Invisible Eye

You might also like

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 26

A Seminar Report on

“An Invisible Eye”


Submitted in partial fulfillment of the requirements for the award of degree of

Master of Computer Applications

Submitted by:
Kanishk Kumar
(TCA1905022)

Binit Kumar Agarwal


(TCA1905021)

Under the Guidance of


Prof. R C Tripathi
Professor, FOECS,
TMU, Moradabad.

FACULTY OF ENGINEERING AND COMPUTING


SCIENCES
TEERTHANKER MAHAVEER UNIVERSITY MORADABAD, UP

December, 2019
FACULTY OF ENGINEERING AND COMPUTING SCIENCES
TEERTHANKER MAHAVEER UNIVERSITY
DELHI ROAD, MORADABAD

Certificate
This is to certify that the seminar work entitled “An Invisible Eye” is a bonafied work carried out
by Kanishk Kumar (TCA1905022) and Binit Kr. Agarwal (TCA1905021) of MCA Programme in
3rd semester of the academic session 2019-20. They have explored the mentioned area and
incorporated/implemented all the suggestions given by the assessment committee constituted by
college principal. This report has been recommended for the approval, as it satisfies the minimum
academic requirement with respect to seminar work prescribed for MCA 3rd semester programme.

Sign of Supervisor Sign of Programme Coordinator Sign of HOD

Dr. R C Tripathi Mr. Priyank Singhal Dr. Ashendra Kr. Saxena


Professor Assistant Professor Associate Professor

Examiner’s Signature with date:

………………………..
ACKNOWLEDGEMENT

It is our proud privilege and duty to acknowledge the kind of help and guidance received from
several people in preparation of this report. It would not have been possible to prepare this report in
this form without their valuable help, cooperation and guidance.

First and foremost, we wish to convey our sincere gratitude to College Management and to
our most respected Prof Rakesh Kr Dwivedi, (Principal) for his constant support and
encouragement in preparation of this report and for making available library and laboratory facilities
needed to prepare this report.
Our sincere thanks to Dr. Ashendra Kr Saxena (HoD) for his valuable suggestions and
guidance throughout the period of this report.
We express our sincere gratitude to our supervisor Prof R C Tripathi Sir for guiding us in
investigations for this seminar and in carrying out experimental work. Our numerous discussions with
him were extremely helpful. We feel thankful for receiving his guidance, encouragement and
inspiration.
The seminar on “An Invisible Eye” was very helpful to us in giving the necessary background
information and inspiration in choosing this topic for the seminar. Our sincere thanks to seminar
coordinator Mr. Amit Kr Vishnoi (Assistant prof) for having supported the work related to this
report. His contributions and technical support in preparing this report are greatly acknowledged.
Last but not the least, we wish to thank our parents for constantly encouraging us to learn
Computer Science.

Date: 16th Nov, 2019 Binit Kumar Agarwal


Place: TMU, MORADABAD Kanishk Kumar
TABLE OF CONTENTS

Acknowledgements i
Table of Content ii
List of Figures iii

CHAPTER 1 INTRODUCTION
1.1 Background 01
1.2 Introduction 01
1.2. Characteristics 03
1.3 Problem Statement 04
1.4 Design Methodology 05
1.5 Existing System 06

CHAPTER 2 LITERATURE SURVEY


2.1 Literature Survey 11

CHAPTER 3 DATA COLLECTION 14


CHAPTER 3 ANALYSIS 15

CHAPTER 4 APPLICATIONS 16
CHAPTER 5 ADVANTAGES AND DISADVANTAGES 17
CHAPTER 6 RESULTS AND DISCUSSION 17

CONCLUSION 22

REFERENCES 23

RESEARCH PAPER (if published)

LIST OF FIGURES

1.1 Flow Chart 01


ABSTRACT

The main agenda of this work is to design advanced security with affordable and less
complex system referred as “Invisible Eye”. In this modern era, property crimes are more
predominant which necessitates developing an advanced security system.

It is a single camera based security system which is used to protect the valuables kept in
room. This system can be used when slew around the room and recorded when it is alerted
by the presence of any intrusion. Manager can only view the footage which was alerted on
the presence of intrusion.

This type of system would lead to less time consuming and this will help to keep track of
the intruder easily in less time. Once the intruder has been detected this information about
intrusion will be directed to the cop through the E-mail. Such a system would consists three
components – sensors that detect intrusion; the camera that slews to the point of intrusion
and takes pictures; and the keypad that is used to interface with the system which allows
any person to disable the system by entering the right password.
CHAPTER 1

1.1 INTRODUCTION

This seminar report is based on the modern security system called Invisible eye. This is very cost-
effective and easy to use and handle method for security. The various parts of the system are
described in this paper. This paper also includes the working of the system along with the advantages,
limitations and future scope of the technology.

