SmartSurveillanceCameraUsingAI
SmartSurveillanceCameraUsingAI
net/publication/384642312
CITATION READS
1 450
6 authors, including:
Dr Manu Y M Shashikala S V
BGS INSTITUTE OF TECHNOLOGY, ADICHUNCHANAGIRI UNIVERSITY BGS Institute of Technology, Adichunchanagiri university
58 PUBLICATIONS 373 CITATIONS 34 PUBLICATIONS 91 CITATIONS
Dheeraj a P
BGSIT
1 PUBLICATION 1 CITATION
SEE PROFILE
All content following this page was uploaded by Dr Manu Y M on 08 October 2024.
Abstract—The Python script recognizes faces in real-time technology develops further, helping to create safer and
webcam video by using computer vision algorithms. For face more secure surroundings in a variety of settings, from
detection, facial feature encoding, and face comparison with public spaces to private facilities. The emphasis is on
known faces, it makes use of the Open CV and face quickly and automatically identifying and documenting
recognition packages. When the script detects a familiar face, unknown individuals in addition to recognized individuals.
it adds the name and the current time to a CSV file, indicating
the person's attendance. In a similar manner, it records This project aims to redefine surveillance technology
attendance for unidentified faces as "unknown." It also takes by leveraging the Dlib library, state-of-the-art face
pictures of faces you don't recognize and saves them for later recognition algorithms, and the flexibility of the Python
review or identification. The program repeatedly scans the programming language. The project's lens is the camera,
video stream for faces, identifying them and cross- which records live video feeds for accurate identification
referencing them with a database of recognized faces. After a and analyzes them in real time. The main goal of the project
brief pause, if an unknown face is identified, a second face is to smoothly incorporate AI into surveillance, bridging
recognition procedure is started to either validate the identity the gap between security and technology to develop a
or label the person as unknown. The script shows the promise system that is proactive rather than reactive. The Smart
of computer vision techniques in a variety of applications, Surveillance Camera Using AI project essentially imagines
such as security, identity systems, and attendance monitoring. a future in which security personnel's abilities areleveraged
It offers a straightforward but efficient approach for real- by an intelligent, active technology, replacing the
time face recognition and attendance tracking.
traditional practice of passive observation in surveillance.
Keywords—Facial recognition, Anomaly detection,
Facial recognition, categorization, and database
Artificial Intelligence powered surveillance. management are designed to completely reshape the
surveillance landscape and offer a reliable answer to the
I. INTRODUCTION constantly changing security concerns in our ever-
changing world.
Artificial intelligence (AI) is being incorporated into
more and more aspects of our lives in this age of rapid Artificial intelligence, especially through advanced m
technological growth. The Smart Surveillance Camera achine learning algorithms and computer vision, has creat
Using AI project is an innovative endeavor that aims to ed a new era in video surveillance. By analyzing large am
transform conventional surveillance systems. The project's ounts of video data in real time, AIpowered systems can i
main goal is to improve security by installing a dentify patterns and anomalies that may escape human ey
sophisticated camera system that can use facial recognition es.
to intelligently identify and categorize people. Theproject's
main goal is to overcome the shortcomings of traditional This project is motivated by the need for more
surveillance systems, which frequently rely on manual proactive and effective security solutions in a world that is
monitoring and are incapable of subtle detection. Our becoming more and more complicated. Real-time analysis
system aims to improve the surveillance capabilities, and quick reaction to threats are two areas where
especially in dynamic contexts; by utilizing AI.Strict data traditional surveillance systems frequently fall short. Our
access limits and anonymization are two aspects that solve goals in incorporating AI are to strengthen security
privacy issues. Smart surveillance cameras are set to usher protocols, overcome the drawbacks of traditional
in a new era of intelligent and efficient surveillance as approaches, and accelerate reaction times. Significant
Well-known researchers like R. Chellappa, C.L.Wilson The artificial intelligence (AI) smart security camera
and C. Sirohey, have made great contributions to the field uses a complex architectural framework that combines
of facial recognition technology [1]. Their research has real-time processing power, deep learning models, and
focused on a variety of topics, including algorithms, computer vision algorithms. Convolutional neural
feature extraction techniques, and matching methods, networks (CNNs) are the system's primary means of object
which has improved the accuracy and efficiency of detection and recognition. This allows the system to
recognizing people from images or video streams. The recognize a wide range of items, faces, and activities that
OpenCV library from Willow Garage, Itseez, and Intel are inside its field of vision. The CNN analyzes the video
Corporation provides a variety of functions [2], including frames that the camera continually records. The input data
facial recognition and detection, making this technology for the neural network is optimized by pre-processing
available to developers. methods like image resizing and normalization. The CNN
is able to distinguish between people, and other entities
Facial recognition jobs are made easier with Adam
because it has been trained on a wide range of datasets,
Geitgey's face recognition package, which is based on
which allows it to extract pertinent properties and classify
OpenCV and dlib and offers a high-level
persons [8]. All things considered, the smart security
interface[3].Facial recognition has been the subject of
camera makes use of AI-driven features to offer thorough
investigation for a number of researchers and developers;
monitoring, analysis, and response in a variety of security
as evidenced by the work of M. Taj-Eddin, M. Abaza, and
scenarios.
