Sie sind auf Seite 1von 38

Mid Seminar Presentation

SECURITY SURVEILLANCE AND SYSTEM INTEGRATION By


Disha Makkar Reg. No.: 090907185 Roll No.:198 , Section:D

Department of Electronics and Communication Engineering, MIT, Manipal

Contents
Introduction iwatch surveillance Access control system GPS overview RFID Conclusion Scope of the work

References

Department of Electronics and Communication Engineering, MIT, Manipal

Introduction
Electronic security pertains to leveraging technology in safeguarding assets by preventing unauthorized access to people and property. The government has been a traditional and major consumer of such security services. The commercial segment also uses such devices for their employees and critical data infrastructure. Electronics Security Systems consists of following type of systems Video Surveillance/CCTV system GPS based tracking systems Access control system RFID based applications

Department of Electronics and Communication Engineering, MIT, Manipal

iWATCH surveillance
iWATCH DVR based surveillance system is the most advanced video surveillance system which is capable of not only recording and live monitoring, this system comes inbuilt with advanced video analytic and alarm notification functionalities. iWATCH CCTV Surveillance provides three type of CCTV solutions for any scenario. 1. Standalone Monitoring Solution 2. Remote monitoring Solution 3. Multi Location Remote Solution

Department of Electronics and Communication Engineering, MIT, Manipal

Stand alone system

remote monitoring system

Multi location system

Department of Electronics and Communication Engineering, MIT, Manipal

iWATCH network camera


.

Network camera connection

Network Camera composition

Network camera interface

Department of Electronics and Communication Engineering, MIT, Manipal

iWATCH DVR
Embedded operating system,1 SATA HDD supports max 2000 GB, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup. Model: IW E9004 (4 channel video DVR) Embedded operating system,2 SATA HDD supports max 2000 GB each, Live display at D1 resolution, Real-time recording at CIF resolution, VGA and Video OUT, USB for data backup, Supports Alarm and PTZ, Remote view thru inbuilt web server and CMS. Model: IW A9004/08/16 (4 channel video DVR 2 Channel Audio )

Department of Electronics and Communication Engineering, MIT, Manipal

Video Compression
MJPEG, MPEG-4 and H.264 are three major video compression technologies used by the IP surveillance industry. Each technology has a different compression ratio and is intended for different applications and purposes.

MJPEG- Motion Joint Photographic Experts Group

MPEG-4

Compressed file size of MJPEG, MPEG-4 and H.264 Department of Electronics and Communication Engineering, MIT, Manipal

Video Management software


Application software together with the package to help users set up an IP surveillance system with ease. From the application software, Installation Wizard 2 and PC-based central management software ST7501 are included. Features: 1. Monitoring

2. Recording

Department of Electronics and Communication Engineering, MIT, Manipal

2. Video Playback

3. E-map

4. Auto back up
5. Failure report

Department of Electronics and Communication Engineering, MIT, Manipal

Digital input devices

Digital output devices

Department of Electronics and Communication Engineering, MIT, Manipal

System Design
Before deploying an IP surveillance system, having a layout map of the site at hand to identify the shooting purposes of each network camera is necessary and useful. The map gives you an overview of the installation site and helps you have an in-depth discussion with your customers. Viewing Considerations : direction, distance, angle, object Environmental considerations: day/night,light, outdoor, indoor, mounting, power outlet, Audio, bandwidth, storage System planning: Camera considerations - Indoor or outdoor, compression formats, cabling, resolution. Hardware considerations - PC, wireless access point, NVR Software considerations- central management software, browser, other s/w
Department of Electronics and Communication Engineering, MIT, Manipal

Intelligent video systems

Video content analysis in distributed structure

Video content analysis in centralized architecture Department of Electronics and Communication Engineering, MIT, Manipal

Intelligent video systems

Intelligent Motion Detection

Tamper detection

Loitering Detection

People Counting License Plate Recognition Department of Electronics and Communication Engineering, MIT, Manipal

Access Control & Time Attendance SYSTEM


Access control is the only technology that proactively attempt to keep unauthorized individuals and vehicles out of a building or areas, and is a perfect complement to video surveillance in a comprehensive security solution proposal. Various solutions provided Biometrics Access Controller RFID reader & Controller Waist height turnstile Boom barrier (for In and Out) Ground Loop (For In & Out) System Software
Department of Electronics and Communication Engineering, MIT, Manipal

