scispace - formally typeset
Search or ask a question
Proceedings Article•DOI•

Design and implementation of embedded network video monitoring terminal

Wang Kechao1, Ren Xiangmin1, Wang Zhifei1, Jia Zongfu1, Yu Jingwei1 •
10 Jun 2011-Vol. 3, pp 211-214
TL;DR: Test results show that the embedded network video monitoring terminal designed and implemented by this company can better utilize TCP/IP network bandwidth and can play without latency and fitter, as a result of real-time transmission and reception of digital video signal.
Abstract: Diggitalization of network video monitoring system, which has advantages of unlimited distance control, flexible extension and so on, is becoming a new standard of security system. Due to limitations of network bandwidth, video signals collected must be compressed to achieve real-time video transmission on the network. Therefore, how to maintain the high quality of the compressed signal, and meanwhile minimize the amount of data becomes a key technical problem To achieve this goal, an embedded network video monitoring terminal was designed and implemented by us This terminal consists of dedicated MPEG-4 compression ASIC, 32-bit embedded processor, 8-bit micro controller, 4-channel video capturing and decoding chips etc. Its corresponding software has been developed Users can not only watch the real-time monitoring images directly with the built-in embedded web server through the network,but also login central server, watch the monitoring images and control the network video terminal through dedicated software. Test results show that our terminal can better utilize TCP/IP network bandwidth Video can play without latency and fitter, as a result of real-time transmission and reception of digital video signal.
Citations
More filters
Journal Article•DOI•
31 Oct 2013
TL;DR: This work is proposing a novel system to prevent robbery in highly secure areas with lesser power consumption which has face-recognition technology which grants access to only authorized people to enter that area.
Abstract: Even though there are various security systems consuming large power are available in market nowadays, robbery rate is very high. We are proposing a novel system to prevent robbery in highly secure areas with lesser power consumption. T his system has face-recognition technology which grants access to only authorized people to enter that area. If others enter the place without access using some other means, then the system alerts the security personnel and streams the video captured by th e security camera. The facerecognition is done using PCA algorithm. The video transmitted is compressed and transmitted by ENVMT. By using this ENVMT, the video can play with lesser bandwidth consumption, latency and jitter.

21 citations

Proceedings Article•DOI•
01 Aug 2016
TL;DR: A monitoring system which includes motion detection algorithm is implemented along with some alarming features and IOT based image processing unit with internet connectivity so that data can be transferred to any remote server for example Cloud.
Abstract: Since few years there is tremendous growth in the research of surveillance system especially in computer vision based surveillance system. This paper proposes a monitoring system which includes motion detection algorithm is implemented along with some alarming features. The system proposed in this paper is IOT based image processing unit with internet connectivity so that data can be transferred to any remote server for example Cloud. The motion detection feature of a system provides necessary isolation of most significant video clips that eliminates time consuming reviewing process required in normal video surveillance system. The main idea behind this system is to detect the presence of any moving object especially a human and then start recording a video from the motion is detected. The video clip can be stored locally as well as uploaded to cloud server so that it can be viewed from anywhere in the world and necessary alarms then generated by the system. There are several micro controllers are available that can be interfaced along with digital camera to achieve this goal.

8 citations


Cites background from "Design and implementation of embedd..."

  • ...Yuanming Huang proposed the design of remote network video surveillance system [7]....

    [...]

Book Chapter•DOI•
01 Jan 2018
TL;DR: The implementation of motion detection algorithm for live camera streaming is presented and thus allows analyzing incoming image stream, and recognizing any movement occurs in the area and if so then triggers video recorder to save the information-contained video clip.
Abstract: In recent years, lots of research have been done in computer vision domain. Video surveillance in real-time scenario, especially for humans, like tracking and behavior analysis is one of the most active research topics in computer vision and artificial intelligence in present situation. The main focus is providing the low-cost and efficient video surveillance system for home application and can have wide scope in other areas such as elevator monitoring and server room monitoring. As the traditional surveillance system requires huge storage capacity and consumes lot of network bandwidth, hence it becomes necessary to provide solution for such design issues. This paper presents the implementation of motion detection algorithm for live camera streaming and thus allows analyzing incoming image stream, and recognizing any movement occurs in the area and if so then triggers video recorder to save the information-contained video clip.

2 citations

Book Chapter•DOI•
01 Jan 2019
TL;DR: It has been found that the application of IoT and AI-based learning mechanism have made significant performance improvement for automated surveillance purpose.
Abstract: Surveillance is the process of close observation of a person, place, or object to avoid and minimize the risk of any undesired dangerous situations or suspicious activities to maintain normalcy. However, manual surveillance techniques have certain constraints including unavailability of trained manpower and erroneous observation triggering tricky situations. The proliferation of the use of information and communication technologies (ICT) have increased the levels automation and have made it a part of surveillance application. The aspects of automation have greatly reduced human intervention and have made systems more reliable and efficient. The new advancements in internet of things (IoT) and artificial intelligence (AI) have made automation in surveillance security even more convenient and efficient. It has been found that the application of IoT and AI-based learning mechanism have made significant performance improvement for automated surveillance purpose. Here, the authors discuss some of the recent trends and challenges faced by all pervasive surveillance systems.

