Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 21

A TECHNICAL SEMINAR REPORT

Submittedby

MYSHRI.R

In partial fulfilment for the award of the

degree of

BACHELOROFENGINEERING

IN

ELECTRONICSANDCOMMUNICATIONENGINEERING

GRT INSTITUTE OF ENGINEERING AND TECHNOLOGY

TIRUTTANI –631209

ANNAUNIVERSITY:CHENNAI600025

MAY2023
BONAFIDECERTIFICATE

CertifiedthatthisTechnicalSeminarworkentitledas“SURVEILLANCE CAMERA
CONTROL SYSTEM”is
the bonafide work of “MYSHRI R (110320106026)” in partial fulfillment
fortheawardofBachelorofEngineeringinElectronicsandCommunicationEngineering
of the Anna University, Chennai, during the year 2022-2023. It iscertified that all
corrections/suggestions indicated for internal assessment
havebeenincorporatedinthereport.ThisTechnicalSeminarreporthasbeenapproved
as it satisfies the academic requirements in the respect of
TechnicalSeminarworkprescribedfor thesaiddegree.

SIGNATURE SIGNATURE
Dr.P.SIVAKUMAR,M.Tech.,Ph.D., DR.P.SIVAKUMAR,M.Tech.,PH.D.,
HEADOFTHEDEPARTMENT STAFF INCHARGE
PROFESSOR PROFESSOR
Department of Electronics Department of Electronics
andCommunicationEngineerin andCommunicationEngineerin
g g
GRTInstituteofEngineeringandT GRT Institute of Engineering
echnology, andTechnology,
MahalakshmiNagar, MahalakshmiNagar,
Tiruttani–631209 Tiruttani-631209
GRTINSTITUTEOFENGINEERINGANDTECHNOLOGY
TIRUTTANI – 631209

DEPARTMENT OF ELECTRONICS AND


COMMUNICATIONENGINEERING

UNDERTAKING
I, MYSHRI R ( 110320106025)a bonafide student ofVIsemester, Bachelorof
Engineering in Electronics and Communication Engineering, GRT
InstituteofEngineeringandTechnology,Tiruttani-
631209,herebydeclarethatTechnicalSeminarworkentitled“SURVEILLANCE
CAMERA CONTROL SYSTEM”hasbeenindependently carried out by me under the
supervision of my Technical seminar Incharge DR.P.SIVAKUMAR.,M.TECH.(Ph.D),
Head of the Department, P rofessor,Department
ofECE,GRTIETandsubmittedmyreportinpartialfulfillmentoftherequirements for the
award of degree in Bachelor of Engineering in
ElectronicsandCommunicationEngineering,AnnaUniversity,Chennai-
25duringtheacademic year 2022-2023

Date: MYSHRI R
Place:Tiruttani (110320106025)
ACKNOWLEDGEMENT

First and foremost I place this Technical Seminar work on the feet
of GODALMIGHTY and OUR PARENTS who is the power of strength
in each step ofprogresstowardsthesuccessfulcompletion ofmyTechnical
SeminarWork.
Mysincerethankstohonorablechairman,Shri.G.RAJENDRANandM
anagingDirectorShri.G.R.Ananthapadmanabhanforcreatingawonderfula
tmosphereinsidethecampus.
I express my thanks to our principal, Dr.S.ARUMUGAM,
Ph.D.,Whohelpedusinprovidingrequired facilitiestocompletethis
TechnicalSeminarwork.
IexpressmydeepgratitudetoDr.P.SIVAKUMAR,M.Tech.,Ph.D.,Pro
fessor,HeadoftheDepartmentofElectronicsandCommunicationEngineering,
for giving the opportunity and facilities to complete our work in
time.IexpressmyspecialgratitudetotheTechnicalSeminarIn-
chargeDr.P.SIVAKUMAR,M.Tech., (Ph.D)., Head of the department,
Professor, Department ofElectronics and Communication Engineering, for
his kind Approach and guidancetowards Successful Completion ofthis
Technical Seminar work.
Finally, I thank my FACULTY MEMBERS and FRIENDS for
their moralsupportandvaluablesuggestionsin this TechnicalSeminarWork.
ABSTRACT
The demand for remote monitoring by high-definition, high-quality
video has been growing as high-definition surveillance cameras come on the
market and mobile networks for transmitting that video become capable of
higher speeds and larger capacities. We have developed a prototype high-
definition surveillance-camera system to meet this demand using surveillance
cameras capable of shooting high-definition video and a transcoder / camera-
control gateway. Our system uses protocols defined by Peer-to-peer Universal
Computing Consortium (PUCC) to control various kinds of devices over a peer-
to-peer network. This system enables remote high-quality video monitoring
from mobile phones by controlling a HDTV-quality video camera using PUCC
protocoL

