DOI : 10.17577/IJERTCONV14IS020053- Open Access

- Authors : Mr. Vijay Kadam, Mr. Pratik Dhembre
- Paper ID : IJERTCONV14IS020053
- Volume & Issue : Volume 14, Issue 02, NCRTCS – 2026
- Published (First Online) : 21-04-2026
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License:
This work is licensed under a Creative Commons Attribution 4.0 International License
A study on An Image-Based Changed Detection Framework for Unauthorized Construction Monitoring in Smart Cities
Mr. Vijay Kadam
Department of Computer Science,
Dr. D. Y. Patil Arts, Commerce & Science College, Pimpri, Pune, Maharashtra, India
Mr. Pratik Dhembre
Department of Computer Science,
Dr. D. Y. Patil Arts, Commerce & Science College, Pimpri, Pune, Maharashtra, India
Abstract: Rapid growth has made it difficult for city authorities to monitor and control unauthorized construction activities. Traditional methods that rely on manual inspections are slow, costly and not practical for large cities. This study presents an automated system that helps to detect illegal construction using different types of remote sensing data. The system integrates satellite images, drone photographs and official building approval records to improve accuracy. It analyses images of the same location taken at different times to identify changes using techniques such as image comparison filtering and segmentation. The results are displayed on an interactive web platform that shows visual comparison, highlights new construction areas and provides useful statistics for decision makers. The system also includes separate dashboards for government officials to support real time monitoring and action. Since the framework is modular and scalable, it can be easily upgraded in the future with more advanced technologies making it a practical solution for smart city management.
Keywords: Smart City Monitoring, Remote sensing, Unauthorized construction, Image processing, Satellite Imagery, Drone imaging.
-
INTRODUCTION
Rapid urban development and infrastructure expansion have significantly increased the complexity of monitoring construction activities, particularly in identifying unauthorized structures. Municipal authorities and urban planners traditionally rely on manual inspections and field surveys, which are often labor-intensive, time-consuming, and inefficient for large-scale urban environments. The growing availability of high-resolution satellite imagery and geospatial visualization tools has created new opportunities for automated monitoring systems [1].
Recent advancements in image processing and computer vision techniques have enabled the detection of structural and environmental changes using temporal image analysis. Change detection methods, which analyze differences
between images captured at different time intervals, have proven effective in applications such as land-use monitoring, disaster assessment, and urban development analysis. However, many existing approaches emphasize either complex deep learning architectures requiring large labeled datasets or standalone detection mechanisms lacking practical usability [2].
This research presents a Java-based framework for unauthorized construction detection using classical image processing techniques. The proposed system leverages before and after images acquired from Google Earth Pro to identify structural variations associated with construction activities. Unlike deep learningbased approaches that demand extensive training data and computational resources, the presented framework employs computationally efficient techniques including image differencing, grayscale conversion, thresholding, and segmentation [3].
The primary motivation behind this work is to develop a scalable, accessible, and cost-effective solution suitable for preliminary construction monitoring. By integrating automated change detection with visual result interpretation, the system assists users in identifying potential construction activities without requiring complex training procedures. Furthermore, the Java-based implementation ensures platform independence, ease of deployment, and compatibility with widely used image processing libraries such as OpenCV [4].
This paper presents a Java-based framework for detecting unauthorized construction through image change analysis. It applies classical image processing techniques to identify structural variations between temporal images and visually highlights detected construction regions. The proposed approach is computationally efficient, scalable, and suitable
for continuous urban monitoring to support sustainable planning and regulatory compliance.
-
RELETED WORK
Unauthorized construction detection and urban change monitoring have attracted significant attention in recent years due to rapid urbanization and increasing pressure on urban planning authorities. Various techniques ranging from traditional image processing to advanced deep learning models have been explored for structural change analysis.
Early research in change detection primarily relied on classical image processing methods. Image differencing techniques, which compute pixel-wise variations between temporal images, have been widely adopted due to their simplicity and computational efficiency. These methods often combine grayscale conversion, thresholding, and morphological operations to highlight significant structural changes. Despite their effectiveness, such approaches are sensitive to illumination variations, noise, and misalignment between images.
Threshold-based segmentation techniques have also been extensively investigated. Fixed and adaptive thresholding methods enable separation of foreground changes from background information. Otsus thresholding, in particular, has been recognized for its ability to automatically determine optimal thresholds. However, thresholding-based methods may produce false detections in scenarios involving shadows, vegetation changes, or seasonal variations.
With advancements in machine learning, researchers began employing supervised classification techniques. Support Vector Machines (SVM), Random Forests, and clustering algorithms have been used for urban change detection using spectral and textural features. While these approaches improve detection accuracy, they require labeled datasets and feature engineering, which may limit scalability [5].
