Professional Documents
Culture Documents
DF
DF
12F41A0518
Introduction
In this modern era, property crimes are more predominant. This necessitates our
need to
Develop an advanced security system which is the INVISIBLE EYES. It is basically a
single
camera based security system that can be used to protect valuable kept in a room of
a house or
property Manager can only view the footage which was alerted on the presence of
intrusion.
Once the intruder has been detected this information about intruder will be
directed to the cop
Through the sms. And the same time camera can slew around the room and record only
when it
is alerted by the presence of any intrusion.
Manager can only view the footage which was alerted on the presence of intrusion.
This type of
system would lead to less time consuming and this will help to keep track of the
intruder easily
in less time. Once the intruder has been detected this information about intrusion
will be directed
to the cop through the E-mail. Such a system would consist three components –
sensors that
detect intrusion; the camera that slews to the point of intrusion and takes
pictures; and the keypad
that is used to interface with the system which allows any person to disable the
system by
entering the right password.
Objectives
To design advanced security with an affordable and less complex system referred as
“Invisible
Eye”
Design Methodology
This system consists of the following components:
• Sensors
• Microcontroller
• Stepper motor
KEC/BTECH/CSE/2015-16
Page 1
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
• Camera
• Personal Computer
MICROCONTROLLER
small computer on a single integrated circuit containing a CPU, memory, Timer and
It is
a programmable input/output ports
Microcontroller available with different word length such as 8bit, 16bit and 32
bits
microcontroller
KEC/BTECH/CSE/2015-16
Page 2
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Microcontroller can contain a varying number of I/O pins. These pins can
configured to
either an input or an output state.
A microcontroller is a small computer (SoC) on a single integrated circuit
containing a
processor core, memory, and programmable input/output peripherals. Program memory
in the
form of Ferroelectric RAM, NOR flash or OTP ROM is also often included on chip, as
well as a
typically small amount of RAM. Microcontrollers are designed for embedded
applications, in
contrast to the microprocessors used in personal computers or other general purpose
applications
consisting of various discrete chips.
Microcontrollers are used in automatically controlled products and devices, such as
automobile
engine control systems, implantable medical devices, remote controls, office
machines,
appliances, power tools, toys and other embedded systems. By reducing the size and
cost
compared to a design that uses a separate microprocessor, memory, and input/output
devices,
microcontrollers make it economical to digitally control even more devices and
processes. Mixed
signal microcontrollers are common, integrating analog components needed to control
nondigital electronic systems.
Some microcontrollers may use four-bit words and operate at clock rate frequencies
as low as 4
kHz, for low power consumption (single-digit milli watts or microwatts). They will
generally
have the ability to retain functionality while waiting for an event such as a
button press or other
interrupt; power consumption while sleeping (CPU clock and most peripherals off)
may be just
nano watts, making many of them well suited for long lasting battery applications.
Other
microcontrollers may serve performance-critical roles, where they may need to act
more like
a digital signal processor (DSP), with higher clock speeds and power consumption.
KEC/BTECH/CSE/2015-16
Page 3
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Data
working
memory,
with
few
more
transistors
per
bit
used
in
the register
Firmware
The earliest microcontrollers used mask ROM to store firmware. Later
microcontrollers (such as
the early versions of the Frees cale 68HC11 and early PIC microcontrollers) had
quartz windows
that allowed ultraviolet light in to erase the EPROM.
The Microchip PIC16C84, introduced in 1993,was the first microcontroller to use
EEPROM to
store firmware. In the same year, Atmel introduced the first microcontroller NOR
Flash
memory to store firmware.
KEC/BTECH/CSE/2015-16
Page 4
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
STEPPER MOTOR
Stepper motors are digital motors, we actually Send Position signals to the Motor
to
drive them.
It is of four wire stepper motor
A stepper motor or step motor or stepping motor is a motor that divides a full
rotation into a
number of equal steps. The motor's position can then be commanded to move and hold
at one of
these steps without any feedback sensor (an open-loop controller), as long as the
motor is
carefully sized to the application in respect to torque and speed.