.
TABLE OF CONTENT

CHAPTER NO

1 INTRODUCTION

2 VIDEO SURVEILLANCE SYSTEM

3 SURVEILLENCE CABLE TYPE

4 SURVELLIENCE STORAGE DATE

5 SURVELLIENCE MONITOR

6 TYPES OF SURVELLIENCE

7 METHODS OF SURVELLIENCE

8 CONCLUSION

9 REFERENCE
CHAPTER 1

INTRODUCTION

A Surveillance or Closed Circuit Television (CCTV) System is made up of one or


many security cameras that capture and send video to a Network Video
Recorder (NVR) or a cloud-based server, which records the video footage and
presents them on a monitor or other connected device (ipad, cellphone, etc)

Surveillance is used by citizens for protecting their neighborhoods. And by


governments for intelligence gathering - including espionage, prevention of
crime, the protection of a process, person, group or object, or the investigation
of crime. It is also used by criminal organizations to plan and commit crimes,
and by businesses to gather intelligence on criminals, their competitors,
suppliers or customers. Religious organisations charged with detecting heresy
and heterodoxy may also carry out surveillance.[3]Auditors carry out a form of
surveillance.[4]

A byproduct of surveillance is that it can unjustifiably violate people's privacy


and is often criticized by civil liberties activists.[5] Liberal democracies may
have laws that seek to restrict governmental and private use of surveillance,
whereas authoritarian governments seldom have any domestic restrictions.

Espionage is by definition covert and typically illegal according to the rules of


the observed party, whereas most types of surveillance are overt and are
considered legitimate. International espionage seems to be common among all
types of countries.[6][7]
CHAPTER 2

VIDEO SURVEILLANCE SYSTEM


A video surveillance system is a network of cameras, monitors/display
units, and recorders. Cameras can be either analog or digital with various
features to explore, such as resolution, frame rate, color type, and more.
Whether applied inside or outside the building, it operates 24/7, designed only
for recording movement when necessary.

Surveillance cameras may be in plain sight or hidden from view. The camera’s
purpose is to deter improper behavior, and the video footage can also serve as
evidence for later review by security staff or law enforcement. Depending on
your needs, there are many different video surveillance systems available, such
as live monitoring, remote access via an IP system, and Digital Video Recorders
(DVR) for recording footage.

Most video surveillance systems are closed off so that signals will not be
broadcast and accessible to other parties. Only authorized users can monitor
the content of what has been recorded on it. However, others may have access
if they are granted permission by an administrator with proper credentials who
manages the live feed.
CHAPTER 3

SURVEILLANCE CABLE TYPE

Generally, CCTV cable systems come with a number of tools and components.
To the layman, it’s rather too confusing. Therefore, it’s important to
understand the basics such as what a CCTV is and why opting for the right
cable matters.

CCTV or Closed-Circuit Television is defined as the use of video cameras to


transmit signal to a particular place. CCTV is used for mostly surveillance
purposes bearing crime preventing, safety, monitoring and crime solving in
mind. For this purpose, CCTV usually requires cables that would enhance the
quality of video signals. For wired surveillance, there are plenty of other
options that help in the transmission of better video signals among other
functions. Take a look at the functions of each cable and how they are
important for CCTVs.

