You are on page 1of 25

INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Introduction
In this modern era, property crimes are more predominant. This necessitates our
need to
Develop an advanced security system which is the INVISIBLE EYES. It is basically a
single
camera based security system that can be used to protect valuable kept in a room of
a house or
property Manager can only view the footage which was alerted on the presence of
intrusion.
Once the intruder has been detected this information about intruder will be
directed to the cop
Through the sms. And the same time camera can slew around the room and record only
when it
is alerted by the presence of any intrusion.
Manager can only view the footage which was alerted on the presence of intrusion.
This type of
system would lead to less time consuming and this will help to keep track of the
intruder easily
in less time. Once the intruder has been detected this information about intrusion
will be directed
to the cop through the E-mail. Such a system would consist three components –
sensors that
detect intrusion; the camera that slews to the point of intrusion and takes
pictures; and the keypad
that is used to interface with the system which allows any person to disable the
system by
entering the right password.

Objectives
To design advanced security with an affordable and less complex system referred as
“Invisible
Eye”

Design Methodology
This system consists of the following components:

• Sensors
• Microcontroller
• Stepper motor
KEC/BTECH/CSE/2015-16

Page 1
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

• Camera
• Personal Computer

MICROCONTROLLER

 small computer on a single integrated circuit containing a CPU, memory, Timer and
It is
a programmable input/output ports
 Microcontroller available with different word length such as 8bit, 16bit and 32
bits
microcontroller

KEC/BTECH/CSE/2015-16

Page 2
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

 Microcontroller can contain a varying number of I/O pins. These pins can
configured to
either an input or an output state.
A microcontroller is a small computer (SoC) on a single integrated circuit
containing a
processor core, memory, and programmable input/output peripherals. Program memory
in the
form of Ferroelectric RAM, NOR flash or OTP ROM is also often included on chip, as
well as a
typically small amount of RAM. Microcontrollers are designed for embedded
applications, in
contrast to the microprocessors used in personal computers or other general purpose
applications
consisting of various discrete chips.
Microcontrollers are used in automatically controlled products and devices, such as
automobile
engine control systems, implantable medical devices, remote controls, office
machines,
appliances, power tools, toys and other embedded systems. By reducing the size and
cost
compared to a design that uses a separate microprocessor, memory, and input/output
devices,
microcontrollers make it economical to digitally control even more devices and
processes. Mixed
signal microcontrollers are common, integrating analog components needed to control
nondigital electronic systems.
Some microcontrollers may use four-bit words and operate at clock rate frequencies
as low as 4
kHz, for low power consumption (single-digit milli watts or microwatts). They will
generally
have the ability to retain functionality while waiting for an event such as a
button press or other
interrupt; power consumption while sleeping (CPU clock and most peripherals off)
may be just
nano watts, making many of them well suited for long lasting battery applications.
Other
microcontrollers may serve performance-critical roles, where they may need to act
more like
a digital signal processor (DSP), with higher clock speeds and power consumption.

Microcontroller embedded memory technology


Since the emergence of microcontrollers, many different memory technologies have
been used.
Almost all microcontrollers have at least two different kinds of memory, a non-
volatile memory
for storing firmware and a read-write memory for temporary data.

KEC/BTECH/CSE/2015-16

Page 3
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Data
working

memory,

with

few

more

transistors

per

bit

used

in

the register

file. FRAM or MRAM could potentially replace it as it is 4 to 10 times denser which


would
make it more cost effective.
In addition to the SRAM, some microcontrollers also have internal EEPROM for data
storage;
and even ones that do not have any (or not enough) are often connected to external
serial
EEPROM chip (such as the BASIC Stamp) or external serial flash memory chip.
A few recent microcontrollers beginning in From the earliest microcontrollers to
today, sixtransistor SRAM is almost always used as the read/write 2003 have "self-
programmable" flash
memory.