Switched reluctance motors are very large stepping motors with a reduced pole
count, and
generally are closed-loop commutated.
KEC/BTECH/CSE/2015-16
Page 5
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
APPLICATIONS
Computer controlled stepper motors are a type of motion-control positioning system.
They are
typically digitally controlled as part of an open loop system for use in holding or
positioning
applications.
In the field of lasers and optics they are frequently used in precision positioning
equipment such
as linear actuators, linear stages, rotation stages, goniometers and mirror mounts.
Other uses are
in packaging machinery, and positioning of valve pilot stages for fluid control
systems.
Commercially, stepper motors are used in floppy disk drives, flatbed scanners,
computer
printers, plotters, slot machines image scanners, compact disc drives, intelligent
lighting, camera
lenses, CNC machines and, more recently, in 3D printers.
Drivers - The driver (or amplifier) converts the indexer command signals into the
power
necessary to energize the motor windings. There are numerous types of drivers, with
different voltage and current ratings and construction technology. Not all drivers
are suitable
to run all motors, so when designing a motion control system the driver selection
process is
critical.
KEC/BTECH/CSE/2015-16
Page 6
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Advantages
Ruggedness
Simplicity of construction
Low maintenance
High reliability
Disadvantages
Resonances can occur if not properly controlled.
KEC/BTECH/CSE/2015-16
Page 7
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
PIR SENSOR
Page 8
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
PIR sensors allow you to sense motion, almost always used to detect whether a
human
has moved in or out of the sensors range. They are small, inexpensive, low-power,
easy
to use and don't wear out.
OPERATING PRINCIPLES
All objects with a temperature above absolute zero emit heat energy in the form of
radiation.
Usually this radiation is invisible to the human eye because it radiates at
infrared wavelengths,
but it can be detected by electronic devices designed for such a purpose.
The term passive in this instance refers to the fact that PIR devices do not
generate or radiate any
energy for detection purposes. They work entirely by detecting the energy given off
by other
objects.[1] PIR sensors don't detect or measure "heat"; instead they detect the
infrared radiation
emitted or reflected from an object.
CONSTRUCTION
Infrared radiation enters through the front of the sensor, known as the 'sensor
face'. At the core of
a PIR sensor is a solid state sensor or set of sensors, made from materials which
generate energy
when exposed to heat. Typically, the sensors are approximately 1/4 inch square (40
mm2), and
take the form of a thin film. Materials commonly used in PIR sensors include
gallium
nitride (GaN), caesium nitrate (CsNO3), polyvinyl fluorides, derivatives of
phenylpyridine , and
cobalt phthalocyanine. The sensor is often manufactured as part of an integrated
circuit.
A PIR-based motion detector is used to sense movement of people, animals, or other
objects.
They are commonly used in burglar alarms and automatically-activated lighting
systems. They
are commonly called simply "PIR", or sometimes "PID", for "passive infrared
detector".
Operation
An individual PIR sensor detects changes in the amount of infrared radiation
impinging upon it,
which varies depending on the temperature and surface characteristics of the
objects in front of
the sensor. When an object, such as a human, passes in front of the background,
such as awall,
the temperature at that point in the sensor's field of view will rise from room
temperature tobody
temperature, and then back again. The sensor converts the resulting change in the
incoming
infrared radiation into a change in the output voltage, and this triggers the
detection. Objects of
KEC/BTECH/CSE/2015-16
Page 9
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
similar temperature but different surface characteristics may also have a different
infrared
emission pattern, and thus moving them with respect to the background may trigger
the detector
as well.
PIRs come in many configurations for a wide variety of applications. The most
common models
have numerous Fresnel lenses or mirror segments, an effective range of about ten
meters (thirty
feet), and a field of view less than 180 degrees. Models with wider fields of view,
including 360
degrees, are available—typically designed to mount on a ceiling. Some larger PIRs
are made
with single segment mirrors and can sense changes in infrared energy over one
hundred feet
away from the PIR. There are also PIRs designed with reversible orientation mirrors
which allow
either broad coverage (110° wide) or very narrow "curtain" coverage, or with
individually
selectable segments to "shape" the coverage.