2 citations

Journal Article•DOI•
TL;DR: The method to extract vehicles track by dual data source can provide the theoretical support for the analysis of traffic conditions at roundabout.
Abstract: Extracting vehicles track at roundabout is the basis research for motion characteristics of vehicles. At present, most of the vehicle trajectory was obtained by using single data source. However, the precision of the method needs to be improved. In this paper, two cameras are set at two different directions shooting the same scene image to obtain image data. And then a new method to extracted vehicles track more accurately by integrate the dual data source organically was proposed. In the case analysis, through the contrastive analysis of 4 different curves, the result shows that the error of dual data detection is decreased by 2.7% than single data detection. The method to extract vehicles track by dual data source can provide the theoretical support for the analysis of traffic conditions at roundabout.
References
More filters
Journal Article•DOI•
TL;DR: The ViSOR (Video Surveillance Online Repository) framework is presented, designed with the aim of establishing an open platform for collecting, annotating, retrieving, and sharing surveillance videos, as well as evaluating the performance of automatic surveillance systems.
Abstract: The availability of new techniques and tools for Video Surveillance and the capability of storing huge amounts of visual data acquired by hundreds of cameras every day call for a convergence between pattern recognition, computer vision and multimedia paradigms. A clear need for this convergence is shown by new research projects which attempt to exploit both ontology-based retrieval and video analysis techniques also in the field of surveillance. This paper presents the ViSOR (Video Surveillance Online Repository) framework, designed with the aim of establishing an open platform for collecting, annotating, retrieving, and sharing surveillance videos, as well as evaluating the performance of automatic surveillance systems. Annotations are based on a reference ontology which has been defined integrating hundreds of concepts, some of them coming from the LSCOM and MediaMill ontologies. A new annotation classification schema is also provided, which is aimed at identifying the spatial, temporal and domain detail level used. The ViSOR web interface allows video browsing, querying by annotated concepts or by keywords, compressed video previewing, media downloading and uploading. Finally, ViSOR includes a performance evaluation desk which can be used to compare different annotations.

125 citations

Proceedings Article•DOI•
01 Oct 2007
TL;DR: A novel method to detect and record various posture-based events of interest in a typical elderly monitoring application in a home surveillance scenario by using the speed of fall to differentiate real fall incident and an event where the person is simply lying without falling.
Abstract: In this paper we propose a novel method to detect and record various posture-based events of interest in a typical elderly monitoring application in a home surveillance scenario. These events include standing, sitting, bending/squatting, side lying and lying toward the camera. The projection histograms of segmented human body silhouette are used as the main feature vector for posture classification. k-nearest neighbor (k-NN) algorithm and evidence accumulation technique is proposed to infer human postures. With this technique we have achieved a robust recognition rate of above 90% and a stable classifier's output. The modified classifier structure also improves greatly the recognition rate of lying toward the camera events as compared to the result of classifier's structure in GHOST (Haritaoglu et al., 1998). Furthermore, we use the speed of fall to differentiate real fall incident and an event where the person is simply lying without falling.

107 citations

Proceedings Article•DOI•
S. Sutor, F. Matusek, F. Kruse, K. Kraus, R. Reda 
29 Jun 2008
TL;DR: Two case studies are presented, which show that these factors are indispensable for designing the best possible configuration of a large-scale video surveillance systems, and a new important performance parameter, visual coverage-quality and redundancy levels are introduced.
Abstract: As the threat potential against critical infrastructure increases, more and more flexible, scalable, efficient, reliable and future-proof video surveillance technologies are required. This paper introduces an analytical study of performance parameters for large-scale video surveillance systems. Analog to computer network systems, performance parameters are defined: e.g. reliability, availability (instantaneous, interval and steady state) and survivability are defined, calculated, evaluated and analyzed. Moreover, a new important performance parameter, visual coverage-quality and redundancy levels are introduced. Two case studies are presented, which show that these factors are indispensable for designing the best possible configuration of a large-scale video surveillance systems.

16 citations

Journal Article•
TL;DR: An on-line system for monitoring galloping of transmission line based on embedded system is presented, based on the image data of USB camera acquisition, and using embedded computer as baseplate.
Abstract: An on-line system for monitoring galloping of transmission line based on embedded system is presented.It consists of USB camera,embedded computer and GPRS module.In the system embedded system Linux is cut down,customized and ported into the embedded system,for which the monitor software based on Qtopia is also developed.The system is based on the image data of USB camera acquisition,and using embedded computer as baseplate.The system can tele-monitor the transmission lines of power equipment through GPRS.

2 citations

Journal Article•
TL;DR: This paper discusses how to acquire video information of parking spaces by using Omni-Directional Vision Sensor (ODVS), and proposes the association mapping methods of video detection parking space and various information dissemination parking space considering vehicle parking guidance information dissemination.
Abstract: Vehicle parking guidance is an important part in Intelligent Transportation System(ITS).This paper discusses how to acquire video information of parking spaces by using Omni-Directional Vision Sensor(ODVS),studies the use of image processing algorithm,such as color model algorithm,edge detection algorithm,and etc.in video spaces detection,and proposes the association mapping methods of video detection parking space and various information dissemination parking space considering vehicle parking guidance information dissemination.

1 citations