Daily we have lots of valuable things, equipment, resources, etc. being stored and distributed across the world in the organizations and businesses. What is the main requirement of those resources? It must be safely sent to the destination or must be stored successfully without any damage and without any unauthorized use of it. Our lives may fall into situations ranging from inconvenience to life-threatening when they are affected by components damaged, Network outages, quality compromised by hackers and some other issues. There are more chances of exploitation now-a-days as the number of tools and threats are increasing.
Not only the virtual security, we also needed to have the physical security of the data, money and valuable things. But it is not an easy to task to provide security to the systems now a days as the hacking measures and tools have been increased vastly. What if there is any room with the valuable things in it secured by a password lock, and is hacked by the hacking tools. So we need to secure our things which require the complex system design. But this requires highly advanced infrastructure and it costs very high. But now, we have got a technology called Invisible Eye which is developed to design advanced security with less and affordable complexity of the system. In this era with high chances of threats to the security, it is necessary to develop an advanced security system.
To protect the valuable stuff in the room, this is the security system which is based on a single camera. Whenever there is an unauthorized access or intrusion into the room this system alerts us by the alarm as it slews around the room and records it. The time of the intrusion is only recorded and only that footage is viewed by the manager.
DESIGN METHODOLOGY OF THE INVISIBLE EYE
To protect a room or locker in the banks, museums, hospitals, there might be a requirement of many cameras. But to perform the security, an advanced security system called Invisible eye uses a single camera. This is very reasonable and can be easily accessed by the non-technical person in their jewellery shops, houses, to protect their valuable things at night times form the intruders.
There are many disadvantages of the other technologies such as multiple cameras needed, more cost consumption and more power consumption, and the owner has to view the footage of the video to observe the theft. But humans tend to make errors, if he ignores or have missed the video footage of the theft happening then his things are in danger as it don’t alert the owner by any alarm.
The advantage of this technology is that this model is designed using various sensors such as motion, vibration sensors. If the human is placed at the particular area where the sensor is placed, then it detects the motions of the humans. The information it sensed is sent to the Microcontroller. Then it is recorded. All of these are done with the help of a PC, wireless camera, and a stepper motor.