Image Processing Based Intruder Detection Using Raspberry PI
Image Processing Based Intruder Detection Using Raspberry PI
Page 283
Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA)
power consumption and large memory usage. Moreover, Fig 1:Raspberry pi board
it does not give alert on any suspicious activities detected.
Radio Frequency Identification (RFID): It uses radio
waves to routinely identify individual or gadgets. There
are many techniques for identification, however the most
trendy is to store a unique serial number that identifies a
human or object on a microchip that is attached to an
antenna.. The blended antenna and microchip are called
RFID transponder or RFID tag and it works in
combination with an RFID reader. The reader antenna is
used to transmit radio frequency (RF) power. Depending
on the tag type, the energy is harvested by the tag antenna
and used to power up the internal circuitry of the tag. The
tag will then modulate the electromagnetic waves
generated by the reader so as to transmit its data back to
the reader. The reader receives the modulated waves and Fig. 2:Raspberry pi Block Diagram
converts them into digital data.
IV. CAMERA INTERFACE
III. HARDWARE AND SOFTWARES USED The raspberry pi camera module used in this paper is
The Raspberry Pi board[fig:1] is the principal module of shown in Figure. 3. The camera module plugs to the CSI
the image capturing and and processing device. Its most connector on the Raspberry Pi. It's able to deliver clear
important parts consist of: primary processing chip unit, 5MP resolution image, or 1080p HD video recording at
memory, energy deliver HDMI Out i.e.. VGA display, 30fps. The camera module attaches to Raspberry Pi by a
Ethernet port, and USB ports. The Picam is hooked up to 15 pin Ribbon Cable, to the dedicated 15 pin MIPI Camera
Raspberry pi through digital camera port that is present Serial Interface (CSI), which was designed especially for
inside the raspberry pi board.The version that we've got interfacing to cameras. The CSI bus is capable of
used is raspberry pi B+ 2017 which is shown below in extremely high datatransfer rates, and it exclusively
fig.1 .We are also using a wireless dongle which is carries pixel data to the BCM2835 processor.
connected to one of the usb ports available. The
Raspberry Pi is a fundamental embedded machine having
a credit score card-sized board computer systems
developed within the UK with the aid of the Raspberry Pi
Foundation[2]. The Raspberry Pi is primarily based on the
Broadcom BCM2835 gadget on a chip (SOC) which
incorporates an ARM1176JZF-S Core (ARM V6K)seven-
hundred MHz CPU processor, Broadcom Video Core IV
GPU having 17 pins, three.5W of electricity, and 1GB of
RAM reminiscence. This major processing chip connects a
camera and display. The Raspberry Pi layout does not Fig 3:Raspberry pi camera module
include a constructed in hard disk or solid drive, as a
substitute it uses an SD card for booting and long term V. SOFTWARES USED
storage. This board is meant to run Linux primarily based
running systems. Python is the main language utilized in 5.1 OpenCV
raspberry pi .This Raspberry Pi module has a Samsung OpenCV 'open source PC vision library' is an open source
elegance 4 micro SD card preloaded with the Raspberry Pi picture preparing library made by Intel 8109 what's more,
NOOBS (New out of Box Software) bundle, and a printed kept up by Willow carport accessible for C, C++, what's
Micro SD card adaptor. The os that we have used in this more, Python. OpenCV is need a compiler like DevC++,
work is raspian stretch. code squares, visual C++. In this paperutilizes python
dialect furthermore, DevC++ compiler. In OpenCV there
are four modules. Predominantly utilized are CV: primary
OpenCV capacities, picture handling calculations, vision
calculations and highgui: GUI capacities, Image and
Video I/O. Utilizing this OpenCV, we will stack pictures
caught by camera. These pictures are in three
configurations paired picture, dark scale picture and
shaded picture. The hued picture contain R G B with pixel
values containing 0-255. It has profundity of the picture
with 8 bits and 3 channels. For stacking the picture
utilizing OpenCV, the taking after program is utilized[2].
Page 284
Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA)
5.1 NGROK
Ngrok creates a tunnel from the public internet to a port on
your local machine. You can give this URL to anyone to
allow them to try out a web site you're developing without
doing any deployment. It captures all traffic through the
tunnel. It displays information about the HTTP traffic for
your inspection. Raw request/response bytes, parsed
headers and form data, JSON/XML syntax checking and
more are included. It can also replay requests. By default,
ngrok will use ngrok.com as a third-party relay. This
service is provided at no-cost and without registration but
it is possible to get additional features by signing up in the
service (which is pay-as-you-want kind). However, it is
possible to setup and use its own server. This package Fig 4:Elements of neural networks
installs the client part of ngrok. It can be used directly with A node layer is a row of those neuron-like switches that
ngrok.com service or with your own server if you install turn on or off as the input is fed through the net. Each
the ngrok-server package layer’s output is simultaneously the subsequent layer’s
input, starting from an initial input layer receiving your
data.
VI. METHODOLOGY USED FOR FACE DETECTION
Page 285
Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA)
Fig 7:
VII. RESULTS
The testing is done using raspberry pi platform with the
following specifications:
Quad core 64-bit processor clocked at 1.4GHz
1GB LPDDR2 SRAM
5mp Raspberry pi b+ camera module
Bootable SanDisk Ultra 16GB micro SD Card
Page 286
Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA)
FLOWCHART
Fig 8: Flowchart
7.3 Execution
VIII. CONCLUSION
From the current work we can able to develop a cost
effective surveillance system, system which recognizes
face efficiently without any delay and sends the email to
the user immediately,if it detects any intruders.
REFERENCES
[1] MayuriDahake,,N.MandaogadeImplementationofRasp
berryPiforHumanFaceDetection&Recognition.
International journal of science and research,23 march
2017
In this figure the python script is loaded. [2] Harshal V. Khodaskar1, Shashank
Mane2International Journal of Advanced
Engineering, Management and Science
(IJAEMS),jan 2017
Page 287
Special Issue Published in Int. Jnl. Of Advanced Networking & Applications (IJANA)
Page 288