You are on page 1of 8

An advanced Security System Using Web Camera

Abstract
The main agenda of this work is to design advanced security with affordable and less
complex system referred as “Invisible Eye”. In this modern era, property crimes are more
predominant which necessitates developing an advanced security system. It is a single camera
based security system which is used to protect the valuables kept in room. This system can be
used when slew around the room and recorded when it is alerted by the presence of any
intrusion. Manager can only view the footage which was alerted on the presence of intrusion.
This type of system would lead to less time consuming and this will help to keep track of the
intruder easily in less time. Once the intruder has been detected this information about intrusion
will be directed to the cop through the message. Such a system would consist three components –
sensors that detect intrusion; the camera that slews to the point of intrusion and takes pictures.

Introduction

In this modern era, property crimes are more predominant. This necessitates our need to
develop an advanced security system which is the INVISIBLE EYE. It is basically a single
camera based security system that can be used to protect valuables kept in a room of a house or
property. Most existing camera based security systems involve the use of multiple cameras
placed around the room to be monitored. These cameras continuously record video footage of the
room and save it on a central monitoring station. Instead of this, we may use a different system in
which a single camera is used, that can slew around the room and record only when it is alerted
by the presence of any intrusion. And also camera has an artificial intelligence to detect the
shortest path. Such a system would consist of three components - sensors that detect intrusion;
the camera that slews to the point of intrusion and takes pictures; and the keypad that is used to
interface with the system which allows any person to disable the system by entering the right
password.
Block Diagram

16*2 LCD

Stepper Motor
Left PIR Stepper Motor
Renesas Driver
64pin

Right PIR
GSM

Buzzer

PC Wired Web
Camera

Description

Invisible eye an advanced security system is mainly designed to use a single camera to

perform the security. The reason for security is, the user of a system may have valuable

belongings kept in his home, or a jewellery shop owner need security at night times for his

property. The present technologies have many disadvantages like multiple camera’s, more cost,

power consumption, the owner has to always view the recording of the footage without any

assurance of the theft.

Here microcontroller is the heart of project, so which controls all the components in the

project shown above in the diagram, here we use single web camera being used to monitor the

allotted area that can slew around the room and record only when it is alerted by the presence of

any intrusion. Such a system would consist of components –PIR sensors that detect
intrusion(Left or Right PIR Sensors),here for demo concern we used only two PIR sensors; and

also camera has an artificial intelligence to detect the shortest path that slews to the point of

intrusion(Left or Right Sensors detects person movement) with help of stepper motor(for

rotation) and takes pictures and videos, the videos and pictures will be stored in the computer

using DOTNET software, then the buzzer will beeps continuously.

NOTE: Depending on the microcontroller architecture there will be the changes in the block
diagram, I/O lines; software’s & IDE which are being used to program the microcontroller and
the coding will be done using embedded C. The every information is displayed on LCD. The
message will be sent through GSM module to predefined numbers.

HARDWARE USED

1. Renesas Microcontroller
2. Sensors: Left and Right PIR
3. Stepper motor
4. Web camera
5. Personal Computer (Desk top) with basic configuration
6. GSM

Softwares Used
1. Cube suite+
2. Renesas flash programmer
3. Microsoft visual studio
MODERN SYSTEM

Today's security systems are extremely effective in preventing burglary and thefts as well as helping
police respond to emergency situations. The mainstay of the home security system is definitely the high
decibel siren. Today the siren is used to ward off would be intruders not for monitoring purposes. In most
cases home security systems are monitored by large companies with multiple monitoring centers. These
centers house countless trained professionals who are there in times of need for residences and businesses
across the country. These monitoring centers also can provide support for other potential disasters such as
carbon monoxide, fire, freezing pipes, and much more. Modern security systems use alarms, infrared
motion sensors, digital surveillance and contemporary monitoring stations. Monitoring is extremely
efficient and emergency response time for triggered alarms has improved dramatically due to technology

Methodology

Block
Diagram

Hardware
testing as per
project

Test Code
preparation for
Peripherals

Logic
Development
as per project

l TesFinating of
the project as
per Conditions
Demo Points
 A prototype module will be developed for the project. It includes individual PCB boards
for all interfaces according to the block diagram. Every PCB will be inter-connected with
jumper wires.

