Professional Documents
Culture Documents
Myshri Techinal Seminar
Myshri Techinal Seminar
Submittedby
MYSHRI.R
degree of
BACHELOROFENGINEERING
IN
ELECTRONICSANDCOMMUNICATIONENGINEERING
TIRUTTANI –631209
ANNAUNIVERSITY:CHENNAI600025
MAY2023
BONAFIDECERTIFICATE
CertifiedthatthisTechnicalSeminarworkentitledas“SURVEILLANCE CAMERA
CONTROL SYSTEM”is
the bonafide work of “MYSHRI R (110320106026)” in partial fulfillment
fortheawardofBachelorofEngineeringinElectronicsandCommunicationEngineering
of the Anna University, Chennai, during the year 2022-2023. It iscertified that all
corrections/suggestions indicated for internal assessment
havebeenincorporatedinthereport.ThisTechnicalSeminarreporthasbeenapproved
as it satisfies the academic requirements in the respect of
TechnicalSeminarworkprescribedfor thesaiddegree.
SIGNATURE SIGNATURE
Dr.P.SIVAKUMAR,M.Tech.,Ph.D., DR.P.SIVAKUMAR,M.Tech.,PH.D.,
HEADOFTHEDEPARTMENT STAFF INCHARGE
PROFESSOR PROFESSOR
Department of Electronics Department of Electronics
andCommunicationEngineerin andCommunicationEngineerin
g g
GRTInstituteofEngineeringandT GRT Institute of Engineering
echnology, andTechnology,
MahalakshmiNagar, MahalakshmiNagar,
Tiruttani–631209 Tiruttani-631209
GRTINSTITUTEOFENGINEERINGANDTECHNOLOGY
TIRUTTANI – 631209
UNDERTAKING
I, MYSHRI R ( 110320106025)a bonafide student ofVIsemester, Bachelorof
Engineering in Electronics and Communication Engineering, GRT
InstituteofEngineeringandTechnology,Tiruttani-
631209,herebydeclarethatTechnicalSeminarworkentitled“SURVEILLANCE
CAMERA CONTROL SYSTEM”hasbeenindependently carried out by me under the
supervision of my Technical seminar Incharge DR.P.SIVAKUMAR.,M.TECH.(Ph.D),
Head of the Department, P rofessor,Department
ofECE,GRTIETandsubmittedmyreportinpartialfulfillmentoftherequirements for the
award of degree in Bachelor of Engineering in
ElectronicsandCommunicationEngineering,AnnaUniversity,Chennai-
25duringtheacademic year 2022-2023
Date: MYSHRI R
Place:Tiruttani (110320106025)
ACKNOWLEDGEMENT
First and foremost I place this Technical Seminar work on the feet
of GODALMIGHTY and OUR PARENTS who is the power of strength
in each step ofprogresstowardsthesuccessfulcompletion ofmyTechnical
SeminarWork.
Mysincerethankstohonorablechairman,Shri.G.RAJENDRANandM
anagingDirectorShri.G.R.Ananthapadmanabhanforcreatingawonderfula
tmosphereinsidethecampus.
I express my thanks to our principal, Dr.S.ARUMUGAM,
Ph.D.,Whohelpedusinprovidingrequired facilitiestocompletethis
TechnicalSeminarwork.
IexpressmydeepgratitudetoDr.P.SIVAKUMAR,M.Tech.,Ph.D.,Pro
fessor,HeadoftheDepartmentofElectronicsandCommunicationEngineering,
for giving the opportunity and facilities to complete our work in
time.IexpressmyspecialgratitudetotheTechnicalSeminarIn-
chargeDr.P.SIVAKUMAR,M.Tech., (Ph.D)., Head of the department,
Professor, Department ofElectronics and Communication Engineering, for
his kind Approach and guidancetowards Successful Completion ofthis
Technical Seminar work.
Finally, I thank my FACULTY MEMBERS and FRIENDS for
their moralsupportandvaluablesuggestionsin this TechnicalSeminarWork.
ABSTRACT
The demand for remote monitoring by high-definition, high-quality
video has been growing as high-definition surveillance cameras come on the
market and mobile networks for transmitting that video become capable of
higher speeds and larger capacities. We have developed a prototype high-
definition surveillance-camera system to meet this demand using surveillance
cameras capable of shooting high-definition video and a transcoder / camera-
control gateway. Our system uses protocols defined by Peer-to-peer Universal
Computing Consortium (PUCC) to control various kinds of devices over a peer-
to-peer network. This system enables remote high-quality video monitoring
from mobile phones by controlling a HDTV-quality video camera using PUCC
protocoL
.
TABLE OF CONTENT
CHAPTER NO
1 INTRODUCTION
5 SURVELLIENCE MONITOR
6 TYPES OF SURVELLIENCE
7 METHODS OF SURVELLIENCE
8 CONCLUSION
9 REFERENCE
CHAPTER 1
INTRODUCTION
Surveillance cameras may be in plain sight or hidden from view. The camera’s
purpose is to deter improper behavior, and the video footage can also serve as
evidence for later review by security staff or law enforcement. Depending on
your needs, there are many different video surveillance systems available, such
as live monitoring, remote access via an IP system, and Digital Video Recorders
(DVR) for recording footage.