Coaxial Cables:
Having been around for nearly a century now, coaxial cables are still quite
relevant in today’s world mainly due to its high property shielding quality. The
shielding helps in preventing any interference with the signal. The copper plate
in such cables helps in quickening the transmission of data. It’s a lot easier to
install, coming in two sizes for CCTVs:

RG-6:
This particular cable is made for higher bandwidth, made of copper and
aluminum, and for higher frequency. Therefore, it isn’t ideal for indoor CCTVs.
It’s a lot heavier than its other types, thus perfect for CCTVs used by city
authorities, administrations, police authorities.
RG-59 :
Similar to RG-6, the RG-59 refers to ‘Radio Guide’ while 59 refers to the
diameter size, i.e., .059 and uses a copper plate. This type of cable is
recommended for a lower bandwidth, therefore, it’s ideal for CCTV
installations particularly suitable for flats, apartments, societies, hotels and
other interior, relatively smaller places.

Finolex RG59 coaxial cable is a foaming-based dielectric system. With a super


gas injected from the foam insulation, the cable thus helps in providing a
better quality signal which eventually helps for better surveillance.

Plug and Play / Video Power Cables:


Considered to be a cheaper option, PnP cables are quite straightforward. The
CCTV’s power and video runs on one cable with the BNC (Bayonet Neill-
Concelman) connectors present on each end. PnPs are ideal for situations that
need quick fixing. It does not take a long time to fix and use, and is considered
to be quite user-friendly.
CHAPTER 4

SURVEILLANCE DATA STORAGE

Current video surveillance data collection practices use local DVR or NAS
storage systems. The LTO Program discusses how organizations are struggling
to balance thebenefit of video surveillance with high costs and increasing legal
parametersWe live in a world where there is an increasing need for video
surveillance for crime prevention and public security and safety.

Video surveillance is being used in greater quantity and with higher quality
expectations in airports, cities and workplaces around the globe. In fact, the
average person is reportedly caught on a surveillance recording more than 75
times per day.From security camera footage to body cameras, this system of
surveillance is also producing gigantic amounts of data daily.

A day of video surveillance, for example, is estimated to be collecting more


than 500 petabytes (PB) of data. And this number is increasing. According to a
recent IHS Technologies report, future estimates show that by 2019 data will
grow to over 2,500 petabytes daily. Organizations and governments are
struggling to balance the benefit of video surveillance with the high costs,
resources and increasing legal parameters being developed.

How Is Video Surveillance Used Today?

Body cameras and surveillance footage have been in the news nearly
every day over the past few years, and have played a huge role in many high
profile cases. For example, the role of video in law enforcement was invaluable
in bringing the 2013 Boston Marathon bombers to justice.

Following the 2014 shooting of Michael Brown in Ferguson, Missouri, law


enforcement agencies across the country integrated body cameras into their
organizations, adding to the existing use of patrol car cameras. And with
tighter security in airports, many airports are installing close to 20,000 cameras
throughout their terminals.
However, footage of fatal shootings, for example, is often cut or edited, and
occasionally lost due to poor storage handling or lack of security. New
regulations are being implemented to combat these issues, calling for
surveillance videos to be retained for longer periods of time and in some cases
indefinitely.
CHAPTER 5

SURVEILLANCE MONITOR
Surveillance is the monitoring of behavior, many activities, or information for
the purpose of information gathering, influencing, managing or directing.[1][2]
This can include observation from a distance by means of electronic
equipment, such as closed-circuit television (CCTV), or interception of
electronically transmitted information like Internet traffic.

It can also include simple technical methods, such as human intelligence


gathering and postal interception.Surveillance is used by citizens for protecting
their neighborhoods. And by governments for intelligence gathering - including
espionage, prevention of crime, the protection of a process, person, group or
object, or the investigation of crime.

It is also used by criminal organizations to plan and commit crimes, and by


businesses to gather intelligence on criminals, their competitors, suppliers or
customers. Religious organisations charged with detecting heresy and
heterodoxy may also carry out surveillance.[3]Auditors carry out a form of
surveillance.[4]
A byproduct of surveillance is that it can unjustifiably violate people's privacy
and is often criticized by civil liberties activists.[5] Liberal democracies may
have laws that seek to restrict governmental and private use of surveillance,
whereas authoritarian governments seldom have any domestic restrictions.