Recent studies emphasize deep learningbased change detection models, including Convolutional Neural Networks (CNNs), Siamese Networks, and U-Net architectures. These models demonstrate superior performance in complex environments by automatically learning hierarchical feature representations. However, deep learning approaches require large annotated datasets, high computational resources, and extensive training procedures, making them less suitable for lightweight and cost-effective monitoring systems [6, 7].
In the context of practical deployment, several frameworks integrate remote sensing imagery with Geographic Information Systems (GIS) for urban analysis. Such systems
provide valuable visualization and mapping capabilities but often rely on complex data pipelines and infrastructure [8]. Compared to existing approaches, the proposed framework adopts a classical image processing strategy implemented in Java. This design choice prioritizes computational efficiency, ease of implementation, and reduced dependency on large labeled datasets. By leveraging temporal images from Google Earth Pro, the system offers an accessible and scalable solution for preliminary unauthorized construction detection [9, 10].
-
METHODOLOGY
The proposed system adopts a classical image processing based approach to detect unauthorized construction activities through temporal image analysis. The methodology focuses on identifying structural variations between reference (before) and current (after) images acquired from Google Earth Pro [11]. Fig. 1 shows, the overall workflow consists of image acquisition, prerocessing, change detection, segmentation, and visualization.
Fig. 1. Proposed System Architecture
-
Image Acquisition
The system utilizes high-resolution satellite images obtained from Google Earth Pro. Two images representing the same geographical region at different time intervals are selected:
-
Reference Image (Before Image) Baseline representation
-
Current Image (After Image) Updated scene representation
Care is taken to ensure similar scale, orientation, and viewpoint to minimize geometric inconsistencies.
-
-
Image Preprocessing
Preprocessing is performed to improve detection accuracy and reduce noise-related artifacts.
-
Grayscale Conversion
Since color information is not essential for structural change detection, the RGB images are converted into
grayscale representations. This step reduces computational complexity while preserving intensity variations [12].
Igray=0.299R+0.587G+0.114B
-
Noise Reduction
Filtering techniques are applied to suppress minor variations caused by illumination changes and sensor noise. Gaussian smoothing is commonly employed to stabilize pixel intensity values.
-
-
Change Detection
Change detection is the core stage of the system.
-
Image Differencing
Pixel-wise subtraction is performed between the grayscale images:
(, ) = (, ) (, )
Where:
-
(, ) Reference image
-
(, ) Current image
-
(, ) Difference image
Significant pixel variations indicate potential construction changes.
-
-
Thresholding
Thresholding separates meaningful structural changes from background variations.
1, (, ) >
(, ) = {
0, (, )
Where represents the threshold value. This step produces a binary change map highlighting altered regions.
-
-
Segmentation
Segmentation isolates detected construction areas. Morphological operations such as dilation and erosion are applied to:
-
Remove noise
-
Fill gaps
-
Enhance detected structures
Connected component analysis is used to identify contiguous change regions.
-
-
Visualization of Results
Detected construction regions are highlighted for intuitive interpretation. The system overlays detected areas on the original image, typically using bounding contours or color- coded regions.
This visual representation enables:
-
Easy identification of changes
-
Improved decision-making
-
Enhanced usability for non-technical users
-
-
System Implementation
The framework is implemented using the Java programming language, ensuring platform independence and scalability. Image processing operations are performed using OpenCV integrated with Java bindings. The modular design allows independent execution of preprocessing, detection, and visualization stages [13].
-
-
RESULTS
This section presents the evaluation of the proposed Java- based unauthorized construction detection framework using temporal satellite imagery obtained from Google Earth Pro. The system performance is analyzed through qualitative visual assessment of detected construction changes [3, 14].
-
Visual Analysis of Construction Changes
To validate the effectiveness of the proposed framework, before and after images representing the same geographical region were analyzed. Fig 2 and Fig. 3, illustrates the baseline condition of the selected area, while the current image captures recent structural developments.
Fig. 2. Reference Image (Before Construction)
Fig. 3. Current Image (After Construction)
Visual comparison of the images indicates noticeable structural variations associated with construction activities. Newly developed regions, building expansions, and infrastructure modifications are observable in the current image.
-
Change Detection Output
The proposed image processing pipeline computes pixel-wise intensity differences to identify structural variations. The thresholding and segmentation stages isolate significant changes, while morphological refinements enhance region continuity.
