Professional Documents
Culture Documents
Invisible Eye
Invisible Eye
Invisible Eye
Submitted by:
Kanishk Kumar
(TCA1905022)
December, 2019
FACULTY OF ENGINEERING AND COMPUTING SCIENCES
TEERTHANKER MAHAVEER UNIVERSITY
DELHI ROAD, MORADABAD
Certificate
This is to certify that the seminar work entitled “An Invisible Eye” is a bonafied work carried out
by Kanishk Kumar (TCA1905022) and Binit Kr. Agarwal (TCA1905021) of MCA Programme in
3rd semester of the academic session 2019-20. They have explored the mentioned area and
incorporated/implemented all the suggestions given by the assessment committee constituted by
college principal. This report has been recommended for the approval, as it satisfies the minimum
academic requirement with respect to seminar work prescribed for MCA 3rd semester programme.
………………………..
ACKNOWLEDGEMENT
It is our proud privilege and duty to acknowledge the kind of help and guidance received from
several people in preparation of this report. It would not have been possible to prepare this report in
this form without their valuable help, cooperation and guidance.
First and foremost, we wish to convey our sincere gratitude to College Management and to
our most respected Prof Rakesh Kr Dwivedi, (Principal) for his constant support and
encouragement in preparation of this report and for making available library and laboratory facilities
needed to prepare this report.
Our sincere thanks to Dr. Ashendra Kr Saxena (HoD) for his valuable suggestions and
guidance throughout the period of this report.
We express our sincere gratitude to our supervisor Prof R C Tripathi Sir for guiding us in
investigations for this seminar and in carrying out experimental work. Our numerous discussions with
him were extremely helpful. We feel thankful for receiving his guidance, encouragement and
inspiration.
The seminar on “An Invisible Eye” was very helpful to us in giving the necessary background
information and inspiration in choosing this topic for the seminar. Our sincere thanks to seminar
coordinator Mr. Amit Kr Vishnoi (Assistant prof) for having supported the work related to this
report. His contributions and technical support in preparing this report are greatly acknowledged.
Last but not the least, we wish to thank our parents for constantly encouraging us to learn
Computer Science.
Acknowledgements i
Table of Content ii
List of Figures iii
CHAPTER 1 INTRODUCTION
1.1 Background 01
1.2 Introduction 01
1.2. Characteristics 03
1.3 Problem Statement 04
1.4 Design Methodology 05
1.5 Existing System 06
CHAPTER 4 APPLICATIONS 16
CHAPTER 5 ADVANTAGES AND DISADVANTAGES 17
CHAPTER 6 RESULTS AND DISCUSSION 17
CONCLUSION 22
REFERENCES 23
LIST OF FIGURES
The main agenda of this work is to design advanced security with affordable and less
complex system referred as “Invisible Eye”. In this modern era, property crimes are more
predominant which necessitates developing an advanced security system.
It is a single camera based security system which is used to protect the valuables kept in
room. This system can be used when slew around the room and recorded when it is alerted
by the presence of any intrusion. Manager can only view the footage which was alerted on
the presence of intrusion.
This type of system would lead to less time consuming and this will help to keep track of
the intruder easily in less time. Once the intruder has been detected this information about
intrusion will be directed to the cop through the E-mail. Such a system would consists three
components – sensors that detect intrusion; the camera that slews to the point of intrusion
and takes pictures; and the keypad that is used to interface with the system which allows
any person to disable the system by entering the right password.
CHAPTER 1
1.1 INTRODUCTION
This seminar report is based on the modern security system called Invisible eye. This is very cost-
effective and easy to use and handle method for security. The various parts of the system are
described in this paper. This paper also includes the working of the system along with the advantages,
limitations and future scope of the technology.
Invisible eye an advanced security system is mainly designed to use a single camera to perform the
security. The reason for security is, the user of a system may have valuable belongings kept in his
home, or a jeweler shop owner need security at night times for his property. The present technologies
have many disadvantages like multiple camera’s, more cost, power consumption, the owner has to
always view the recording of the footage without any assurance of the theft. One can design the
model using different sensors like motion sensor, vibration sensor; the motion sensor detects the
motion of a human being in that particular area where a sensor is placed. Once the sensor, senses the
motion or vibration it sends that information of motion to the Microcontroller. Here we are using
stepper motor, wireless camera and also a PC (Personal Computer).Today's security systems are
extremely effective in preventing burglary and thefts as well as helping police respond to emergency
situations. The mainstay of the home security system is definitely the high decibel siren. Today the
siren is used to ward off would be intruders not for monitoring purposes. In most cases home security
systems are monitored by large companies with multiple monitoring centers. These centers house
countless trained professionals who are there in times of need for residences and businesses across the
country. These monitoring centers also can provide support for other potential disasters such as
carbon monoxide, fire, freezing pipes, and much more. Modern security systems use alarms, infrared
motion sensors, digital surveillance and contemporary monitoring stations. Monitoring is extremely
efficient and emergency response time for triggered alarms has improved dramatically due to
technology [2].