Firmware
The earliest microcontrollers used mask ROM to store firmware. Later
microcontrollers (such as
the early versions of the Frees cale 68HC11 and early PIC microcontrollers) had
quartz windows
that allowed ultraviolet light in to erase the EPROM.
The Microchip PIC16C84, introduced in 1993,was the first microcontroller to use
EEPROM to
store firmware. In the same year, Atmel introduced the first microcontroller NOR
Flash
memory to store firmware.

KEC/BTECH/CSE/2015-16

Page 4
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

STEPPER MOTOR

 Stepper motors are digital motors, we actually Send Position signals to the Motor
to
drive them.
 It is of four wire stepper motor
A stepper motor or step motor or stepping motor is a motor that divides a full
rotation into a
number of equal steps. The motor's position can then be commanded to move and hold
at one of
these steps without any feedback sensor (an open-loop controller), as long as the
motor is
carefully sized to the application in respect to torque and speed.
Switched reluctance motors are very large stepping motors with a reduced pole
count, and
generally are closed-loop commutated.

KEC/BTECH/CSE/2015-16

Page 5
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

APPLICATIONS
Computer controlled stepper motors are a type of motion-control positioning system.
They are
typically digitally controlled as part of an open loop system for use in holding or
positioning
applications.
In the field of lasers and optics they are frequently used in precision positioning
equipment such
as linear actuators, linear stages, rotation stages, goniometers and mirror mounts.
Other uses are
in packaging machinery, and positioning of valve pilot stages for fluid control
systems.
Commercially, stepper motors are used in floppy disk drives, flatbed scanners,
computer
printers, plotters, slot machines image scanners, compact disc drives, intelligent
lighting, camera
lenses, CNC machines and, more recently, in 3D printers.

Stepper motor system


A stepper motor system consists of three basic elements, often combined with some
type of user
interface (host computer, PLC or dumb terminal):

Indexers - The indexer (or controller) is a microprocessor capable of generating


step pulses
and direction signals for the driver. In addition, the indexer is typically
required to perform
many other sophisticated command functions.

Drivers - The driver (or amplifier) converts the indexer command signals into the
power
necessary to energize the motor windings. There are numerous types of drivers, with
different voltage and current ratings and construction technology. Not all drivers
are suitable
to run all motors, so when designing a motion control system the driver selection
process is
critical.

Stepper motors - The stepper motor is an electromagnetic device that converts


digital pulses
into mechanical shaft rotation. Advantages of step motors are low cost, high
reliability, high
torque at low speeds and a simple, rugged construction that operates in almost any
environment. The main disadvantages in using a stepper motor is the resonance
effect often
exhibited at low speeds and decreasing torque with increasing speed.

KEC/BTECH/CSE/2015-16

Page 6
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Advantages

Low cost for control achieved

High torque at startup and low speeds

Ruggedness

Simplicity of construction

Can operate in an open loop control system

Low maintenance

Less likely to stall or slip

Will work in any environment

Can be used in robotics in a wide scale.

High reliability

Disadvantages

Require a dedicated control circuit

Use more current than D.C. motors

Torque reduces at higher speeds


Resonances can occur if not properly controlled.

Not easy to operate at extremely high speeds.

KEC/BTECH/CSE/2015-16

Page 7
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

PIR SENSOR

A passive infrared sensor (PIR sensor) is an electronic sensor that measures


infrared (IR) light
radiating from objects in its field of view. They are most often used in PIR-based
motion
detectors.
 PIR sensor allow us to sense the motion, almost Always use to detect whether a
human
has moved in or out of the sensors range.
 It is commonly found in appliances and gadgets Used in homes or business,
 Sensitivity Range: up to 20 feet (6 meters).
 We, homo sapiens, radiate heat in form of radiation at wavelength of 10-12
micrometer
that can only detect by the PIR sensor .
KEC/BTECH/CSE/2015-16

Page 8
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

 PIR sensors allow you to sense motion, almost always used to detect whether a
human
has moved in or out of the sensors range. They are small, inexpensive, low-power,
easy
to use and don't wear out.