 For demo concern we used GSM for sending and receiving messages.

 For demo concern we used PIR Sensors for detecting the motion

 For demo concern we used LCD to display on going information in project

Application

 Crime Deterrent

 Data room

 Protect Employees

 Law suits

 ATM

 Jewelry shop

 Entry and Exit of Malls

 A remote corner of a parking lot requires security coverage 24hours a day, year round.

 A warehouse storing high explosives demands constant surveillance.

Advantages

 Human observers are costly and valuable resources.

 Observation of remote areas (parking lots, garages)


 Observation of hazardous areas (radioactive waste dumps, chemical storage areas)

 Discreet or concealed observation (loading docks, lobby areas)

 Sustained observation of areas with infrequent activity (warehouses, rail yards)

 Simultaneous observation of multiple areas (high-risebuildings, multiple building

campuses)

Disadvantages

 Limitations

Future Scope
For project demo concern, we have developed a prototype module. In future, this project can be
taken to the product level. To make this project as user friendly and durable, we need to make it
compact and cost effective. Going further, most of the units can be embedded along with the
controller on a single board with change in technology, thereby reducing the size of the system.

PIR Motion Detector Module:

PIR sensors allow you to sense motion, almost always used to detect whether a human has
moved in or out of the sensors range. They are small, inexpensive, low-power, easy to use and
don't wear out. For that reason they are commonly found in appliances and gadgets used in
homes or businesses. They are often referred to as PIR, "Passive Infrared","Pyroelectric", or "IR
motion" sensors. To increase the efficiency of SIP signaling, yet maintain 100% standards
compatibility with external VoIP systems and soft switches, xG has created patent pending SIP
compression technology for the Invisible Eye system that reduces SIP overhead bandwidth from
400% to 66% on the over the air links and backhaul links from the Base Stations to the Invisible
Eye MSCs. The MSCs do the SIP compression and decompression to maintain 100%
interoperability with third-party VoIP systems. This also has the benefit of making more
bandwidth available for mobile data applications being carried alongside voice traffic.

WORKING

Step 1: If sensors sense any change, then an intrusion is detected. Else there is no intrusion.

Step 2: If intrusion is detected, then relay triggered, stepper motor rotates the camera starts
recording and an e-mail is sent to the user CONCLUSION Invisible Eye security system solves
many of the problems faced by the multiple camera based systems at an easily affordable cost.
The biggest advantage is that we can avoid ISSN 2395-695X (Print) ISSN 2395-695X (Online)
Available online at www.ijarbest.com International Journal of Advanced Research in Biology
Ecology Science and Technology (IJARBEST) Vol. I, Special Issue I, August 2015 in
association with VEL TECH HIGH TECH DR. RANGARAJAN DR. SAKUNTHALA
ENGINEERING COLLEGE, CHENNAI National Conference on Recent Technologies for
Sustainable Development 2015 [RECHZIG’15] - 28th August 2015 166 having to wade through
hours of footage of empty rooms. One can also avoid having to install multiple cameras to cover
a single room. Cost required for the installation is very less compared to multiple camera based
system. We can avoid hours of footage of empty rooms. Good view of the video footage can be
obtained as camera turns 360°. This work can be extended to completely eliminate the use of the
microcontroller and instead use parallel port of the PC to monitor the sensors. Also advanced
image processing techniques can be applied to track the intruder once his position has been
identified. In future we can provide a memory so that one can store the footage which is recorded

Steps involved Testing the source code:

The source code for the microcontroller was tested without connecting the other parts such as the
sensors and the keypad. The signals indicating the presence of intruders was simulated. Testing
the sensor circuit : The sensor was placed on the surface of a table and its output was observed
for vibrations caused by tapping on the table. Verifying the keypad interface The next step was
to verify the keypad interface to see whether the code works properly. The code was tested by
burning into another microcontroller. Integrating the system By assembling the stepper
motor(along with the camera), sensor circuits and the keypad with the main microcontroller kit.
Next, the keypad was integrated into the system whose activation depends on the password
entered on the keypad

Conclusion

 Invisible Eye security system solves many of the problems faced by the Multiple camera
based systems at an easily affordable cost.
 The biggest advantage is that we can avoid having to wade through hours of footage of
empty rooms
 One can also avoid having to install multiple cameras to cover a single room

You might also like