Access control system normally consists of


Reader Controller Electronic lock/Turnstile/barrier etc. Based on the mechanism used to authenticate a persons identity access control system are categorized into following broad category Card Based Access control Biometric access control

Department of Electronics and Communication Engineering, MIT, Manipal

Solution provided
We propose Fingerprint and Mifare card based system as an alternative. This system uses fingerprint of the user to

authenticate the identity. As the number of user is high and to


design a machine independent system we propose to store fingerprint of the user into the Mifare card instead of the

fingerprint reader.
The system consists of Mifare Card

Fingerprint & Mifare Card Reader and controller


Magnetic Lock
Department of Electronics and Communication Engineering, MIT, Manipal

Mifare Card reader and Controller


We propose to use Fingerprint access control system with inbuilt Mifare card reader. This reader reads fingerprint and Mifare card both. For each door two readers are proposed, one for IN and another for OUT. OUT reader is proposed as the system will be used for time attendance purpose also. However instead of using OUT reader, EXIT switch can also be used for opening the door from the inside, in this case for registering OUT time employees has to register their out time at the IN reader. These reader supports TCP/IP connection thus any number of reader can be connected into a single server over LAN/WAN connection. ADSL Broadband/Leased line/GPRS/WiFi etc. can be used for WAN connectivity We propose single way electromagnetic lock of 600 lb holding force capacity. This lock can be fitted into any wooden/glass door.
Department of Electronics and Communication Engineering, MIT, Manipal

Magnetic Lock

Software : available reports


List of all users with Present / Absent status (Employee-wise, Shift-wise, Department-wise) Specific users report for a given date range Monthly report of all users Net Hours Reports List of employees in the premises at any given point of time Late Comers Reports
List of all Late comers on a given date List of all Late comers for a given Month Specific Cardholders Report for a date range

Access Reports
Department of Electronics and Communication Engineering, MIT, Manipal

GPS Overview
Hardware Section: The main function of this system is to keep a track of the position of a particular asset and its speed. The information regarding position and the speed will be provided by the GPS module.

Block Diagram:

89S52

AT24C128/ 256 Department of Electronics and Communication Engineering, MIT, Manipal

Two protocols which we will be using RMC protocol Multicast communication by means of the RMC protocol involves three key entities: the sending and receiving applications, the RMC protocol itself, and an underlying best effort multicast service, such as IP multicast. RMC is a NAK-based protocol. VTG protocol VTGCourse Over Ground and Ground Speed among the two we will prefer the VTG protocol for the simple reason that it provides with the speed in km/hr as well as in knots. Whereas RMC protocol provides us with speed only in knots.

Department of Electronics and Communication Engineering, MIT, Manipal

Software: TRAX
TraX incorporates state-of-the-art GPS-based tracking, GIS based real time monitoring, an easy-to-use two way communication facility and new-age security alarm feature. It also fuses powerful reporting capabilities, enabling cost-effective maintenance.

Department of Electronics and Communication Engineering, MIT, Manipal

TraX GPS MOBILE PHONE


Key Features: Frequency: GSM/DCS /PCS 850/900/1800/1900 Waterproof & Dustproof GPS: SiRF III Chipset Screen: 2.2 LCM/QVGA Dual SIM : Dual SIM/Dual Holding Battery: 1800 MAH Talk Time: 5-6 Hrs Standby Time: 300 hrs Antenna: Internal GPS/GSM Quick Keys: One key for GPS One key for SOS

SGP-20

Department of Electronics and Communication Engineering, MIT, Manipal

Key Features: Frequency: or 850/1900 Platform: Standby Platform GPS: Screen: 128x160 176x220 (opt) Dimension: mm Battery: Talk Time: Standby Time: Antenna: GPS/GSM Quick Keys: GPS GSM 900/1800 NXP Long SiRF III Chipset 1.8 65K TFT 2.2 65K TFT 106x46x15.5 1500 MAH 5-6 Hrs >1000 hrs Internal One key for One key for

TraX GPS Mobile MODEL - II

SOS Department of Electronics and Communication Engineering, MIT, Manipal

TraX GPS Vehicle Tracking System


Humidity Dim. Weight Network Band GPS chip GSM/GPRS Module Sensitivity Accuracy 5%--95% noncondensing 87 * 64 * 26 (mm) 495g GSM/GPRS/GPS 900/1800/1900MHz or 850/900/1800/1900MH z SiRF III chip SIM300 or SIM340 -159dBm +/- 10 m

Time To First Fix


Work Voltage Battery Standby work current Storage Temp. Operation Temp.