Espionage is by definition covert and typically illegal according to the rules of


the observed party, whereas most types of surveillance are overt and are
considered legitimate. International espionage seems to be common among all
types of countries.

CHAPTER 6

TYPES OF SURVEILLANCE
Three types of surveillance

 Direct survelliance
 Precinstructivr survelliance
 Reconstructive survelliance

Direct surveillance:

Direct surveillance monitors targets and individuals in a covert fashion in public


places. This does not include any surveillance done on private property. This
technique can utilize a wide range of technology in order to observe individual
activity, record private information, and track their movements. Direct
surveillance can also include gathering evidence from public areas or
interviewing people to gain more information on a suspect.

For example, police detectives listen and record a conversation between


suspects at a local park.
precinstructive surveillance

Preconstructive surveillance involves the observation of the general


public to scan for suspicious activity. A common preconstructive surveillance
tool in today's world is the use of multiple closed-circuit televisions (CCTVs).
This style of surveillance is very public and not covert which is one of the
drawbacks because suspects can frame activity to avoid public surveillance.

However, this technique can also monitor a wide range of public areas and
gather information from a large amount of population. Preconstructive
surveillance can also serve more than just as a surveillance technique but act
as a deterrent for future crime or malicious activity.

Reconstructive surveillance

Reconstructive surveillance is surveillance done retrospectively during


aninvestigation. Investigators will record data, information, and evidence
through a preconstrucive surveillance technique. Later on, if investigators
believe some level of suspicious activity occurred, they can look over the
reconstructive data to see if anything was missed.

For example, if a suspect had stolen something from a gas station store and
investigators could not find enough information through reconstructive
methods, they can go back to watch footage captured on the gas station's
CCTV cameras to see what the criminal touched or missing inventory to link the
suspect to the crime.
CHAPTER 7

METHODES OF SURVEILLANCE
1 satellite

2 video cameras

SATELLITE
Today, satellites are arguably the most advanced surveillance technology.
Satellites are launched into Earth's orbit to capture images anywhere on Earth
and send the information back to Earth. Satellites can be used to monitor large
areas with very specific details. They can detect body heat signatures, weapon
depots, drug storage, or a large movement of humans.

The drawback of satellites is that they are very expensive and can only capture
a certain area for so long before the Earth rotates, or inclement weather blocks
their visual.

VIDEO CAMERAS

Video cameras are one of the most common forms of technology to


conduct surveillance. Cameras can be in a fixed position to capture a certain
area over a long period of time, or they can be mobile so investigators can use
them if their target is on the move.

Video cameras record the entire scene and save the data on a hard drive that
can be used as direct evidence linking a suspect to a crime in the court of law.
Video cameras can be public like CCTVs or covert such as hidden cameras.

ADVANTAGE

Pros 1: Deter Crime


security cameras can dissuade property damage while reducing crimes like
trespassing and burglary. According to the FBI, property crime was 85% of all
crimes in the United States during 2019, with around 7 million reported and
documented. In a constant trend, that number in years prior had been
consistently falling and reduced further in 2020.

While various factors contribute to such a trend, the implementation of


security camera systems undoubtedly has had an effect on preventing criminal
activity like property crime. According to a study by UNC, outdoor security
cameras reduce the chance of property crime by at least half. Furthermore,
studies by Rutgers University and the Urban Institute have recorded
surveillance reducing crime in areas they were installed.

Pros 2: Monitor Scenarios and Activities

When away from the home or business, there might always be a worry
that something might happen. Especially for parents, thoughts of your family’s
condition or how your kids are doing with the babysitter might be weighing
heavy on your mind.

Surveillance, especially indoor security cameras, help to provide peace of mind


when away from home by giving the mother or father the ability to make
checkups as frequently as needed.

Furthermore, when you own a larger plot of land or multiple pieces of


property, securing the perimeter or general location becomes much easier.
Furthermore, modern software allows for phone alerts when a camera detects
something unusual based on specific parameters.