Fig. 4. Detection Output (Highlighted Construction Changes)
Fig. 4, detection output clearly highlights construction- related changes. The framework effectively distinguishes modified regions from unchanged background areas, enabling intuitive interpretation.
-
System Performance Evaluation
Experimental observations demonstrate that the proposed system successfully detects major structural variations corresponding to construction activities. The image differencing technique captures pixel-level intensity deviations, while threshold segmentation isolates meaningful changes.
The preprocessing stages, including grayscale conversion and noise reduction, contribute to stabilizing illumination-related variations. Morphological operations improve detection reliability by reducing fragmented regions.
-
Robustness and Limitations
The system exhibits reliable performance when images maintain consistent scale, alignment, and viewpoint. Significant construction changes are accurately detected across evaluated image pairs.
However, minor intensity variations caused by:
-
Illumination differences
-
Shadows
-
Seasonal texture variations
-
may introduce low-intensity noise regions. Despite these challenges, segmentation refinements minimize false detections.
-
-
DISCUSSION
The experimental results confirm that classical image processing techniques provide a computationally efficient solution for preliminary unauthorized construction detection. Unlike deep learning approaches requiring large labeled datasets and high computational resources, the proposed framework achieves effective detection using lightweight operations.
The Java-based implementation further enhances portability, scalability, and ease of deployment. The system is particularly suitable for rapid monitoring applications and decision- support scenarios. Future enhancements incorporating adaptive thresholding, illumination normalization, and hybrid AI integration may further improve detection accuracy.
-
ACKNOWLEDGEMNT
The authors take this opportunity to sincerely acknowledge the contributions and support of all those who played a role in the completion of this research. We are especially indebted to our guide, Ms. Neeta Takawale, for her continuous supervision, constructive feedback, and steadfast encouragement throughout the course of this study. Her expertise and guidance greatly enriched the quality of this work. We also extend our appreciation to our institution for providing the required facilities, resources, and an encouraging academic environment that made this research possible.
-
REFERENCES
-
R. C. Gonzalez and R. E. Woods, Digital Image Processing, Pearson, 2018.
-
S. Szeliski, Computer Vision: Algorithms and Applications, 2nd ed. Springer, 2022.
-
M. Sonka, V. Hlavac and R. Boyle, Image Processing, Analysis, and Machine Vision, Cengage Learning, 2014.
-
D. L. Lu, P. Mausel, E. BrondĂzio and E. Moran, "Change detection techniques," International Journal of Remote Sensing, vol. 25, no. 12, p. 23652401, 2004.
-
Y. Bazi, L. Bruzzone and F. Melgani, "An unsupervised approach based on the generalized Gaussian model to automatic change detection in multitemporal SAR images," IEE Transactions on Geoscience and Remote Sensing,, vol. 43, no. 4, p. 874887, 2005.
-
J. Singh, "Digital change detection techniques using remotely sensed data," International Journal of Remote Sensing, vol. 10, no. 6, p. 989 1003, 1989.
-
T. Celik, "Unsupervised change detection in satellite images using principal component analysis and k-means clustering," IEEE Geoscience and Remote Sensing Letters, vol. 6, no. 4, p. 772776, 2009.
-
V. Bhuman, "Security challenges and solutions in java application development," Eduzone: International Peer Reviewed/Refereed Multidisciplinary Journal, vol. 12, no. 2, pp. 268-275, 2023.
-
Kvilekval and Kristian, et al., "Bisque: a platform for bioimage analysis and management," Bioinformatics, vol. 26, no. 4, pp. 544- 552, 2010.
-
Kasgari and A. Bagherian, "A new prototype for intelligent visual fraud detection in agent-based auditing framework," International
Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), vol. 4, no. 2, pp. 070-076., 2016.
-
Cifuentes and Cristina, et al. , "The role of program analysis in security vulnerability detection: Then and now," Computers & security, vol. 135, p. 103463, 2023.
-
D. Sbîrlea, M. G. Burke, S. Guarnieri and M. Pistoia , "Automatic detection of inter-application permission leaks in Android applications," IBM Journal of Research and Development, vol. 57, no. 6, pp. 1-10, Nov.-Dec. 2013.
-
B. Zhang, X. Zhi, M. Wang, R. Ren and J. Dong, "Enhancing Java Web Application Security: Injection Vulnerability Detection via Interprocedural Analysis and Deep Learning," in IEEE Transactions on Reliability,, vol. 74, no. 3, pp. 3642-3656, Sept. 2025.
-
Y. Zhang, D. Li and Y. Xie, "GAShellBreaker: A Novel Method for Java Fileless Webshell Detection Based on Grayscale Images and Deep Learning," Electronics, vol. 14, p. 1678, 2025.