Figure 1 : A close view of the system
1.2 CHARACTERISTICS
1. Invisible Eye protection gadget solves some of the problems confronted by way of the more
than one digital camera primarily based structures at an easily low priced fee.
2. The biggest advantage is that we will avoid having to wade through hours of photos of empty
rooms. One also can avoid having to put in more than one camera to cowl a empty room.
3. Cost required for the setup is very much less in comparison to multiple camera based totally
device.
4. We can avoid hours of pictures of empty rooms. Good view of the video photos can be
acquired as digital camera turns 360°.
5. This work can be prolonged to absolutely put off the use of the microcontroller and
alternatively use parallel port of the PC to screen the sensors. Also advanced photo processing
strategies may be implemented to song the intruder once his function has been recognized.
Today's security structures are extraordinarily effective in stopping housebreaking and thefts in
addition to supporting police reply to emergency situations. The mainstay of the home safety gadget
is sincerely the excessive decibel siren. Today the siren is used to thrust back might be intruders now
not for monitoring functions. In maximum instances home safety structures are monitored by using
large businesses with more than one monitoring centers. These facilities house endless educated
professionals who are there in times of want for houses and corporations throughout the world in
present scenario. These monitoring facilities also can offer aid for different ability screw ups
consisting of carbon monoxide, fire, freezing pipes, and much greater [2].
1. PIR Sensors.
2. Microcontrollers.
3. Stepper motor.
4. Camera.
5. Personal Computer.
1. PIR Sensors
A passive infrared sensor (PIR sensor) is an electronic sensor that measures infrared (IR) light
radiating from objects in its field of view. They are most often used in PIR-based motion
detectors.
1. PIR sensor allow us to sense the motion, almost Always use to detect whether a human
has moved in or out of the sensors range.
3. In, homo sapiens, radiate heat in form of radiation at wavelength of 10-12 micrometer
that can only detect by the PIR sensor .
4. PIR sensors allow you to sense motion, almost always used to detect whether a human
has moved in or out of the sensors range. They are small, inexpensive, low-power, easy
to use and don't wear out.
2. Microcontrollers
Figure 3 : Microcontroler
1. small computer on a single integrated circuit containing a CPU, memory, Timer and It is
a programmable input/output ports.
2. Microcontroller available with different word length such as 8bit, 16bit and 32 bits
Microcontroller.
3. Microcontroller can contain a varying number of I/O pins. These pins can configured to
either an input or an output state.
3. Stepper Motors
A stepper motor is a motor that divides a full rotation into a number of equal steps. The motor's
position can then be commanded to move and hold at one of these steps without any feedback sensor
(an open-loop controller), as long as the motor is carefully sized to the application in respect to torque
and speed.
1. Stepper motors are digital motors, we actually Send Position signals to the Motor to drive
them.
2. It is of four wire stepper motor.
4. Camera
Wireless security cameras are closed-circuit television (CCTV) cameras that transmit a video and
audio signal to a wireless receiver through a radio band. Many wireless security cameras require at
least one cable or wire for power; "wireless" refers to the transmission of video/audio. However,
some wireless security cameras are battery-powered, making the cameras truly wireless from top to
bottom.
1. Wide transmission range—usually close to 450 feet (open space, clear line of sight between
camera and receiver)
2. High quality video and audio.
3. Two-way communication between the camera and the receiver.
4. Digital signal means you can transmit commands and functions, such as turning lights on and
off.
5. You can connect multiple receivers to one recording device, such as security DVR.
Wireless security cameras function best when there is a clear line of sight between the camera(s) and
the receiver. Outdoors, and with clear line of sight, digital wireless cameras typically have a range
between 250 to 450 feet. Indoors, the range can be limited to 100 to 150 feet. Cubical walls, drywall,
glass, and windows generally do not degrade wireless signal strength. Brick, concrete floors, and
walls degrade signal strength. Trees that are in the line of sight of the wireless camera and receiver
may impact signal strength.
