of best method we are creating a new motion
detection algorithm for our proposed motion tracking surveillance system. The proposed system in this
paper does not have its effect usage in office alone. It also offers more convenient, effective and efficient
Metro Manila (CNN Philippines, November 17, 2020) — The National Privacy Commission
released guidelines on the use, access and storage of closed-circuit televisions, including the need to
destruction of footage are considered processing of personal data under the Data Privacy Act. It said
establishments must have a legitimate purpose before affixing the devices. These include compliance with
a law or regulation, security of properties and protection of important interests, ensuring public safety,
among other specific uses. Processing CCTV data and determining its location must only be done to fulfill
The agency's Advisory No. 2020-04 stated that establishments should also post visible notices in
points of entry or other conspicuous areas to inform the public that they are being monitored through a
CCTV. These entities should also have a CCTV policy that states who is authorized to use and access the
devices, and lays out the procedure for providing or disposing recordings.
Title: “Philippines: CCTV Use Guidelines Issued by the Philippine National Privacy Commission” -
LEXOLOGY
According to the Quisumbing Torres organization, mentions actions to consider in installing CCTV
systems that clients are advised to strictly comply with the foregoing Advisory to prevent any data privacy
and security issues arising from the use of CCTV systems, as well as to retain the trust of its clients and
employees. Clients which currently have or are intending to use CCTV systems are advised to implement
the security measures listed in the Advisory for CCTV operations, including the conduct of a Privacy Impact
Assessment (PIA), which considers the principles of lawful data processing in their CCTV operations.
Conspicuous CCTV notices, a CCTV policy which covers the matters required in the Advisory, as well as
an access request policy which states the forms, requirements, and procedures for data subject/third party
requests for access/copy of CCTV footage, should all be in place for any and all CCTV operations of the
company.
According to the requirements for CCTV Installment by The Private Security Authority (n.d.). There
is no theoretical limit to the number of cameras and monitors which may be used in a CCTV installation but,
in practice, this will be limited by the efficient combination of control and display equipment and the
operators’ ability to manage the system. The location survey shall have, at least, sufficient detail to address
the security requirements of the client and shall lead to a site plan being prepared with the optimal
positioning points for cameras being indicated on the site plan. The purpose of the location survey and site
plan is to identify the best placings for cameras, the direction of natural light, potential and actual
environmental problems.
Title: “What Are The Different Types of CCTV Camera?” – Caught On Camera
The Caught On Camera website (n.d.) DISCREET CAMERAS. These types of cameras allow for
discreet placement which means you can capture good footage of theft and criminal damage. Discreet
CCTV cameras beneficial because criminals will be less likely to spot them and therefore, they are less
likely to be damaged in the process. Other benefits of discreet CCTV cameras include: Can be propped up
or mounted; Can be disguised in various objects; and Effective for indoor use.
Title: “How-To Use Central Monitoring Software to View Security Cameras at Multiple Locations” – Security
Mike Haldas (February 8, 2018) There are many surveillance system applications that require
monitoring multiple locations remotely over the Internet so that security cameras can be centrally viewed.
CCTV Camera Pros has helped many types of customers that require this type of central monitoring
capability. Here are a few examples: Business owner with multiple locations needs to view all of their
cameras remotely from their office and home; Small business owner needs to be able to view their home
security cameras and business cameras on the same screen; Security company wants to offer remote
camera monitoring services to their clients and needs a system that supports it; Property management