Invisible eye an advanced security system is mainly designed to use a single camera to perform the
security. The reason for security is, the user of a system may have valuable belongings kept in his
home, or a jeweler shop owner need security at night times for his property. The present technologies
have many disadvantages like multiple camera’s, more cost, power consumption, the owner has to
always view the recording of the footage without any assurance of the theft. One can design the
model using different sensors like motion sensor, vibration sensor; the motion sensor detects the
motion of a human being in that particular area where a sensor is placed. Once the sensor, senses the
motion or vibration it sends that information of motion to the Microcontroller. Here we are using
stepper motor, wireless camera and also a PC (Personal Computer).Today's security systems are
extremely effective in preventing burglary and thefts as well as helping police respond to emergency
situations. The mainstay of the home security system is definitely the high decibel siren. Today the
siren is used to ward off would be intruders not for monitoring purposes. In most cases home security
systems are monitored by large companies with multiple monitoring centers. These centers house
countless trained professionals who are there in times of need for residences and businesses across the
country. These monitoring centers also can provide support for other potential disasters such as
carbon monoxide, fire, freezing pipes, and much more. Modern security systems use alarms, infrared
motion sensors, digital surveillance and contemporary monitoring stations. Monitoring is extremely
efficient and emergency response time for triggered alarms has improved dramatically due to
technology [2].
Figure 1 : A close view of the system

1.2 CHARACTERISTICS

1. Invisible Eye protection gadget solves some of the problems confronted by way of the more
than one digital camera primarily based structures at an easily low priced fee.

2. The biggest advantage is that we will avoid having to wade through hours of photos of empty
rooms. One also can avoid having to put in more than one camera to cowl a empty room.

3. Cost required for the setup is very much less in comparison to multiple camera based totally
device.

4. We can avoid hours of pictures of empty rooms. Good view of the video photos can be
acquired as digital camera turns 360°.
5. This work can be prolonged to absolutely put off the use of the microcontroller and
alternatively use parallel port of the PC to screen the sensors. Also advanced photo processing
strategies may be implemented to song the intruder once his function has been recognized.

1.3 PROBLEM STATEMENT

Today's security structures are extraordinarily effective in stopping housebreaking and thefts in
addition to supporting police reply to emergency situations. The mainstay of the home safety gadget
is sincerely the excessive decibel siren. Today the siren is used to thrust back might be intruders now
not for monitoring functions. In maximum instances home safety structures are monitored by using
large businesses with more than one monitoring centers. These facilities house endless educated
professionals who are there in times of want for houses and corporations throughout the world in
present scenario. These monitoring facilities also can offer aid for different ability screw ups
consisting of carbon monoxide, fire, freezing pipes, and much greater [2].

1.4 DESIGN METHODOLOGY

This system consists of the following components:

1. PIR Sensors.
2. Microcontrollers.
3. Stepper motor.
4. Camera.
5. Personal Computer.
1. PIR Sensors

Figure 2 : PIR Sensor

A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light
radiating from objects in its field of view. They are most often used in PIR-based motion
detectors.

1. PIR sensor allow us to sense the motion, almost Always use to detect whether a human
has moved in or out of the sensors range.

2. It is commonly found in appliances and gadgets Used in homes or business,


Sensitivity Range: up to 20 feet (6 meters).

3. In, homo sapiens, radiate heat in form of radiation at wavelength of 10-12 micrometer
that can only detect by the PIR sensor .
4. PIR sensors allow you to sense motion, almost always used to detect whether a human
has moved in or out of the sensors range. They are small, inexpensive, low-power, easy
to use and don't wear out.

2. Microcontrollers

Figure 3 : Microcontroler

A microcontroller is a small computer (SoC) on a single integrated circuit containing a processor


core, memory, and programmable input/output peripherals. Program memory in the form of
Ferroelectric RAM, NOR flash or OTP ROM is also often included on chip, as well as a typically
small amount of RAM. Microcontrollers are designed for embedded applications, in contrast to the
microprocessors used in personal computers or other general purpose applications consisting of
various discrete chips. Microcontrollers are used in automatically controlled products and devices,
such as automobile engine control systems, implantable medical devices, remote controls, office
machines, appliances, power tools, toys and other embedded systems. By reducing the size and cost
compared to a design that uses a separate microprocessor, memory, and input/output devices,
microcontrollers make it economical to digitally control even more devices and processes. Mixed
signal microcontrollers are common, integrating analog components needed to control nondigital
electronic systems [4].