M. Daoud[4], as well as Woodrow Hartzog and Evan
Selinger, it provides automated and effective attendance A. Data Collection and Preparation:
tracking while addressing issues like real-time processing The code makes the assumption that there is a directory
and privacy concerns. Additionally, research by Chunbiao called "images Basic" with pictures of known individuals
Zhu, Jinjie Gu, and Zhijun Wang [5] has highlighted the in cases when tracking down the unknown is necessary.
advantages of these systems in terms of accuracy, Every picture should feature the face of a single person.
efficiency, and data analytic capabilities, as well as their These photos are read by the code, which then transforms
efficacy and user acceptability [6]. them into numpy arrays for analysis [9]. Fig.2 Shows
Future directions for facial recognition technology and Directory, imageBasic Stored with Known Faces.
attendance systems include deep learning-based methods,
multimodal biometrics integration, and context-aware
applications, according to experts like Alex Graves, Jürgen
Schmidhuber [7], and Geoffrey Hinton. By improving
recognition accuracy, robustness, and adaptation to various
contexts and use cases, these developments hope to pave
the path for future development and growth of face
recognition attendance systems to fulfill changing
demands and tackle new problems in the industry.
III. METHODOLOGY
An outline of the four main phases of the methodology
employed in the investigation is provided in this section,
with fig. 1. The first process involves collecting and
compiling data, while the second involves encoding faces. Fig. 2. Directory, imageBasic Stored with Known Faces.
The third phase involves Face recognition and
B. Encoding Faces:
In order to enable more reliable and precise recognition
under a variety of conditions and with variations in facial
expressions, this approach highlights the flexibility of
facial appearance modeling [10]. To simulate the
appearance of faces and account for variations in lighting,
position, and facial expression, this method makes use of
statistical techniques. The method produces pertinent
information from face photos using complex algorithms,
compares them with a database of recognized faces, and
allows for quick and accurate recognition. Fig.3 shows
scheme of face recognition
Extract existing names and store them in name list. The following formula can be used to calculate it; it shows
If the name is not present, append the current time along the harmonic mean of recall and precision [14].
with the name to the CSV file.
e i io e
Encode Known Faces: 1=2
Call find encodings() with the images list to get encodings e i io + e
for known faces.
Where,
Print 'encoding complete'.
True Positives (TP): Correctly identified faces.
Step7: Initialize a video capture object cap using
False Positives (FP): Incorrectly identified faces
cv2.VideoCapture (0).
(false alarms).
Step8: Continuously capture frames from the webcam.
True Negatives (TN): Correctly rejected
Convert the frame to RGB format.
unknown faces.
Detectfaces in the frame using
False Negatives (FN): Missed detections of
face_recognition.face_locations ().
known faces.
Encode the detected faces using face_recognition.
Accuracy: (TP + TN) / (TP + TN + FP + FN)
face_encodings ().
Compare the face encoding with known encodings using
e o i i e
face_recognition. compare_faces (). Precision =
e o i i e + e o i i e
If a match is found:
Get the corresponding class name. e o i i e
Draw a rectangle around the face and display the name and Recall =
e o i i e + e eg i e
timestamp.
If no match is found: Fig. 5 (b) shows how Comparison of five facial
Mark as unknown person. landmark localization between faces Recognition and
Perform additional face recognition within a short time MTCNN on the DHA.
window (5 seconds): These measurements shed light on several facets of the
Capture frames. functionality of the face recognition system[15]. In order
Process frames to detect faces and encode them. to store pictures of unidentified people in the database, you
If a match is found, mark and display the name. would normally take the following actions:
If no match is found, mark as 'unknown'.
Save frames as images. Fig. 6 (a) demonstrates classification by smart
Display the processed frame with rectangles and text. surveillance camera using AI
Wait for a key press to exit the loop. Fig.6 (b) shows Measurements and landmarks on the
Step9: Release the webcam and close OpenCV windows. lateral and frontal views of the face.
Fig.6 (b). Measurements and landmarks on the lateral and frontal views
of the face.
REFERENCES
[1] R. Chellappa, C.L. Wilson and C. Sirohey, ”Humain and machine
recognition of faces: A survey,” Proc. IEEE, vol. 83, no. 5, pp. 705-
740, may 1995.
[2] T. Fromherz, P. Stucki, M. Bichsel, “A survey of face recognition,”
MML Technical Report, No 97.01, Dept. of Computer Science,
University of Zurich, Zurich, 1997.
[3] Nefian and M. Hayes, ” An embedded hmm-based approach for
face detection and recognition,” In Proc. IEEE International
Conference on Acoustics, Speech, and Signal Processing, vol. 6,
pp. 3553–3556, 1999.
[4] M. Y. M, R. G. K and S. S. V, "Anomaly Alert System using CCTV
surveillance," 2022 IEEE 2nd Mysore Sub Section International
Conference (MysuruCon), Mysuru, India, 2022, pp. 1-5, doi:
10.1109/MysuruCon55714.2022.9972363.
[5] Dankan Gowda, V., et al. "IOT Based Smart Health Care System
to Monitor Covid-19 Patients." International Journal of Electrical
and Electronics Research (2022): 36-40.
[6] U.S. Department of Defense, ”Facial Recognition Vendor Test,
2000,” Available:
http://www.dodcounterdrug.com/facialrecognition/FRVT2000/frv
t2000.htm.
[7] G.D. Guo, H.J. Zhang, S.Z. Li. "Pairwise face recognition". In
Proceedings of 8th IEEE International Conference on Computer
Vision. Vancouver, Canada. July 9-12, 2001.
[8] Manu, Y. M., et al. "APPROACHES FOR QUALITY-AWARE
VIDEO CONTENT ANALYTICS." (2019).
[9] O. Deniz, M. Castrillon, M. Hernandez, “Face recognition using
independent component analysis and support vector machines,”
Pattern Recognition Letters, vol. 24, pp. 2153-2157, 2003.
[10] Murthygowda, Manu Yadakere, Ravikumar
GuralamataKrishnegowda, and Shashikala