SURVEILIA

2020-2021

Surveilia is a desktop application that detects anomaly in real-time by consuming low-resources. Anomaly can be classified as theft, burglary, robbery etc. It is a python-based application developed using OpenCV, PyQt5, PyTorch, NumPy, SQLite3, and NVIDIA’s CUDA. 

ACHIEVEMENTS

SURVEILIA secured 3rd position among 110+ Final year projects in CS Department, COMSATS Lahore.
SURVEILIA got funding from National Grassroots ICT Research Initiative (NGIRI) at IGNITE. 

INTRODUCTION

The present world has evolved in the terms of advanced technology but still one does not feel secure at malls and other public places. Every day, we hear stories of robbery, vandalism, and other street crimes. Though the surveillance cameras are increasingly being installed in almost all public areas, some of the incidents are either unnoticed or are detected when it is too late as the law enforcement monitoring abilities have not kept up with the pace. The eyes of law enforcement miss several anomalous incidents. Unfortunately, the surveillance is done by human operators. It is almost impossible for a human brain to thoroughly focus on multiple CCTV screens when multiple activities are taking place in parallel across each screen. Some have improved their systems by using DVR (digital video recorder) or applications built through deep learning techniques, but they either require an update in system or  CCTVs with integrated chips. Hence, there is a need for a deep learning-based application that utilizes fewer resources and provide security by timely detecting abnormal events.

To solve this problem, there is a need for a low resource-efficient automated system that differentiates between normal and abnormal events in multiple streams, simultaneously, and in case of any abnormal event, the security team is alerted to take appropriate actions immediately. With the development of Surveilia, any abnormal activity in a live video stream or a video file is instantly reported. The system clips and stores the part where an abnormal activity (if any) occurs, making the process of a surveillance system reliable, efficient, effective, and reducing the constant human dependency.

PROJECT SCOPE

Security is one of the key concerns for any person, either at home or in public places. Surveillance cameras are now being used in almost every area, be it home or public place. Security guards sit behind those CCTV screens, inspecting the behaviour of people, and monitoring their activities. But unfortunately, the human brain cannot focus on multiple screens at a single time. Several applications are being developed to automatically detect abnormal activities, therefore, the security can be ensured, and people can move without safety risks and concerns. We have developed an application that automatically detects abnormal activity in surveillance CCTV streams and generates an alarm.

Presently, much work is done in the field of activity recognition but most of them require high computational costs, expensive and advanced systems with the best GPUs. Hence, they are computation-intensive, and training them requires a lot of training data.  Resultantly, the user must update his/her system to achieve the desired result. To overcome this problem, we have proposed a low resource-efficient system that detects an anomaly in multiple streams in real-time.

Although we have a lot of pros in our application but there are some small but technical cons; detection of abnormal and normal activities as separate is doubtful, especially in crowded areas, unavailability of labelled data makes system to be inefficient as it’s learning is not enough and to balance privacy of crowd along with the detection of anomalies.

OBJECTIVES

The objectives for the proposed project are as follows:

TO KNOW ABOUT SURVEILLANCE SYSTEMS

TO KNOW ABOUT NVIDIA JETSON NANO

RELATED WORK


HOW THE APPLICATION WORKS?


The flow of the application is discussed below and you can see the visual representation next to it.


WHAT DOES THE APPLICATION INCLUDE?

Minimizes the work of security team by automating the surveillance task.

Detects anomalies such as theft, robbery, burglary, etc.

Detects abnormal activities from single to multiple camera streams. (upto 6 simultaneously).

Detects abnormal activities over live CCTV/ IP Camera input feed, stored video or Webcam.

Requires low resources for computation


Embedded AI on the edge by deploying core application on NVIDIA Jetson Nano.

DATASETS USED FOR THIS PROJECT

FIND COMPLETE CODE HERE

USER INTERFACE

Login Screen

Welcome Screen

Supports Multi-language

Three Options to Add Camera

Camera Screen (displaying 6 screens running simultaneously.)

Displaying the history of anomalies

POSTER

PRESENTATION SLIDES

CS28_SURVEILIA_PRESENTATION (1).pptx

TOOLS AND TECHNIQUES

Python

Anaconda

Jupyter Notebook

Google Colab  

PyTorch

QT Designer

FUTURE WORK

Discussed below are the ideas for expansion of the project in the future:

THE TEAM

PROJECT SUPERVISOR

Dr. Usama Ijaz BajwaCo-PI, Video Analytics lab, National Centre in Big Data and Cloud Computing,Program Chair (FIT 2019),HEC Approved PhD Supervisor,Assistant Professor & Associate Head of DepartmentDepartment of Computer Science,COMSATS University Islamabad, Lahore Campus, Pakistanwww.usamaijaz.comwww.fit.edu.pk

Ifrah Tehleel

GROUP LEADER
Email: ifrahteh@gmail.com
BSCS(Computer Science, COMSATS Lahore)Linkedin ProfileGithub Profile

Nauman Akram

Email: iemnauman.akram@gmail.comBSCS(Computer Science, COMSATS Lahore)Linkedin ProfileGithub Profile

Jan Muhammad Mirza

Email: janmuhammadmirza@gmail.comBSCS(Computer Science, COMSATS Lahore)LinkedIn ProfileGithub Profile

REFERENCES


[1] R. Dev, “Surveillance App,” [Online]. Available: https://play.google.com/store/apps/details?id=com.reservoirdev.surveillance&hl=en. [Accessed 30 July 2020].

[2] “iCetana,” [Online]. Available: https://icetana.com/. [Accessed 30 July 2020].

[3] D. Security. [Online]. Available: https://www.dahuasecurity.com/. [Accessed 31 July 2020].

[4] “Hikvision,” Hikvision, [Online]. Available: https://www.hikvision.com/. [Accessed 27 July 2020].

[5] “Mobotix,” [Online]. Available: https://www.mobotix.com/en/unique-quality. [Accessed 27 July 2020].

[6] “UCF Crime Dataset,” [Online]. Available: https://www.crcv.ucf.edu/projects/real-world/. [Accessed 29 July 2020].

[7] “Something-Something V1,” [Online]. Available: https://20bn.com/datasets/something-something/v1. [Accessed 31 July 2020].

[8] “Something-Something V2,” [Online]. Available: https://20bn.com/datasets/something-something. [Accessed 30 July 2020].

[9] “Temporal Shift Module,” [Online]. Available: https://github.com/mit-han-lab/temporal-shift-module. [Accessed 30 July 2020].