Mugshot is a home security application that uses a digital camera or webcam to detect motion in your home. If an intruder, burglar or even nosy housemate is seen, a snapshot is taken and emailed to you. So, should the thief steal your PC or laptop computer, you can still take the pictures of the perpetrator to the police for identification and provide evidence of the crime to authorities and insurers. This is a method of crime-prevention that has had well-publicised successes.

FAQs

A1: For users without a license, images taken by Mugshot will have a watermark imprinted on them.
A2: Mugshot is shareware, not freeware and costs $8.
A3: As long as the area under surveillance area is well lit and the moving object can be perceived by the human eye in the capture window then Mugshot will see it. Clearly, any television or washing machine in operation that can be seen by the camera will not help Mugshot detect burglars. These can cause false alarms, resulting in unwanted emails alerting you to a non-existent intruder. Pets allowed to roam within the area under surveillance may also give rise to false positives.
A4: This depends on the resolution of the webcam. The pictures are compressed to Jpeg format which is ideal for photos in that it preserves fidelity but is also drastically smaller in size compared to other formats such as bitmaps (Bmp). A standard webcam resolution is 320x240 pixels and the typical filesize of such a photo would be of the order of 20KB.
A5: Mugshot requires your PC desktop or notebook to be fully powered during the entire surveillance period. It is, therefore, recommended that monitors are set to power down automatically when not in use for energy saving purposes. Unfortunately there is no known method of hibernating a PC and also have software of any kind to run at the same time without some external trigger to wake the computer and perform its surveillance task.
A6: Research has shown that a person's face must reasonably take up at least 20-25% of the camera capture window's height before it is recognisable. With this in mind it is recommended that the digital camera or webcam is positioned at or slightly below eye level and pointed to where a burglar is most likely to go in the room under surveillance. Besides the computer, which the camera is connected to, it could be pointed towards the door, TV, hi-fi or other valuable equipment. A well lit area is recommended but not in direct sunlight. If surveillance is to occur overnight then it is necessary to leave a light shining on the main area under surveillance.
A7: The mode most cameras default to when plugged into a computer's USB port is "Transfer Photo" mode, used to transfer snaps onto your computer. Most digital cameras do however also have "PC Cam" mode which lets you use it as a webcam.
A8: Your "From" email is the email address Mugshot uses to send surveillance photos. This email should be the one you use base your email application (such as Outlook, Thunderbird) around and regularly use to send and receive email. Web-based email addresses such as those obtainable from Hotmail, Yahoo, AOL etc unfortunately will not allow remote sending of emails.
A9: Your "To" email is the email address with which you will receive the surveillance photos. It is strongly recommended that this is NOT the same address from which you send the captured image(s). This is in case the burglar steals your PC, runs your email application and receives all your emails! Email providers such as Hotmail, Yahoo, AOL and GMail are web-based, so accessible from anywhere, password protected and therefore ideal for setting as a "To" email address.
A10: An SMTP server is the server responsible for sending your emails. Its address is also required by Mugshot so that it can send emails with the "From" address. You should be able to find it set in your email application somewhere under Options or Settings. Alternatively, ask your Internet Service Provider (ISP) who will readily tell you or look on their website. It usually takes the form of "smtp.[your ISP's domain name].com" or "mail.[your ISP's domain name].com".
A11: Not bad. In face detect mode (as opposed to motion detect mode) Mugshot was able to recognise my face even when I was wearing a hat and wraparound sunglasses. The benefit of face detection is that a picture is taken only when a face is in view, whereas in motion detect mode this is not always the case. This mode can however yield false positives, i.e. my bookcase has been classified as having a face in testing before... For this reason, in face detect mode, there is a limit to the number of pictures Mugshot will take and email during one surveillance session (currently 40).
A12: Find out the hunting habits of your cat? Find out if you sleep walk? For these applications where there's no risk of your PC being stolen, you can run Mugshot without it sending emails. The pictures are stored locally in the folder where you run Mugshot from.
A13: This is an authentication problem. Some SMTP servers require a username and address before they transport an email. Testing is still ongoing for a solution to this problem but I would greatly appreciate feedback telling me which SMTP servers are problematic. Update: I think the problem is because some ISPs block port 25. (Some will unblock the port for you though.) Please contact me for an experimental version that attempts to send authenticated emails.
A14: In short, yes. Contact us with details of what you need and we'll provide a quote.

Download Trial (.msi) Download Trial (.zip) Buy License for $8

A computer, an internet connection, an image capture device such as a digital camera or webcam (Mugshot can automatically detect and work with most image capture devices), and an email address to send and receive the captured pictures of any detected intruders.

Version 3.0 (released 27/01/07)

  • Various bug fixes

Version 2.0 (released 28/10/06)

  • Display at 640x480 resolution
  • Trial version limited by watermark on images rather than being time-limited

Screenshot

webcam intruder detection