GSM MODEM
KEC/BTECH/CSE/2015-16
Page 10
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
to provide mobile
connectivity.
Many of them can also be used for sending and receiving SMS.
In this case we are using GSM modem for sending the message only.
GSM was intended to be a secure wireless system. It has considered the user
authentication
using
a pre-shared
key and
challenge-response,
and
over-the-air
uses
several
cryptographic
algorithms
for
security.
and A5/3 stream ciphers are used for ensuring over-the-air voice privacy. A5/1 was
developed first and is a stronger algorithm used within Europe and the United
States;
A5/2 is weaker and used in other countries. Serious weaknesses have been found in
both
algorithms: it is possible to break A5/2 in real-time with a ciphertext-only
attack, and in
January 2007, The Hacker's Choice started the A5/1 cracking project with plans to
use FPGAs that allow A5/1 to be broken with a rainbow table attack. The system
supports multiple algorithms so operators may replace that cipher with a stronger
one.
Since 2000, different efforts have been done in order to crack the A5 encryption
algorithms. Both A5/1 and A5/2 algorithms are broken, and their cryptanalysis has
been
considered in the literature. As an example, Karsten Nohl developed a number of
rainbow
tables (static values which reduce the time needed to carry out an attack) and have
found
new sources for known plaintext attacks. He said that it is possible to build "a
full GSM
KEC/BTECH/CSE/2015-16
Page 11
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
interceptor...from open-source components" but that they had not done so because of
legal concerns. Nohl claimed that he was able to intercept voice and text
conversations by
impersonating another user to listen to voicemail, make calls, or send text
messages using
a seven-year-old Motorola cell phone and decryption software available for free
online.
New attacks have been observed that take advantage of poor security
implementations,
architecture, and development for smart phone applications. Some wiretapping and
eavesdropping techniques hijack the audio input and output providing an opportunity
for
a third party to listen in to the conversation.
GSM uses General Packet Radio Service (GPRS) for data transmissions like browsing
the
web. The most commonly deployed GPRS ciphers were publicly broken in 2011.
The researchers revealed flaws in the commonly used GEA/1 and GEA/2 ciphers and
published the open-source "gprs decode" software for sniffing GPRS networks. They
also
noted that some carriers do not encrypt the data (i.e., using GEA/0) in order to
detect the
use of traffic or protocols they do not like (e.g., Skype), leaving customers
unprotected.
GEA/3 seems to remain relatively hard to break and is said to be in use on some
more
modern
networks.
If
used
with USIM to
prevent
connections
to fake
base
stations and downgrade attacks, users will be protected in the medium term, though
migration to 128-bit GEA/4 is still recommended.
KEC/BTECH/CSE/2015-16
Page 12
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Camera
KEC/BTECH/CSE/2015-16
Page 13
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Digital wireless is the transmission of audio and video analog signals encoded as
digital packets
over high-bandwidth radio frequencies.
Advantages include:
Wide transmission range—usually close to 450 feet (open space, clear line of sight
between
camera and receiver)
Digital signal means you can transmit commands and functions, such as turning
lights on and
off.
You can connect multiple receivers to one recording device, such as security DVR
Wireless Range
Wireless security cameras function best when there is a clear line of sight between
the camera(s)
and the receiver. Outdoors, and with clear line of sight, digital wireless cameras
typically have a
range between 250 to 450 feet. Indoors, the range can be limited to 100 to 150
feet. Cubical
walls, drywall, glass, and windows generally do not degrade wireless signal
strength. Brick,
concrete floors, and walls degrade signal strength. Trees that are in the line of
sight of the
wireless camera and receiver may impact signal strength.
The signal range also depends on whether there are competing signals using the same
frequency
as the camera. For example, signals from cordless phones or routers may affect
signal strength.
When this happens, the camera image may freeze, or appear "choppy". Typical
solution involves
locking the channel that wireless router operates on.