Reacquisition Cold status Warm status Hot status

0.1s 45s 35s 1s

DC 9V30V Chargeable changeable 3.7V / 1.2Ah Li-ion battery < 30mA

-40C to +85C -20C to +70C

ST-X200

Department of Electronics and Communication Engineering, MIT, Manipal

On Route Replay

Department of Electronics and Communication Engineering, MIT, Manipal

Implementation :: On-Premises Model


The product model is targeted for Companies who are willing to host the product in house. The Control Room will be located in their premises with all required software and hardware.
Department of Electronics and Communication Engineering, MIT, Manipal

Implementation :: Service Model


The product model is targeted for Companies who are willing to take the complete service from us with no infrastructur e setup required at Clients end.

Department of Electronics and Communication Engineering, MIT, Manipal

RFID- Radio Frequency Identification


New frontier in the field of information technology One form of Automatic Identification Provides unique identification or serial number of an object

RFID System

Department of Electronics and Communication Engineering, MIT, Manipal

RFID System Tags consists of antenna and a microchip Readers consists of a transmitter, receiver, and one or more antennas Management system Communication protocol Computer Networks

Department of Electronics and Communication Engineering, MIT, Manipal

RFID TAG Tag is a device used to transmit information such as a serial number to the reader in a contact less manner. Classified as : Passive Active Semi-passive

Department of Electronics and Communication Engineering, MIT, Manipal

Classification of Passive and Active tag

Department of Electronics and Communication Engineering, MIT, Manipal

RFID Reader
Also known an interrogator Reader powers the tag by sending it RF energy Can be handheld or stationary Consists of: Transmitter Receiver Antenna Microprocessor Memory Controller or Firmware Communication channels Power
Department of Electronics and Communication Engineering, MIT, Manipal

EPC vs. UPC (Barcodes)


Both are forms of Automatic identification technologies Universal Product Code (UPC) require line of sight and manual scanning whereas EPC do not UPC require optical reader to read whereas EPC reader reads via radio waves EPC (Electronic Product Code) tags possess a memory and can be written while UPC do not. EPC UPC

Department of Electronics and Communication Engineering, MIT, Manipal

conclusion
Surveillance is, quite simply, observations conducted to gain information. This simple definition includes a plethora of techniques and methods that can be considered a form of surveillance. Many of these are recognizable through common knowledge produced by popular culture. The most well known methods include stationary surveillance, technical surveillance (typically covert video or audio recordings), electronic surveillance (digital observations, keystroke counting), and many more. .One of the most desired high end security system features is integrating video surveillance and electronic access control systems. Increasing penetration of the Internet and the development of innovative technologies have encouraged rapid growth of the IP surveillance industry, driving changes in the video surveillance market. It is expected that IP surveillance will be dominating the video surveillance market in the near future, with network cameras and video servers being major trends.

Department of Electronics and Communication Engineering, MIT, Manipal

Scope of further work


The market for electronic security equipment in India is largely untapped and underserved. Additionally, the consumers in the country need to be awakened to its importance, which will prove to be a daunting task for players operating in this segment. Mixed with the price sensitivity of Indian consumers, India will be a challenging market for such companies to operate in. The market holds immense potential for those players who are able to find the right mix of price, technology and awareness - the synergies of which will pay rich dividends for a companys investments in the electronic security industry in India. In a nutshell Residential and educational sectors, which have been largely untapped, will help provide a boost to the electronic security industry. Countrys southern region ranks first in the usage of security products followed by the western, northern and eastern parts of the country. Current taxation policies have yet to encourage domestic players to compete with international companies The main objective of the project is to figure out the best approach to integrate video surveillance with other security systems. While the industry conversation centres on the value of integration, the real challenge is how to make this happen, effectively, costefficiently and simply. Department of Electronics and Communication Engineering, MIT, Manipal

References
[1] Sehgal, V.K. , "An Embedded Interface for GSM Based Car Security System Computational Intelligence, Communication Systems and Networks (CICSyN), 2012 Fourth International Conference . [2] Sedky, M.H. Moniri, M. ; Chibelushi, C.C. , Classification of smart video surveillance systems for commercial applications, IEEE International Conference on Advanced Video and Signal based Surveillance

Department of Electronics and Communication Engineering, MIT, Manipal

END

Department of Electronics and Communication Engineering, MIT, Manipal

Das könnte Ihnen auch gefallen