OPERATING PRINCIPLES
All objects with a temperature above absolute zero emit heat energy in the form of
radiation.
Usually this radiation is invisible to the human eye because it radiates at
infrared wavelengths,
but it can be detected by electronic devices designed for such a purpose.
The term passive in this instance refers to the fact that PIR devices do not
generate or radiate any
energy for detection purposes. They work entirely by detecting the energy given off
by other
objects.[1] PIR sensors don't detect or measure "heat"; instead they detect the
infrared radiation
emitted or reflected from an object.
CONSTRUCTION

Infrared radiation enters through the front of the sensor, known as the 'sensor
face'. At the core of
a PIR sensor is a solid state sensor or set of sensors, made from materials which
generate energy
when exposed to heat. Typically, the sensors are approximately 1/4 inch square (40
mm2), and
take the form of a thin film. Materials commonly used in PIR sensors include
gallium
nitride (GaN), caesium nitrate (CsNO3), polyvinyl fluorides, derivatives of
phenylpyridine , and
cobalt phthalocyanine. The sensor is often manufactured as part of an integrated
circuit.
A PIR-based motion detector is used to sense movement of people, animals, or other
objects.
They are commonly used in burglar alarms and automatically-activated lighting
systems. They
are commonly called simply "PIR", or sometimes "PID", for "passive infrared
detector".

Operation
An individual PIR sensor detects changes in the amount of infrared radiation
impinging upon it,
which varies depending on the temperature and surface characteristics of the
objects in front of
the sensor. When an object, such as a human, passes in front of the background,
such as awall,
the temperature at that point in the sensor's field of view will rise from room
temperature tobody
temperature, and then back again. The sensor converts the resulting change in the
incoming
infrared radiation into a change in the output voltage, and this triggers the
detection. Objects of
KEC/BTECH/CSE/2015-16
Page 9
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

similar temperature but different surface characteristics may also have a different
infrared
emission pattern, and thus moving them with respect to the background may trigger
the detector
as well.
PIRs come in many configurations for a wide variety of applications. The most
common models
have numerous Fresnel lenses or mirror segments, an effective range of about ten
meters (thirty
feet), and a field of view less than 180 degrees. Models with wider fields of view,
including 360
degrees, are available—typically designed to mount on a ceiling. Some larger PIRs
are made
with single segment mirrors and can sense changes in infrared energy over one
hundred feet
away from the PIR. There are also PIRs designed with reversible orientation mirrors
which allow
either broad coverage (110° wide) or very narrow "curtain" coverage, or with
individually
selectable segments to "shape" the coverage.

GSM MODEM

KEC/BTECH/CSE/2015-16

Page 10
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

 It is a special type of modem which accepts SIM card.


 These GSM modem are more frequently used

to provide mobile

connectivity.
 Many of them can also be used for sending and receiving SMS.
 In this case we are using GSM modem for sending the message only.
 GSM was intended to be a secure wireless system. It has considered the user
authentication

using

a pre-shared

key and

challenge-response,

and

over-the-air

encryption. However, GSM is vulnerable to different types of attack, each of them


aimed
at a different part of the network.
 The development of UMTS introduces an optional Universal Subscriber Identity
Module (USIM), that uses a longer authentication key to give greater security, as
well as
mutually authenticating the network and the user, whereas GSM only authenticates
the
user to the network (and not vice versa). The security model therefore offers
confidentiality and authentication, but limited authorization capabilities, and no
nonrepudiation.
 GSM

uses

several

cryptographic

algorithms

for

security.

The A5/1, A5/2,

and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was
developed first and is a stronger algorithm used within Europe and the United
States;
A5/2 is weaker and used in other countries. Serious weaknesses have been found in
both
algorithms: it is possible to break A5/2 in real-time with a ciphertext-only
attack, and in
January 2007, The Hacker's Choice started the A5/1 cracking project with plans to
use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system
supports multiple algorithms so operators may replace that cipher with a stronger
one.
 Since 2000, different efforts have been done in order to crack the A5 encryption
algorithms. Both A5/1 and A5/2 algorithms are broken, and their cryptanalysis has
been
considered in the literature. As an example, Karsten Nohl developed a number of
rainbow
tables (static values which reduce the time needed to carry out an attack) and have
found
new sources for known plaintext attacks. He said that it is possible to build "a
full GSM
KEC/BTECH/CSE/2015-16