5. Personal Computer
Software applications for most personal computers include, but are not limited to, word processing,
spreadsheets, databases, web browsers and e-mail clients, digital media playback, games and many
personal productivity and special-purpose software applications. Modern personal computers often
have connections to the Internet, allowing access to the World Wide Web and a wide range of other
resources. Personal computers may be connected to a local area network (LAN), either by a cable or a
wireless connection. A personal computer may be a laptop computer or a desktop computer running
an operating system such as Windows, Linux (and the various operating systems based on it), or
Macintosh OS.
Step1: user enters the password, if password entered is correct then the system starts else he is
prompted to re-enter the password.
Step2: If sensor sense any change or sense any motion, then an intrusion is detected. Else there
is no intrusion.
Step3: If intrusion is detected, then relay triggered, stepper motor rotates the camera, it start
recording and an e-mail is sent to user.
Today's security systems are extremely effective in preventing burglary and thefts as well as helping
police respond to emergency situations. The mainstay of the home security system is definitely the
high decibel siren. Today the siren is used to ward off would be intruders not for monitoring purposes.
In most cases home security systems are monitored by large companies with multiple monitoring
centers. These centers house countless trained professionals who are there in times of need for
residences and businesses across the country. These monitoring centers also can provide support for
other potential disasters such as carbon monoxide, fire, freezing pipes, and much more. Modern
security systems use alarms, infrared motion sensors, digital surveillance and contemporary
monitoring stations. Monitoring is extremely efficient and emergency response time for triggered
alarms has improved dramatically due to technology [1].
CHAPTER 2
LITERATURE SURVEY
During the course of this project, there were many surveys carried out regarding the various
components, techniques of the advanced invisible eye security system, they might be implemented in
our project along with the various systems already existing. Many websites were visited to get ideas
about the current working modules for controlling of the parameters. Books on micro controller as
well as various sensors and camera behaviors were read to understand exactly how much it will be
able to sustain our requirements and if any other options could be used [2].
Invisible eye an advanced security system is mainly designed to use a single camera to perform the
security. The reason for security is, the user of a system may have valuable belongings kept in his
home, or a jewelers shop owner need security at night times for his property. The present technologies
have many disadvantages like multiple camera’s, more cost, power consumption, the owner has to
always view the recording of the footage without any assurance of the theft. One can design the
model using different sensors like motion sensor, vibration sensor, the motion sensor detects the
motion of a human being in that particular area where a sensor is placed. Once the sensor, senses the
motion or vibration it sends that information of motion to the Microcontroller. Here we are using
Initially, camera movements were mainly studied by the technical inspection and observation. Basic
camera movements were categorized and their duration estimated long before the camera tracking
technology enabled precise measurement of camera movements. The first generation of invisible eye
tracking devices was highly uncomfortable. A breakthrough in this technology was the development
of the first invisible eye system with sensors and microcontrollers apparatus based on photography
and sensors based systems. It can be considered as the first invention in video-based tracking. The
development of unobtrusive camera-based systems and the increase of computing power enabled
gathering of data in real time, enabling the uses movement as a control method for people.
As far as camera is concerned it is better to use the camera with high resolution not less than 640 x
480 and camera must be IR sensitive. As far as sensors are concerned, there are many IR sensors that
One can design the model using different sensors like motion sensor, vibration sensors, the motion
sensor detects the motion of a human being in that particular area where a sensor is placed. Once the
sensor, senses the motion or vibration it sends that information of motion to the Microcontroller. Here
we are using stepper motor, wireless camera and also a PC. Motion sensors are types of electronic
security device that senses movement and usually triggers an alarm. Many types of motion
sensors can sense motion in total darkness, without an intruder becoming aware that an alarm has
been triggered. Motion sensors are an important part of most burglar alarm systems. They help alert
security personnel, especially in situations where no obvious break-in has occurred. For instance, if
an intruder steals a key to gain access to a protected site or hides within the site during normal
business hours, the intruder’s entrance or presence could go unnoticed. A motion sensor will detect
the intruder’s movements as soon as he or she walks or otherwise moves within the area protected by
the detector. Motion sensors usually protect indoor areas, where conditions can be more closely
controlled. Sensors for use in homes usually detect movement in spaces about 11 m × 11 m (35 ft ×
35 ft) in area. Sensors for large warehouses can protect areas with dimensions as large as 24 m × 37
m (80 ft × 120 ft).Buildings with valuable or important assets, such as museums, also use motion
sensors to detect break-ins at vulnerable points. Such points include walls, doors, windows, skylights,
and even air ducts. Special motion sensors can protect the inside of exhibit cases where items such as
diamonds are displayed. These monitoring centers also can provide support for other potential
disasters such as carbon monoxide, fire, freezing pipes, and much more. Modern security systems
user alarms, infrared motion sensors, digital surveillance and contemporary monitoring stations.