1. small computer on a single integrated circuit containing a CPU, memory, Timer and It is
a programmable input/output ports.

2. Microcontroller available with different word length such as 8bit, 16bit and 32 bits
Microcontroller.

3. Microcontroller can contain a varying number of I/O pins. These pins can configured to
either an input or an output state.

3. Stepper Motors

Figure 4 : Stepper Motor

A stepper motor is a motor that divides a full rotation into a number of equal steps. The motor's
position can then be commanded to move and hold at one of these steps without any feedback sensor
(an open-loop controller), as long as the motor is carefully sized to the application in respect to torque
and speed.
1. Stepper motors are digital motors, we actually Send Position signals to the Motor to drive
them.
2. It is of four wire stepper motor.

4. Camera

Figure 5 : Lorex HD Wi-Fi Surveillance Security camera

Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and
audio signal to a wireless receiver through a radio band. Many wireless security cameras require at
least one cable or wire for power; "wireless" refers to the transmission of video/audio. However,
some wireless security cameras are battery-powered, making the cameras truly wireless from top to
bottom.

1. Wide transmission range—usually close to 450 feet (open space, clear line of sight between
camera and receiver)
2. High quality video and audio.
3. Two-way communication between the camera and the receiver.
4. Digital signal means you can transmit commands and functions, such as turning lights on and
off.
5. You can connect multiple receivers to one recording device, such as security DVR.

Wireless security cameras function best when there is a clear line of sight between the camera(s) and
the receiver. Outdoors, and with clear line of sight, digital wireless cameras typically have a range
between 250 to 450 feet. Indoors, the range can be limited to 100 to 150 feet. Cubical walls, drywall,
glass, and windows generally do not degrade wireless signal strength. Brick, concrete floors, and
walls degrade signal strength. Trees that are in the line of sight of the wireless camera and receiver
may impact signal strength.

5. Personal Computer

Figure 6 : A Designed view of Personal Computer


A personal computer is a general-purpose computer whose size, capabilities, and original sale price
make it useful for individuals, and is intended to be operated directly by an end user with no
intervening computer time-sharing models that allowed larger, more expensive minicomputer and
mainframe systems to be used by many people, usually at the same time.

Software applications for most personal computers include, but are not limited to, word processing,
spreadsheets, databases, web browsers and e-mail clients, digital media playback, games and many
personal productivity and special-purpose software applications. Modern personal computers often
have connections to the Internet, allowing access to the World Wide Web and a wide range of other
resources. Personal computers may be connected to a local area network (LAN), either by a cable or a
wireless connection. A personal computer may be a laptop computer or a desktop computer running
an operating system such as Windows, Linux (and the various operating systems based on it), or
Macintosh OS.

1.3.1 Block Diagram

Figure 7 : Block diagram of the embedded system


1.3.2 Working

Step1: user enters the password, if password entered is correct then the system starts else he is
prompted to re-enter the password.

Step2: If sensor sense any change or sense any motion, then an intrusion is detected. Else there
is no intrusion.

Step3: If intrusion is detected, then relay triggered, stepper motor rotates the camera, it start
recording and an e-mail is sent to user.

1.4 EXISTING SYSTEM

Today's security systems are extremely effective in preventing burglary and thefts as well as helping
police respond to emergency situations. The mainstay of the home security system is definitely the
high decibel siren. Today the siren is used to ward off would be intruders not for monitoring purposes.
In most cases home security systems are monitored by large companies with multiple monitoring
centers. These centers house countless trained professionals who are there in times of need for
residences and businesses across the country. These monitoring centers also can provide support for
other potential disasters such as carbon monoxide, fire, freezing pipes, and much more. Modern
security systems use alarms, infrared motion sensors, digital surveillance and contemporary
monitoring stations. Monitoring is extremely efficient and emergency response time for triggered
alarms has improved dramatically due to technology [1].
CHAPTER 2

LITERATURE SURVEY

2.1 LITERATURE SURVEY

During the course of this project, there were many surveys carried out regarding the various

components, techniques of the advanced invisible eye security system, they might be implemented in

our project along with the various systems already existing. Many websites were visited to get ideas

about the current working modules for controlling of the parameters. Books on micro controller as

well as various sensors and camera behaviors were read to understand exactly how much it will be

able to sustain our requirements and if any other options could be used [2].

