Feasibility Study
Feasibility Study
Feasibility Study
In today's world be it offices, laboratories, school or home the first thing which concerns is the
security of premises. In order to make your data, money, premises and personal belonging safe
and secured from unauthorized person, our work presents a biometric system based finger print
recognition using embedded system which will provide a complete security solution and will
restrict the access to unauthorized people. In comparison to the other methods of authentication
i.e. through RFID, passwords security etc, this method has proven to be most efficient and
reliable. Pin verification, password protection, one-time password (opt), barcode ID card and
other identification system used can be copied or stolen by the imposters. The main reason for
its reliability is that a finger print cannot have a positive match with someone else who is an
unauthorized user. Each and every individual has a unique finger print and making it impossible
to hack. Many other biometrics technology such as retina, iris, voice recognition is also being a
key subject of research and implementation nowadays but among these available biometric
technology fingerprints is considered as having one of the least mismatch ratios.
The system stores the finger print of authorized people and only giving access to them.
Fingerprint recognition is done by a sensor which can be connected with Arduino to validate for
authentication. If the user's fingerprint has a positive match the door will open otherwise the
buzzer connected will be initiated after three wrong attempts to alert the people or the security
official in the surroundings.
OBJECTIVES:
2. To compare the fingerprint image with the stored image in the database.
3. On the basis of the comparison, if the fingerprint matches with the fingerprint stored in the
database then only the lock will open otherwise it will remain closed.
FEASIBILITY STUDY:
2. Fingerprint is unique for every person it cannot be imitated or fabricated. It is not same in the
case of twins also.
3. High accuracy in terms of security.
4. No manual errors.
5. No false intrusions
LITERATURE SURVEY:
Related Works:
Various attempts and research were made to overcome the security issue and still it undergoes.
1. Lock and Key System: First step towards security was Lock and key system. Security
protocol followed in this system was “Single key for a single lock”. Initially, this system
was considered to provide utmost security but soon it proved to me wrong by the fact that
multiple keys of a single lock can easily made. Hence this system is an outdated system
to provide security.
2. Password Authentication: In the second level of security password was used as an
authenticating tool. In this type of system, a multiple set of numbers or alphabets is stored
in the database for the purpose of authentication. Only the authorized user gets to know
the stored combination in the database so entering the correct combination results a
positive match for the user. This system also has a disadvantage that password can be
hacked or acquired by unauthorized user by continuously trying all the possible
combinations.
3. RFID Authentication: Later a new technology for providing security was developed
"The authentication by RFID card". This system enriched the level of security. Access is
granted only for the user whose RFID code has a positive match for authorized code. This
system also has disadvantage of duplication of RFID card or by RFID skimming and
anyone who possess this card could unlock the door.
4. Voice recognition: Voice recognition or speaker recognition is the problem of
identifying a speaker from a short utterance. This biometric technology uses the acoustic
features of speech that have been found to differ between individuals. These acoustic
patterns reflect both anatomy (e.g., size and shape of the throat and mouth) and learned
behavioural patterns (e.g., voice pitch, speaking style). A disadvantage of voice-based
recognition is that speech features are sensitive to a number of factors such as background
noise.
PROPOSED LOCK SYSTEM:
Humans have used fingerprints for personal identification for many centuries and the matching
accuracy using fingerprints has been shown to be very high. A fingerprint is the pattern of ridges
and valleys on the surface of a fingertip, the formation of which is determined during the first
seven months of fetal development. Fingerprints of identical twins are different and so are the
prints on each finger of the same person. The marginal cost of embedding a fingerprint-based
biometric in a system (e.g., laptop computer) has become affordable in a large number of
applications. This is a perfect solution for protecting one from the hassle of stolen/lost key or an
unauthorized entry.
Our proposed finger print based lock system is a reliable and very secure lock which also
contains an alarm system that will not only ensure safer environment but also ease lifestyle. This
system can prove very useful in housing buildings, large offices, universities and so on. Because
it offers the flexibility to add more features to the system. Users do not need to implement many
systems from scratch. They can simply use our fingerprint lock system because fingerprint
scanning is more accurate and cost effective method. It is also secure because fingerprint
duplication is virtually impossible.