Page 11
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

interceptor...from open-source components" but that they had not done so because of
legal concerns. Nohl claimed that he was able to intercept voice and text
conversations by
impersonating another user to listen to voicemail, make calls, or send text
messages using
a seven-year-old Motorola cell phone and decryption software available for free
online.
 New attacks have been observed that take advantage of poor security
implementations,
architecture, and development for smart phone applications. Some wiretapping and
eavesdropping techniques hijack the audio input and output providing an opportunity
for
a third party to listen in to the conversation.
 GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing
the
web. The most commonly deployed GPRS ciphers were publicly broken in 2011.
 The researchers revealed flaws in the commonly used GEA/1 and GEA/2 ciphers and
published the open-source "gprs decode" software for sniffing GPRS networks. They
also
noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to
detect the
use of traffic or protocols they do not like (e.g., Skype), leaving customers
unprotected.
GEA/3 seems to remain relatively hard to break and is said to be in use on some
more
modern

networks.

If

used

with USIM to

prevent

connections

to fake

base

stations and downgrade attacks, users will be protected in the medium term, though
migration to 128-bit GEA/4 is still recommended.

KEC/BTECH/CSE/2015-16

Page 12
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Camera

Wireless security cameras are closed-circuit television (CCTV) cameras that


transmit a video
and audio signal to a wireless receiver through a radio band. Many wireless
security cameras
require at least one cable or wire for power; "wireless" refers to the transmission
of video/audio.
However, some wireless security cameras are battery-powered, making the cameras
truly
wireless from top to bottom.
Wireless cameras are proving very popular among modern security consumers due to
their low
installation costs (there is no need to run expensive video extension cables) and
flexible
mounting options; wireless cameras can be mounted/installed in locations previously
unavailable
to standard wired cameras. In addition to the ease of use and convenience of
access, wireless
security camera allows users to leverage broadband wireless internet to provide
seamless video
streaming over-internet.

KEC/BTECH/CSE/2015-16

Page 13
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Digital wireless is the transmission of audio and video analog signals encoded as
digital packets
over high-bandwidth radio frequencies.
Advantages include:

Wide transmission range—usually close to 450 feet (open space, clear line of sight
between
camera and receiver)

High quality video and audio

Two-way communication between the camera and the receiver

Digital signal means you can transmit commands and functions, such as turning
lights on and
off.

You can connect multiple receivers to one recording device, such as security DVR

Wireless Range
Wireless security cameras function best when there is a clear line of sight between
the camera(s)
and the receiver. Outdoors, and with clear line of sight, digital wireless cameras
typically have a
range between 250 to 450 feet. Indoors, the range can be limited to 100 to 150
feet. Cubical
walls, drywall, glass, and windows generally do not degrade wireless signal
strength. Brick,
concrete floors, and walls degrade signal strength. Trees that are in the line of
sight of the
wireless camera and receiver may impact signal strength.
The signal range also depends on whether there are competing signals using the same
frequency
as the camera. For example, signals from cordless phones or routers may affect
signal strength.
When this happens, the camera image may freeze, or appear "choppy". Typical
solution involves
locking the channel that wireless router operates on.

KEC/BTECH/CSE/2015-16

Page 14
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

Personal Computer

A personal computer is a general-purpose computer whose size, capabilities, and


original
sale price make it useful for individuals, and is intended to be operated directly
by an enduser with

no

intervening

computer time-sharing models

that

allowed

larger,

more

expensive minicomputer and mainframe systems to be used by many people, usually at


the same
time.
Software applications for most personal computers include, but are not limited to,
word
processing, spreadsheets,databases, webbrowsers and e-mail clients, digital
media playback, games and