Invisible eye an advanced security system is mainly designed to use a single camera to perform the

security. The reason for security is, the user of a system may have valuable belongings kept in his

home, or a jewelers shop owner need security at night times for his property. The present technologies

have many disadvantages like multiple camera’s, more cost, power consumption, the owner has to

always view the recording of the footage without any assurance of the theft. One can design the

model using different sensors like motion sensor, vibration sensor, the motion sensor detects the

motion of a human being in that particular area where a sensor is placed. Once the sensor, senses the

motion or vibration it sends that information of motion to the Microcontroller. Here we are using

stepper motor, wireless camera and also a PC [1].

Initially, camera movements were mainly studied by the technical inspection and observation. Basic

camera movements were categorized and their duration estimated long before the camera tracking

technology enabled precise measurement of camera movements. The first generation of invisible eye

tracking devices was highly uncomfortable. A breakthrough in this technology was the development
of the first invisible eye system with sensors and microcontrollers apparatus based on photography

and sensors based systems. It can be considered as the first invention in video-based tracking. The

development of unobtrusive camera-based systems and the increase of computing power enabled

gathering of data in real time, enabling the uses movement as a control method for people.

As far as camera is concerned it is better to use the camera with high resolution not less than 640 x

480 and camera must be IR sensitive. As far as sensors are concerned, there are many IR sensors that

are particularly used in such systems to accurately record movements [ 5].

One can design the model using different sensors like motion sensor, vibration sensors, the motion

sensor detects the motion of a human being in that particular area where a sensor is placed. Once the

sensor, senses the motion or vibration it sends that information of motion to the Microcontroller. Here

we are using stepper motor, wireless camera and also a PC. Motion sensors are types of electronic

security device that senses movement and usually triggers an alarm. Many types of motion

sensors can sense motion in total darkness, without an intruder becoming aware that an alarm has

been triggered. Motion sensors are an important part of most burglar alarm systems. They help alert

security personnel, especially in situations where no obvious break-in has occurred. For instance, if

an intruder steals a key to gain access to a protected site or hides within the site during normal

business hours, the intruder’s entrance or presence could go unnoticed. A motion sensor will detect

the intruder’s movements as soon as he or she walks or otherwise moves within the area protected by

the detector. Motion sensors usually protect indoor areas, where conditions can be more closely

controlled. Sensors for use in homes usually detect movement in spaces about 11 m × 11 m (35 ft ×

35 ft) in area. Sensors for large warehouses can protect areas with dimensions as large as 24 m × 37

m (80 ft × 120 ft).Buildings with valuable or important assets, such as museums, also use motion

sensors to detect break-ins at vulnerable points. Such points include walls, doors, windows, skylights,

and even air ducts. Special motion sensors can protect the inside of exhibit cases where items such as
diamonds are displayed. These monitoring centers also can provide support for other potential

disasters such as carbon monoxide, fire, freezing pipes, and much more. Modern security systems

user alarms, infrared motion sensors, digital surveillance and contemporary monitoring stations.

Monitoring is extremely efficient and emergency response time for triggered alarms has improved

dramatically due to technology [1].


CHAPTER 3
DATA COLLECTION

Video Surveillance for ATMs

ATM security has turned into an industry in and of itself. ATM transactions are quick and convenient,
but the machines and the areas surrounding them can be susceptible to criminal activity if not
properly protected. The use of video surveillance, especially new IP-based security cameras can help
to ensure that ATM transactions are safe.
IP network cameras can provide valuable visual evidence of crimes involving cash machines.
Searching through digital footage for specific times and dates is typically a smooth and painless
process. Some ATMs are left unattended for long periods of time. In such cases, archived footage can
prove invaluable when an incident is reported.

Cash machine security camera setup advice


 Install a security camera within the ATM in order to get clear and
detailed images of all transactions.
 Position camera to monitor the area surrounding the cash
machine for comprehensive views of suspect activity.
 Consider employing software that enables you to link individual
transactions with video footage so that archived footage is easier to
sort during criminal investigations.
 Whenever any person will enter the ATM the camera sensors will
be activated and will start recording each and every second of the
duration.
 If the intruder tries to do any offence thing the alarm and the
sms message will be activated as soon as possible with the help of
sensors.
 The microcontrollers will automatically generate the information
and with the help of the GSM moden a SMS will be regulated to all the
necessary authorities.
 The time of the crime will be recorded so that the employees will
not have to go with hours of footages to to get the criminal

CHAPTER 4
ANALYSIS

3.1 ANALYSIS
Some of the analysis that we have came across while preparing the desired systems are
discussed below.

1. Testing the source code:


The source code for the microcontroller was tested without connecting the other parts such as
the sensors and the keypad. The signals indicating the presence of intruders was simulated.

2. Testing the sensor circuit :


The sensor was placed on the surface of a table and its output was observed for vibrations
caused by tapping on the table.