METHODOLOGY:
Fingerprint Identification:
Fingerprints are one of many forms of biometrics, used to identify individuals and verify their
identity. The analysis of fingerprints for matching purposes generally requires the comparison of
several features of the print pattern. These include patterns, which are aggregate characteristics
of ridges, and minutia points, which are unique features found within the patterns. It is also
necessary to know the structure and properties of human skin in order to successfully employ
some of the imaging technologies. Minutiae and patterns are very important in the analysis of
fingerprints since no two fingers have been shown to be identical.
The three basic patterns of fingerprint ridges are the arch, loop, and whorl.
• Arch: The ridges enter from one side of the finger, rise in the centre forming an arc, and then
exit the other side of the finger.
• Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side.
• Whorl: Ridges form circularly around a central point on the finger. In the whorl pattern, ridges
form circularly around a finger.
In verification, the system compares an input fingerprint to the enrolled fingerprint of a specific
user to determine if they are from the same finger (1:1 match).
When it came to designing the lock, we wanted to achieve simplicity in terms of the entire lock
itself as well as in the internal components.
Flowchart:
Flowchart-1
STEPS INVOLVED:
When a finger is placed on the sensor, it will read the print and match it with the
fingerprints saved inside it. If a match is found, it will trigger the electronic lock to unlock
the doorway. If no match is found, the device will not do anything for the first two wrong
attempts.
After three wrong attempts, if the person still tries to use the fingerprint scanner, the
circuit will trigger an alarm system.
HARDWARE DESCRIPTION:
The hardware part mainly consists of a digital computer, an Arduino Uno board, R305, 16x2
LCD displays, RS232 and a Buzzer which is being discussed along with their specific functions:
Figure 1
2. Finger Print Scanner Module (R305): R305 is a finger print sensor module with TTL
UART interface for direct connections to microcontroller UART or to PC through
MAX232 / USB-Serial adapter. The user has compatibility to store the finger print data
in the module and can configure it in 1:1 or 1: N mode for identifying the person.
Figure 2
3. Liquid Crystal Display (LCD): Liquid Crystal Display screen is an electronic display
module and find a wide range of applications. A 16x2 LCD display is very basic module
and is very commonly used in various devices and circuits. LCD stands for liquid crystal
display.
Figure 3
4. Electronic Door Lock Assembly Solenoid: Electronic door lock works as the circuit
disconnects, and it will unlock as the instant power-on. It is steady, durable and energy-
saving and had a long lifespan. In the anti-theft and shockproof design, the lock is better
than other kinds of locks. After connecting the wires and when the current is available,
the electric lock can control the door’s opening and closing.
Figure 4
SOFTWARE USED:
The open-source Arduino Software (IDE) makes it easy to write code and upload it to the board.
It runs on Windows, Mac OS X, and Linux. The environment is written in Java and based on
Processing and other open-source software. This software can be used with any Arduino board.
REFERENCES:
1. A. Aditya Shankar, P.R.K. Sastry, A.L. Vishnu ram, A. Vamsidhar, "Finger Print Based
Door Locking System", International Journal of Engineering and Computer Science
(IJECS), vol. 4, no. 03, December 2015.
2. Manish Aggarwal, "Secure Electronic Lock Based on Bluetooth Based OTP System" in
Elins International Journal of Science Engineering and Management, Department of
Electronics and Communication Engineering, vol. 2, no. 1, January 2017.
3. Akanksha singh, arijit pal, bijay rai, "GSM Based Home Automation Safety and Security
Using Android Mobile Phone", International Journal of Engineering Research &
Technology (IJERT), vol. 4, no. 5, May 2015.
4. H.M Benazir., Nisha S. Kalpathri, Chandralekha Sunagar, "Fingerprint Authenticati---on
Smart Locking System Using OTP", International Journal of Advance Research in
Engineering Science & Technology, vol. 4, no. 6, June 2017.
5. N Sri Prakash, N Venkatram, "Establishing efficient Security scheme in home IOT device
through biometric finger print technique", Indian Journal of Science and Technology,
May 2016.
6. Jason Johnson, Christopher Dow, "Intelligent door lock system with encryption", US
patent Application Publication Johnson et al, pp. 1-92, June 2016.
7. Figure 1 (www.edgefx.in).
8. Figure 2 (www.rhydolabz.com).
9. Figure 3 (www.electronicsforu.com).
10. Figure 4 (www.robu.in)