Smart Security Camera Using Raspberry PI
Smart Security Camera Using Raspberry PI
ISSN No:-2456-2165
Raghav Bansal
Computer Engineering Department
Bharati Vidyapeeth University, College of Engineering Pune
India
Abstract:- Wireless security is the prevention of within the absence of home owner. This system uses wi-fi
unauthorized access or damage to something. Surveillance access to ensure security.[4]
is most important security systems in home, industrial,
office and public places. In this security system is based on II. MOTIVATION
IOT (internet of things). The human movement is detected
using the software OPENCV. As soon as somebody is The use of M2M (machine to machine) communication
detected it sends an email to owner. When the protection is academic degree advantage over the conventional data
system is activated, the CCTV camera is activated. This Acquisition System (DAS) because the look and dominant is
extremely reactive approach has low procedure demand. also relinquished human intervention. as a result of the system
thus it's similar temperament for home closed-circuit becomes whole automatic that the number of error decreases
television. This closed-circuit television is enforced and also the efficiency of the system will increase drastically.
mistreatment raspberry pi , camera.
III. LITERATURE SURVEY
Keywords:- Raspberry pi ; CCTV ; IOT ; Camera.
In literature AN IOT based mostly system and its
I. INTRODUCTION blessings are explained that uses email notification and
cloud to store information[4], literature mentioned regarding
Surveillance is most significant field in security system. remote image information transfer to mechanical man device
Security Camera is that the observance of the behavior , with wireless computer network however with restricted
activities, or alternative ever-changing data, sometimes of distance constrain.[4]
individuals for the aim of influencing, managing, directing, or
protective them. Security Camera systems square measure The limitation of CCTV cameras is mentioned in
routinely utilized in home, office or vehicle observance and whereas the important time systems offer AN immediate
image identification, however this technique needs a high response for crime detection and the bar. The main
performance core, that works against some benefits of principle of network remote video police investigation
embedded systems, like low power consumption and low system primarily based on embedded system as mentioned in
value. Wireless security is that the hindrance of unauthorized literature is to line[6] AN embedded net server at the video
access or secure to MOBILE victimization wireless networks police investigation terminal. The video signal ought to be
Systematic resolution for home[1]. digitized first, then compressed by the high compression chip
and finally is sent to the built-in web server[2].
Safety of commodities is one of the burning issues in
today’s world. CCTV surveillance is a widespread precaution IV. CURRENT FUNCTIONING MODEL
employed to provide mitigation against danger or threats.
However, the Closed-Circuit Television(CCTV)[2] suffers Security and crime management issues square measure
from several drawbacks such as obscure pictures, ability to the motivating factors for the preparation of video surveillance
classify moving objects and lack smartness in general apart cameras. Closed -circuit tv (CCTV) is that the use of video
from a substantial burden on storage spaces and costlier cameras to transmit a sign to a selected place, on a restricted
hardware implementation. With rapid advancements in set of monitors. this method simply uses the cameras to try to
technology, we aim to cascade newer technology to our surveillance. This system just records the what is happening
conventional problem of security. We aim to use the video around the camera. Usually after any incident happens we look
feed from CCTV in conjunction with an object detection at the CCTV footage after some period of time.
methodology and provide real-time protection. The software
receives input from camera, processes and then analyses the V. PROBLEM IN CURRENT MODEL
data in order to find inconsistencies[1]
A. Privacy Issue
The aim of this project is to analyze a price effective There have been a few instances in the past that huge
answer that may offer dominant of home appliances remotely number of surveillance cameras were attacked by hackers.
and can conjointly modify home security against intrusion Also, there have been cases where employees have objected to
Receiving Emails
When receiving an email for the first time, you might get the
following notification from Google:
VIII. CONCLUSION
REFERENCES