KEC/BTECH/CSE/2015-16
Page 14
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
Personal Computer
no
intervening
that
allowed
larger,
more
many
personal
productivity
and
special-purpose
software
KEC/BTECH/CSE/2015-16
Page 15
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
to the World Wide Web and a wide range of other resources. Personal computers may
be
connected to a local area network(LAN), either by a cable or a wireless connection.
A personal
computer may be a laptop computer or a desktop computer running an operating system
such as
Windows, Linux (and the various operating systems based on it), or Macintosh OS.
Early computer owners usually had to write their own programs to do anything useful
with the
machines, which even did not include an operating system. The very earliest
microcomputers,
equipped with a front panel, required hand-loading of a bootstrap program to load
programs from
external storage (paper tape, cassettes, or eventually diskettes). Before very long
, automatic
booting from
wide range of commercial software, freeware and free and open-source software,
which are
provided in ready-to-run or ready-to-compile form. Software for personal computers,
such as
applications and video games, are typically developed and distributed independently
from the
hardware or OS manufacturers, whereas software for many mobile phones and other
portable
systems is approved and distributed through a centralized online store.[1][2]
Since the early 1990s, Microsoft operating systems and Intel hardware dominated
much of the
personal computer market, first with MS-DOS and then with Windows. Popular
alternatives to
Microsoft's Windows operating systems include Apple's OS X and free open-source
Unixlike operating systems such as Linux and BSD. AMD provides the major
alternative to Intel's
processors. ARM architecture processors now outnumber Intel's (and compatibles) in
smart
phones and tablets , that are also personal computers, outnumbering the traditional
kind.
KEC/BTECH/CSE/2015-16
Page 16
INVISIBLE EYE ADVANCED SECURITY SYSTEM
KEC/BTECH/CSE/2015-16
12F41A0518
Page 17
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
WORKING
Step1: user enters the password, if password entered is correct then the system
starts else he is
prompted to re-enter the password.
Step2: If sensor sense any change or sense any motion, then an intrusion is
detected. Else there
is no intrusion.
Step3: If intrusion is detected, then relay triggered, stepper motor rotates the
camera, it start
recording and an e-mail is sent to user
ADVANTAGES
Invisible Eye Security system solves many of the problems
faced by the multiple camera based security system at an
easily affordable cost.
The biggest advantage is that we can avoid having to wade
through hours of footage of empty rooms.
One can also avoid having to install multiple cameras to
cover a single room.
DIS ADVANTAGES
we have to deactivate the system while your
shop is open
If the owner is out of network then message
will not be sent.
KEC/BTECH/CSE/2015-16
Page 18
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
APPLICATIONS
Use for home security systems.
Office security system
Bank security system
CONCLUSION
It is very secure security system as compare to present
security system.
it solves many of the problems faced by the multiple
Camera based security system.
so we can use Invisible eyes instead of present security
system.
REFERENCES
The 8051 microcontroller and embedded systemby Muhammad Ali Mazidi
http://www.scribd.com/mobile/doc/84040168/INVISIBLE-EYE-ADVANCE-SECURITYSYSTEM-PPT
http://www.seminarsonly.com/computer%20science/invisible-eye-seminar-report-ppt-
pdf.php
Sauter , Martin (21 Nov 2013). "The GSM Logo: The Mystery of the 4 Dots Solved".
Retrieved
23 Nov 2013. [...] here's what [Yngve Zetterstrom, rapporteur of the Maketing and
Planning
(MP) group of the MoU (Memorandum of Understanding group, later to become the GSM
Association (GSMA)) in 1989] had to say to solve the mystery: '[The dots symbolize]
three
[clients] in the home network and one roaming client.' There you go, an answer from
the prime
source!
KEC/BTECH/CSE/2015-16
Page 19
INVISIBLE EYE ADVANCED SECURITY SYSTEM
12F41A0518
1. Thiel, Bill (31 January 2002). "Online Dairy". New York Times. The New York
Times.
2. Jump up^ Hays, Tom (16 April 2006). "NYPD deploys first of 500 security
cameras".
USA Today. The Associated Press. Retrieved7 June 2014.
3. Jump up^ "IP Camerasysteem". Camerabewaking-shop
KEC/BTECH/CSE/2015-16
Page 20