In recent times the leakage of personal information and commercial secrets has increased by leaps and bounds. According to statistics in 2007 average no of victims for leak of personal information were 7, 85,568 and average no of victims for leak of commercial secrets were 2, 94,794. Of course these figures are not at all good for a developing company and nor for a company which is developed. Wireless Surveillance System has the solution to this problem.
Wireless Surveillance System model consists of IR transmitter and receiver, microcontroller board, computer (with internet), webcam, mobile. In this model when IR is interrupted the signal is send to the microcontroller which is connected to the computer, the computer then disables the keyboard, mouse also activates web cam simultaneously and sends live video to the GPRS enabled mobile. It also sends SMS messages in case the administrator is unable to view online images due to lack of internet connection of less speed.
This system is good as compared to other surveillance system because it does not require continuous monitoring the user is alerted by sending SMS followed by live video using video streaming. This system has a good future because it can also be used in banks, schools, government organizations etc.
Wireless Surveillance System: Frequently Asked Questions
What is the purpose of the Wireless Surveillance System?
The Wireless Surveillance System aims to prevent the leakage of personal information and commercial secrets by providing a robust security solution. It addresses the increasing problem of data breaches, offering real-time monitoring and control.
How does the Wireless Surveillance System work?
The system uses an IR transmitter and receiver to detect intrusions. When the IR beam is interrupted, a signal is sent to a microcontroller, which in turn triggers actions on a connected computer. This includes activating a webcam for live video streaming, disabling the computer's keyboard and mouse, and sending SMS alerts to the administrator. Even without an internet connection, SMS alerts ensure notification.
What are the advantages of this system compared to other surveillance systems?
Unlike systems requiring continuous monitoring, this system alerts the user via SMS and live video streaming, making it more efficient and convenient. Its versatility allows application in various settings such as banks, schools, and government organizations.
What technologies are used in this Wireless Surveillance System?
The system utilizes several key technologies: IR transmission, a microcontroller, a computer with internet connectivity, a webcam, a mobile phone with GPRS capability, motion detection algorithms, and potentially RSA encryption (mentioned in the keywords).
How does the system detect intruders?
Intrusion detection is achieved through two methods: (1) Motion detection using a motion detection algorithm and correlation formula, and (2) interruption of an infrared beam detected by infrared sensors (a photodiode and phototransistor).
What actions does the system take when an intruder is detected?
Upon detecting an intruder, the system triggers several actions: activates a burglar alarm, sends live images to the user's mobile phone, encrypts and sends important files to the user's email address, and deletes the files from the system. Additionally, it disables the keyboard and mouse of the connected computer.
How can the system be remotely monitored and controlled?
Users can access the system remotely via another computer by logging in through authentication. This allows for complete remote monitoring and control, including real-time video feed. Alternatively, basic monitoring and control can be done via SMS.
What is the system's approach to data security?
The system protects data by encrypting important files and sending them to the user's email address before deleting them from the system. This safeguards against data loss in case of intrusion.
What are the key components of the Wireless Surveillance System?
The key components include an IR transmitter and receiver, a microcontroller board, a computer (with internet access), a webcam, and a mobile phone.
What is the future potential of this Wireless Surveillance System?
The system's design allows for broad applicability across various sectors, including banks, schools, and government organizations, highlighting its significant potential for future development and implementation.
Abstract—In recent times the leakage of personal information and commercial secrets has increased by leaps and bounds. According to statistics in 2007 average no of victims for leak of personal information were 7, 85,568 and average no of victims for leak of commercial secrets were 2, 94,794. Of course these figures are not at all good for a developing company and nor for a company which is developed. Wireless Surveillance System has the solution to this problem.
Wireless Surveillance System model consists of IR transmitter and receiver, microcontroller board, computer (with internet), webcam, mobile. In this model when IR is interrupted the signal is send to the microcontroller which is connected to the computer, the computer then disables the keyboard, mouse also activates web cam simultaneously and sends live video to the GPRS enabled mobile. It also sends SMS messages in case the administrator is unable to view online images due to lack of internet connection of less speed.
This system is good as compared to other surveillance system because it does not require continuous monitoring the user is alerted by sending SMS followed by live video using video streaming. This system has a good future because it can also be used in banks, schools, government organizations etc.
Index Term — Correlation technique, Motion detection algorithm, RSA encryption algorithm, Sensors.
1 INTRODUCTION
I n this project, IR transmitter passes rays continuously to receiver, which in turn is connected at the top of the entrance of the door and will be connected to the PC which has webcam and internet connection. If there is no interruption between the transmitter and receiver, the receiver will receive rays continuously, and this will be monitored by the PC continuously. If any obstruction occurs there, the passage of rays will be disconnected, and that will be detected by the hardware connected to the PC. If there is any obstruction, the webcam will start recording the video and simultaneously the SMS will be send to corresponding person and the keyboard, mouse of the PC will be disabled and doors will be shut down and many more application can be controlled.
To view the live events happening at a site we need to connect to the PC with which the webcam is connected and the server part of this application should be running there in. Next we can start the client part loaded in the mobile and we need to specify the PC to be connected by passing its IP address where in the server part should be running. We can also specify the format for the images/snapshots to be taken and the corresponding time will be stored with that picture. We can choose view webcam option to see the live video. So we can connect to any location or the PC through this application which must fulfill the requirements specified above.
In case user has access to another system, he can also remotely log on to the server using authentication and start remote monitoring and control of the entire premises. The system would behave as if monitored and controlled from the server itself. Since a PC can provide with much more functionality than a mobile phone exact replica of server can be created for clients
hence providing complete remote monitoring and control architecture. Hence the user can select the mode of monitoring he needs. User can select between a basic control and monitoring using SMS or a complete control and monitoring (including real time video feed) using a client computer.
2 RELATED WORKS
In many video surveillance systems that are in use, user will come to know what is happening in his private area where he installed the surveillance system but though he can see the wrong thing is happening in his area, he cannot abort the activities of intruders and he fails to protect his valuable data, documents and other things. So our system provides user the real time images as well as a strong security to his data. To avoid loss of data our system encrypts important files and sends them to the user’s email-Id. In addition to this, system rings burglar alarm to avoid unwanted activities of intruders.
The system acknowledges entrance of intruders using two techniques. First technique is motion detection in which a security camera identifies the motion using motion detection algorithm with the help of correlation formula. The another technique to find the entrance of intruder using infrared sensors in which a photo diode is set on one side of place and a photo transistor is set in front of photo diode. When the entrance of intruder is detected by any of the technique specified above, the system takes necessary actions to protect the data and unwanted activities of intruder. As soon as the intruder is detected the burglar alarm gets activated. The live images captured by camera are sent to the user’s mobile. The important files on our system gets encrypted and sent to the user’s email-id and deleted from system.
- Quote paper
- Nitin Lahane (Author), 2007, Wireless Automated Video Surveillance System Using Motion Detection Method, Munich, GRIN Verlag, https://www.hausarbeiten.de/document/211267