many

personal

productivity

and

special-purpose

software

applications. Modern personal computers often have connections to the Internet,


allowing access

KEC/BTECH/CSE/2015-16

Page 15
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

to the World Wide Web and a wide range of other resources. Personal computers may
be
connected to a local area network(LAN), either by a cable or a wireless connection.
A personal
computer may be a laptop computer or a desktop computer running an operating system
such as
Windows, Linux (and the various operating systems based on it), or Macintosh OS.
Early computer owners usually had to write their own programs to do anything useful
with the
machines, which even did not include an operating system. The very earliest
microcomputers,
equipped with a front panel, required hand-loading of a bootstrap program to load
programs from
external storage (paper tape, cassettes, or eventually diskettes). Before very long
, automatic
booting from

permanent read-only memory became universal. Today's users have access to a

wide range of commercial software, freeware and free and open-source software,
which are
provided in ready-to-run or ready-to-compile form. Software for personal computers,
such as
applications and video games, are typically developed and distributed independently
from the
hardware or OS manufacturers, whereas software for many mobile phones and other
portable
systems is approved and distributed through a centralized online store.[1][2]
Since the early 1990s, Microsoft operating systems and Intel hardware dominated
much of the
personal computer market, first with MS-DOS and then with Windows. Popular
alternatives to
Microsoft's Windows operating systems include Apple's OS X and free open-source
Unixlike operating systems such as Linux and BSD. AMD provides the major
alternative to Intel's
processors. ARM architecture processors now outnumber Intel's (and compatibles) in
smart
phones and tablets , that are also personal computers, outnumbering the traditional
kind.

KEC/BTECH/CSE/2015-16

Page 16
INVISIBLE EYE ADVANCED SECURITY SYSTEM

KEC/BTECH/CSE/2015-16

12F41A0518

Page 17
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

WORKING
Step1: user enters the password, if password entered is correct then the system
starts else he is
prompted to re-enter the password.

Step2: If sensor sense any change or sense any motion, then an intrusion is
detected. Else there
is no intrusion.

Step3: If intrusion is detected, then relay triggered, stepper motor rotates the
camera, it start
recording and an e-mail is sent to user

ADVANTAGES
 Invisible Eye Security system solves many of the problems
faced by the multiple camera based security system at an
easily affordable cost.
 The biggest advantage is that we can avoid having to wade
through hours of footage of empty rooms.
 One can also avoid having to install multiple cameras to
cover a single room.

DIS ADVANTAGES
 we have to deactivate the system while your
shop is open
 If the owner is out of network then message
will not be sent.

KEC/BTECH/CSE/2015-16

Page 18
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

APPLICATIONS
 Use for home security systems.
 Office security system
 Bank security system

CONCLUSION
 It is very secure security system as compare to present
security system.
 it solves many of the problems faced by the multiple
Camera based security system.
 so we can use Invisible eyes instead of present security
system.

REFERENCES
The 8051 microcontroller and embedded systemby Muhammad Ali Mazidi
http://www.scribd.com/mobile/doc/84040168/INVISIBLE-EYE-ADVANCE-SECURITYSYSTEM-PPT
http://www.seminarsonly.com/computer%20science/invisible-eye-seminar-report-ppt-
pdf.php
Sauter , Martin (21 Nov 2013). "The GSM Logo: The Mystery of the 4 Dots Solved".
Retrieved
23 Nov 2013. [...] here's what [Yngve Zetterstrom, rapporteur of the Maketing and
Planning
(MP) group of the MoU (Memorandum of Understanding group, later to become the GSM
Association (GSMA)) in 1989] had to say to solve the mystery: '[The dots symbolize]
three
[clients] in the home network and one roaming client.' There you go, an answer from
the prime
source!
KEC/BTECH/CSE/2015-16

Page 19
INVISIBLE EYE ADVANCED SECURITY SYSTEM

12F41A0518

1. Thiel, Bill (31 January 2002). "Online Dairy". New York Times. The New York
Times.
2. Jump up^ Hays, Tom (16 April 2006). "NYPD deploys first of 500 security
cameras".
USA Today. The Associated Press. Retrieved7 June 2014.
3. Jump up^ "IP Camerasysteem". Camerabewaking-shop

KEC/BTECH/CSE/2015-16

Page 20

You might also like