Monitoring is extremely efficient and emergency response time for triggered alarms has improved
ATM security has turned into an industry in and of itself. ATM transactions are quick and convenient,
but the machines and the areas surrounding them can be susceptible to criminal activity if not
properly protected. The use of video surveillance, especially new IP-based security cameras can help
to ensure that ATM transactions are safe.
IP network cameras can provide valuable visual evidence of crimes involving cash machines.
Searching through digital footage for specific times and dates is typically a smooth and painless
process. Some ATMs are left unattended for long periods of time. In such cases, archived footage can
prove invaluable when an incident is reported.
CHAPTER 4
ANALYSIS
3.1 ANALYSIS
Some of the analysis that we have came across while preparing the desired systems are
discussed below.
4.1 APPLICATIONS
2. Warehouse Surveillance.
5. Crime Deterrent.
7. ATM’s security.
5.1 ADVANTAGES:
1. Invisible Eye Security system solves many of the problems faced by the multiple camera
based security system at an easily affordable cost.
2. The biggest advantage is that we can avoid having to wade through hours of footage of empty
rooms.
3. One can also avoid having to install multiple cameras to cover a single room.
5.2 DISADVANTAGES:
2. If the owner is out of network then message will not be sent [6].
CHAPTER 6
The proposed prototype system is implemented and tested for the desired functionalities. The system
sent messages to a three pre-defined cell phone number and started recording the video after the
stepper motor rotated towards the sensing area. The whole test procedure is done in a laboratory
having the mentioned criteria for optimal performance. Based on several experiments conducted
under various conditions, it is verified that this system can resolve the presence of any warm body
within the coverage area and execute subsequent actions [5].
In order for a PIR sensor to work well most of the time, it is designed with certain limitations. A PIR
sensor cannot detect a stationary or very slowly moving body. If the sensor was set to the required
sensitivity, it would be activated by the cooling of a nearby wall in the evening, or by very small
animals. Similarly, if someone walks straight towards a PIR sensor, it will not detect them until they
are very close by. PIR sensors are temperature sensitive - they work optimally at ambient air
temperatures of around 15-20 degree Celsius. If the temperature is over 30 degree Celsius, the field of
view narrows and the sensor will be less sensitive. Alternatively, if the temperature is below 15
degree Celsius, the field of view widens and smaller or more distant objects will activate the sensor.
On cold nights, the difference in temperature between a person, e.g. normal body temperature is 37°C
and the outside air temperature is relatively large, giving an apparent increase in performance of the
sensor. On hot nights, this difference in temperature is relatively small and a decrease in performance
of the sensor can be expected [5].
Moreover, the PIR sensors are sensitive to exposure to direct sunlight and direct wind from heaters
and air conditioners. Precaution is required if there are pets in the house. PIR's are sensitive enough to
detect dogs and cats. There are special lens available or a tape can be put on lower part of the existing
System [5].
CONCLUSION
In this security system PIR sensor has been used which is low power, and low cost, pretty rugged,
have a wide lens range, and are easy to interface with. This security system can be implemented in
places like home, office, shop etc.
The sensitivity range for detecting motion of the system is about 3 to 4 feet. It can be raised up to 20
feet through careful use of concentrating optical lenses as future development. In addition to this, this
system can be equipped with glass break detectors to enhance the level of protection. In order to
enhance the location accuracy and to enhance the method of processing the PIR sensor signal, use of
more advanced techniques such as probabilistic theories and soft computing is left open for the future.
In future we can use high end cameras to send the video footage to the mobile for enhanced security.
2. It solves many of the problems faced by the multiple Camera based security system.
1. https://www.seminarsonly.com/computer%20science/invisible-eye-seminar-
report-ppt-pdf.php
2. http://www.scribd.com/mobile/doc/84040168/invisible-eye-advance-security-
system
3. https://en.wikipedia.org/wiki/The_Invisible_Eye
2003.
5. https://www.academia.edu/8979599/Invisible_Eye_An_advanced_Security_Syst
em_Using_Web_Camera_Introduction
6. https://www.slideshare.net/vashishthnsoni/seminar-on-invisible-eye
8. https://www.ijrter.com/papers/volume-4/issue-3/invisible-eye-an-advanced-
security-system