Similarly, for business owners, the ability to regularly check up on daily


business practices is a regular ability for those with security cameras. Such an
ability allows managers and business owners to be offsite for whatever reason
while regular staff can handle onsite work. Furthermore, managing parties can
keep tabs on stock, customer interactions, and more even when away.

Disadvantages
Cons 1: Privacy Is an Issue

While security cameras can be watchful for threats, illegal behavior, or


aggressive behavior, surveillance will also inevitably record everything in their
vision. Dome security cameras, for example, are commonly placed in offices
and warehouses. Schools, as another example, typically feature security
cameras to monitor parking lots and keep the perimeter secure.

However, such surveillance inevitably records everyone ingoing and outgoing


through the school. Furthermore, facial recognition and license plate
recognition security cameras (LPR) have an extensive capability to focus on
specific qualities when within their view.

Cons 2: It Can be a Costly Affair

A traditional security camera system provides excellent support to the security


of any home or business but can entirely be expensive. The implementation of
security cameras typically requires running cables, as referenced in a past post,
and includes extensive labor and multiple products to implement successfully.

However, such an implementation also produces an excellent result in that a


hardwired system typically lasts an owner for several years beyond the
wireless options. Furthermore, the wires connecting the cameras to the
recorder last for decades, being usable years after the cameras have been
replaced multiple times.
CONCLUSION
The conclusion proposes that legislatures and ultimately administrative
agencies need to take the lead to measure the costs and benefits of different
types of surveillance. It also proposes four principles to guide courts and
policymakers going forward: encourage bunary searches, encourage lower cost
surveillance methods, maintain the third party doctrine but enhance the
Fourth Amendment rights of corporate third parties; and use existing legal
tools to restrict hyper-intrusive searches.

The terrorist attacks of 9/11 as well as the Boston marathon incident that
happened more recently raised the public awareness of security issues as well
as tremendously increased the importance of intelligent automated video
surveillance systems applied in public, commercial, law enforcement, and
military domains.

Computerized video processing and analysis implemented in a variety of fields,


such as governmental institutions, various businesses, municipalities, agencies,
educational institutions, mass transportation centers, financial institutions,
utility plants, medical centers and industries, is typically associated with
analysis of video streams captured by surveillance systems.

It performs video real-time analysis for immediate detection of events of


interest as well as analyzes pre-recorded video for the purpose of extracting
events and data that is known as forensic analysis .As the use of video
surveillance systems becomes more widespread and the quantity of recorded
video increases, the need to go through recorded video data and extract
specific segments and events of interest is growing.
REFERENCE

Sumner, R. et. al. Freeway Management Handbook,

1. Highway Capacity Manual. Special Report No. 209. TRB, National Research
Council, Washington, DC, 1994.

2. Texas Department of Transportation, Highway Design Division. Operations


and Procedures Manual, Part IV, Interim Metric Version.

3. Gordon, R.L. et. al. Traffic Control Systems Handbook. Report No. FHWA-SA-
95-032. FHWA, U.S. Department of Transportation, Washington, DC, February
1996.

4. ITS Architecture, Implementation Strategy. Joint Architecture Team: Loral


Federal Systems & Rockwell International, Prepared for the Federal Highway
Administration, revised January 1997.

5. Daniels, G., Starr, T., and Stockton, W.R. Guidelines for Funding Operations
andMaintenance of ITS/ATMS. Report No. FHWA/TX-97/1494-1F. Texas
Transportation Institute, College Station, TX, 1996.

6. Sumner, R.L., et. al. Freeway Management Handbook, Volume 3: Operations


andMaintenance. Report No. FHWA-SA-88-028. FHWA, U.S. Department of
Transportation, Washington, DC, May 1983.

7. Vacca, J.R. Creating Intelligent Traffic Control Centres. Traffic Technology


International. UK and International Press, Autumn 1995.

8. Zhang, H., and Ritchie, S.G. Real-Time Decision-Support System for


FreewayManagement and Control. Journal of Computing in Civil Engineering.
American Societyof Civil Engineers. Washington, DC, January 1994, pp 35-51.

You might also like