Most video surveillance systems are closed off so that signals will not be
broadcast and accessible to other parties. Only authorized users can monitor
the content of what has been recorded on it. However, others may have access
if they are granted permission by an administrator with proper credentials who
manages the live feed.
CHAPTER 3
Generally, CCTV cable systems come with a number of tools and components.
To the layman, it’s rather too confusing. Therefore, it’s important to
understand the basics such as what a CCTV is and why opting for the right
cable matters.
Coaxial Cables:
Having been around for nearly a century now, coaxial cables are still quite
relevant in today’s world mainly due to its high property shielding quality. The
shielding helps in preventing any interference with the signal. The copper plate
in such cables helps in quickening the transmission of data. It’s a lot easier to
install, coming in two sizes for CCTVs:
RG-6:
This particular cable is made for higher bandwidth, made of copper and
aluminum, and for higher frequency. Therefore, it isn’t ideal for indoor CCTVs.
It’s a lot heavier than its other types, thus perfect for CCTVs used by city
authorities, administrations, police authorities.
RG-59 :
Similar to RG-6, the RG-59 refers to ‘Radio Guide’ while 59 refers to the
diameter size, i.e., .059 and uses a copper plate. This type of cable is
recommended for a lower bandwidth, therefore, it’s ideal for CCTV
installations particularly suitable for flats, apartments, societies, hotels and
other interior, relatively smaller places.
Current video surveillance data collection practices use local DVR or NAS
storage systems. The LTO Program discusses how organizations are struggling
to balance thebenefit of video surveillance with high costs and increasing legal
parametersWe live in a world where there is an increasing need for video
surveillance for crime prevention and public security and safety.
Video surveillance is being used in greater quantity and with higher quality
expectations in airports, cities and workplaces around the globe. In fact, the
average person is reportedly caught on a surveillance recording more than 75
times per day.From security camera footage to body cameras, this system of
surveillance is also producing gigantic amounts of data daily.
Body cameras and surveillance footage have been in the news nearly
every day over the past few years, and have played a huge role in many high
profile cases. For example, the role of video in law enforcement was invaluable
in bringing the 2013 Boston Marathon bombers to justice.
SURVEILLANCE MONITOR
Surveillance is the monitoring of behavior, many activities, or information for
the purpose of information gathering, influencing, managing or directing.[1][2]
This can include observation from a distance by means of electronic
equipment, such as closed-circuit television (CCTV), or interception of
electronically transmitted information like Internet traffic.
CHAPTER 6
TYPES OF SURVEILLANCE
Three types of surveillance
Direct survelliance
Precinstructivr survelliance
Reconstructive survelliance
Direct surveillance:
However, this technique can also monitor a wide range of public areas and
gather information from a large amount of population. Preconstructive
surveillance can also serve more than just as a surveillance technique but act
as a deterrent for future crime or malicious activity.
Reconstructive surveillance
For example, if a suspect had stolen something from a gas station store and
investigators could not find enough information through reconstructive
methods, they can go back to watch footage captured on the gas station's
CCTV cameras to see what the criminal touched or missing inventory to link the
suspect to the crime.
CHAPTER 7
METHODES OF SURVEILLANCE
1 satellite
2 video cameras
SATELLITE
Today, satellites are arguably the most advanced surveillance technology.
Satellites are launched into Earth's orbit to capture images anywhere on Earth
and send the information back to Earth. Satellites can be used to monitor large
areas with very specific details. They can detect body heat signatures, weapon
depots, drug storage, or a large movement of humans.
The drawback of satellites is that they are very expensive and can only capture
a certain area for so long before the Earth rotates, or inclement weather blocks
their visual.
VIDEO CAMERAS
Video cameras record the entire scene and save the data on a hard drive that
can be used as direct evidence linking a suspect to a crime in the court of law.
Video cameras can be public like CCTVs or covert such as hidden cameras.
ADVANTAGE
When away from the home or business, there might always be a worry
that something might happen. Especially for parents, thoughts of your family’s
condition or how your kids are doing with the babysitter might be weighing
heavy on your mind.
Disadvantages
Cons 1: Privacy Is an Issue
The terrorist attacks of 9/11 as well as the Boston marathon incident that
happened more recently raised the public awareness of security issues as well
as tremendously increased the importance of intelligent automated video
surveillance systems applied in public, commercial, law enforcement, and
military domains.
1. Highway Capacity Manual. Special Report No. 209. TRB, National Research
Council, Washington, DC, 1994.
3. Gordon, R.L. et. al. Traffic Control Systems Handbook. Report No. FHWA-SA-
95-032. FHWA, U.S. Department of Transportation, Washington, DC, February
1996.
5. Daniels, G., Starr, T., and Stockton, W.R. Guidelines for Funding Operations
andMaintenance of ITS/ATMS. Report No. FHWA/TX-97/1494-1F. Texas
Transportation Institute, College Station, TX, 1996.