Wireless camera network offers new possibilities for security systems

May 20, 2014 by Tim Stephens
Wireless camera network offers new possibilities for security systems
Computer engineering graduate student Kevin Abas designed the SWEETcam prototype.

(Phys.org) —Advances in computer technology are opening up new possibilities for surveillance cameras and environmental video monitoring systems. Kevin Abas, a graduate student in computer engineering at UC Santa Cruz, used off-the-shelf components to build a prototype device for a solar-powered wireless network of smart cameras with potential applications in security systems and wildlife monitoring.

Abas described his system and reviewed similar designs developed by other researchers in a paper published as a cover feature in the May issue of the journal Computer, published by the IEEE Computer Society.

"The on-board components are getting so much smaller and more computationally powerful, it's possible for a compact camera device to have a lot of data processing and other capabilities," Abas said.

Working with Katia Obraczka, professor of at UC Santa Cruz, Abas is designing a "Solar Wi-Fi Energy Efficient Tracking camera (SWEETcam) system," in which the camera nodes can cooperate to form a wireless network for transmitting and processing data. Each camera node is powered by a solar panel and a rechargeable battery. Using vision software, the system is able to analyze the images as they are captured.

"It has a motion sensor, so the cameras wouldn't be on all the time. And if it gets activated by something that is not of interest, the software can identify that and put the system back into sleep mode so it's not recording things like vegetation moving in the wind, or raccoons and deer," Abas said.

The primary motivation for the project came from considering the challenges of monitoring for public safety purposes in remote areas where traditional wired security systems are impractical. The researchers acknowledged that, while security cameras in stores are now commonplace, some people might find the idea of a network of monitoring public spaces a bit too Orwellian. "It's always a trade-off. There are certainly privacy concerns, but if their security is at risk people may be willing to live with some compromises," Obraczka said.

Abas noted that SWEETcam could also be used by biologists for monitoring wildlife. "Researchers deploy motion-activated cameras to study animals like mountain lions, and my device could be perfect for that," he said.

A lot of effort went into to make the system as energy efficient as possible. "It has to be energy efficient to run on solar power, so making it smart in terms of how it uses power is one of the most interesting parts of the system," Obraczka said. "The balance between performance requirements and energy efficiency is what drives the design."

Based on the popular Raspberry Pi platform—a low-cost single-board computer the size of a credit card—the has the computational power required for complex networking, power management, and image processing tasks. The image analysis capabilities were not a primary focus of the project, but could potentially be a very powerful feature of the system. For example, it could identify and tag certain "behaviors" in the images, Abas said.

"With most , you only go back and look at the data after a crime has been reported, and then someone has to look through hours of video," he said. "In theory, we could tag certain images so that, for example, in a bike theft scenario, you could search for all the video where there's a person at the bike rack. You could also program it to send an alert for certain types of suspicious activity when it's happening."

Currently, however, the SWEETcam system has fairly limited image analysis capabilities. Caio Porto, a visiting student from Brazil, worked on this aspect of the project as a summer intern in Obraczka's lab last year. The main focus was on recognizing people and animals to avoid "false alerts" from the .

"For now, we are not doing any sophisticated visual processing, just using standard open-source libraries," Obraczka said. "We're mostly interested in the networking and systems engineering aspect, but the computer vision part is certainly fascinating. The fact that you can do so much with so little is amazing, and a little scary at the same time."

Explore further: Making surveillance cameras more efficient

Related Stories

Making surveillance cameras more efficient

March 5, 2012

A University of California, Riverside professor has recently co-authored a book about his surveillance camera research that has applications in everything from homeland security, environmental monitoring and home monitoring.

Who are the aggressive stars of CCTV?

April 29, 2014

A computer program can analyze CCTV images and spot aggressive human behaviour nine times out of ten, according to research published in the International Journal of Computational Vision and Robotics. The research is an important ...

TAU researchers develop a smarter smartphone camera

May 7, 2014

Despite an addiction to taking pictures everywhere they go, cellphone junkies have not been able to ditch their stand-alone cameras quite yet. Smartphones still don't possess the sharp zoom capabilities of digital still cameras, ...

Recommended for you

Battery technology could charge up water desalination

February 4, 2016

The technology that charges batteries for electronic devices could provide fresh water from salty seas, says a new study by University of Illinois engineers. Electricity running through a salt water-filled battery draws the ...

Researchers find vulnerability in two-factor authentication

February 3, 2016

Two-factor authentication is a computer security measure used by major online service providers to protect the identify of users in the event of a password loss. The process is familiar: When a password is forgotten, the ...

EU and US reach new data-sharing agreement

February 2, 2016

The European Union and the United States struck a deal Tuesday over data-sharing that will allow the likes of Facebook and Apple to continue sending people's information across the Atlantic—but a legal challenge to the ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.