3. Verifying the keypad interface:


The next step was to verify the keypad interface to see whether the code works properly. The
code was tested by burning into another microcontroller.

4. Integrating the system:


By assembling the stepper motor (along with the camera), sensor circuits and the keypad with
the main microcontroller kit. Next, the keypad was integrated into the system whose
activation depends on the password entered on the keypad.
CHAPTER 4
APPLICATIONS

4.1 APPLICATIONS

1. Used for home security systems.

2. Warehouse Surveillance.

3. Office security Systems.

4. Parking lot requires security.

5. Crime Deterrent.

6. Bank security systems.

7. ATM’s security.

8. Shopping Mall security.

9. DMRC Security system.

10. Hospital Security system.


CHAPTER 5

ADVANTAGES AND DISADVANTAGES

5.1 ADVANTAGES:

1. Invisible Eye Security system solves many of the problems faced by the multiple camera
based security system at an easily affordable cost.

2. The biggest advantage is that we can avoid having to wade through hours of footage of empty
rooms.

3. One can also avoid having to install multiple cameras to cover a single room.

4. Overcome with the human observers.

5. Observations of multiple areas [6].

5.2 DISADVANTAGES:

1. We have to deactivate the system while your shop is open.

2. If the owner is out of network then message will not be sent [6].
CHAPTER 6

RESULTS AND DISCUSSION

The proposed prototype system is implemented and tested for the desired functionalities. The system
sent messages to a three pre-defined cell phone number and started recording the video after the
stepper motor rotated towards the sensing area. The whole test procedure is done in a laboratory
having the mentioned criteria for optimal performance. Based on several experiments conducted
under various conditions, it is verified that this system can resolve the presence of any warm body
within the coverage area and execute subsequent actions [5].

In order for a PIR sensor to work well most of the time, it is designed with certain limitations. A PIR
sensor cannot detect a stationary or very slowly moving body. If the sensor was set to the required
sensitivity, it would be activated by the cooling of a nearby wall in the evening, or by very small
animals. Similarly, if someone walks straight towards a PIR sensor, it will not detect them until they
are very close by. PIR sensors are temperature sensitive - they work optimally at ambient air
temperatures of around 15-20 degree Celsius. If the temperature is over 30 degree Celsius, the field of
view narrows and the sensor will be less sensitive. Alternatively, if the temperature is below 15
degree Celsius, the field of view widens and smaller or more distant objects will activate the sensor.
On cold nights, the difference in temperature between a person, e.g. normal body temperature is 37°C
and the outside air temperature is relatively large, giving an apparent increase in performance of the
sensor. On hot nights, this difference in temperature is relatively small and a decrease in performance
of the sensor can be expected [5].

Moreover, the PIR sensors are sensitive to exposure to direct sunlight and direct wind from heaters
and air conditioners. Precaution is required if there are pets in the house. PIR's are sensitive enough to
detect dogs and cats. There are special lens available or a tape can be put on lower part of the existing
System [5].
CONCLUSION

In this security system PIR sensor has been used which is low power, and low cost, pretty rugged,
have a wide lens range, and are easy to interface with. This security system can be implemented in
places like home, office, shop etc.
The sensitivity range for detecting motion of the system is about 3 to 4 feet. It can be raised up to 20
feet through careful use of concentrating optical lenses as future development. In addition to this, this
system can be equipped with glass break detectors to enhance the level of protection. In order to
enhance the location accuracy and to enhance the method of processing the PIR sensor signal, use of
more advanced techniques such as probabilistic theories and soft computing is left open for the future.
In future we can use high end cameras to send the video footage to the mobile for enhanced security.

1. It is very secure security system as compare to present security system.

2. It solves many of the problems faced by the multiple Camera based security system.

3. So we can use Invisible eyes instead of present security system.


REFERENCES

1. https://www.seminarsonly.com/computer%20science/invisible-eye-seminar-

report-ppt-pdf.php

2. http://www.scribd.com/mobile/doc/84040168/invisible-eye-advance-security-

system

3. https://en.wikipedia.org/wiki/The_Invisible_Eye

4. The PIC Microcontrollers by Author: Nebojsa Matic. Publisher: mikroElektronic

2003.

5. https://www.academia.edu/8979599/Invisible_Eye_An_advanced_Security_Syst

em_Using_Web_Camera_Introduction

6. https://www.slideshare.net/vashishthnsoni/seminar-on-invisible-eye

7. Dr. Aswatha, Nagraj”, Telecommunication, Publication Year 2014, Vol 1.

8. https://www.ijrter.com/papers/volume-4/issue-3/invisible-eye-an-advanced-
security-system

You might also like