Home Security Using Fingerprint Scanner and Keypad Lock With Sms Notification

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 24

HOME SECURITY USING FINGERPRINT SCANNER AND KEYPAD LOCK

WITH SMS NOTIFICATION

Undergraduate Thesis Proposal


Submitted to the Faculty of the
Department of Information Technology
Cavite State University
City of Imus, Cavite

In Partial fulfillment
of the requirements for the degree
Bachelor of Science in Information Technology

Villanueva, Joshua Albert F.


Singson, Rowell C.
ii

TABLE OF CONTENTS

Page

INTRODUCTION………………………………………………………………. 1

Statement of the Problem…………………………………….................... 3

Objectives of the Study…………………………………………………… 3

Significance of the Study………………………………………….………. 4

Time and Place of the Study……………………………………………… 4

Scope and Limitation of the Study…….…………………......................... 5

Definition of Terms……………………………………………………….. 5

REVIEW OF RELATED LITERATURE…………………………………….. 6

CONCEPTUAL MODEL OF STUDY………………………………………… 11

METHODOLOGY……………………………………………………………… 12

Materials……….…………………………………………………………. 12

Methods….……………………………………………………………….. 12

TECHNICHAL DESIGN………………………………………………………. 14

Data Schema……………………………………………………………… 14

Context Diagram…………………………………………………………. 15

Flow Chart………………………………………………………………... 16

Use Case Diagram………………………………………………………... 17

Gantt Chart……………………………………………………………….. 18

APPENDICES………………………………………………………………….. 19

Fish Bone Diagram……………………………………………………… 19

REFERENCES…………………………………………………………………. 22
HOME SECURITY USING FINGERPRINT SCANNER AND KEYPAD LOCK
WITH SMS NOTIFICATION

Villanueva, Joshua Albert F.


Singson, Rowell C.

An undergraduate thesis manuscript to be submitted to the faculty of Information


Technology Department, Cavite State University Imus Campus in Partial fulfillment of the
requirements for the degree of Bachelor of Science in Information Technology.
Contributing No._________ prepared under the supervision.

INTRODUCTION

As theft is increasing day by day, security is becoming a major concern. Locks have

been a staple of homes, and the foundation of home security for centuries. They tend to be

taken for granted, and it seems that locks have faded gradually into the background of

security, even though they still hold a great amount of significance. Many people don’t

realize how much of an impact their locks have until they are either locked out, or they find

themselves unable to lock their residential doors, office doors, or car doors. Locks are

important because they provide the cornerstone for security. Technology has done a lot of

good for the world, and it even makes some of the most complicated tasks easier than ever

to complete. This same driving force that birthed a generation of smart locks that many

homeowners have fallen in love with. Smart locks promised to revolutionize the way

people looked at locks because they allowed you to accomplish much more than what a

regular lock could. They allowed you to control your home in ways homeowners never
2

had. The main reason why smart locks seem so appealing to many homeowners is because

it allows them to complete more actions with less work.

However, even though there are so many homeowners that are enamored with these

smart locks, there are also a great deal of homeowners that believe that smart locks are not

secure enough to protect their families. It is hard to declare any of these locks the better

option without taking an in-depth look at them first. This is because there are many variants

of each of these locks, and one might suit your lifestyle or door better than the other. In

their simplest form, smart locks are automated versions of traditional locks. In most cases,

a smart lock will make use of the traditional lock mechanism, but the lock mechanism can

be engaged electronically or remotely. These locks are different because they require a

different interaction (between the user and the lock) than traditional locks. The name ‘smart

locks’ also stems from their ability to be controlled and operated by smartphones, as well

as their ability to integrate with other smart devices.

These locks allow homeowners to control and monitor their locks in a way that

traditional locks do not. If the smart locks are working the way it is intended to, it provides

unparalleled ease of access and comfort. However, this does not always mean it is the most

secure option. Smart lock manufacturers tend to focus more on the efficiency and added

features that the lock brings to the table, which makes them skimp on the security factors

that have made locks a hallmark for every home.

This door lock system uses a technology which makes it difficult for intruders to

enter a house. Thus, people can stop worrying about illegal entries while they are away

from their homes. Any unauthorized persons trying to enter the home will have to know

the access number of the door lock first before they can open the door.
3

Statement of the Problem

Locks are meant to ensure privacy and restrict unauthorized access to certain areas

and as theft is increasing day by day, security is becoming a major concern. So, the

researchers came out to the idea of “What additional security can you use in your home?”

Most of us is always far from home because of some various reasons, this is the

time the thieves are looking for to enter and steal from your property. The researchers

created the idea of “How would you know if someone tried to get into your property when

you left?”

Stranger could easily walk in off the street and make their way into your home by

using lock picking tools. Also, many people accidentally lose their Keys for some reason.

So, the researchers came out to the idea of “How to open the door without using a key?”

Objectives of the Study

Generally, this study aims to develop Home Security using Fingerprint Scanner and

Keypad Lock with Short Message System (SMS) Notification.

Specifically; it aims to:

1. develop an additional security to a home using Microcontroller;

2. build a Prototype Device that notifies user thru Short Message System (SMS)

every time the device is used;


4

3. create an Account Module for Fingerprint Scanning; and

4. generate a System Report that shows the Activity Logs Report and History

Report.

Significance of the Study

The importance of the study that the researchers conducted in order to help other

people that are conscious about their health and also to the health of other people.

For Researchers. The study may enhance and explore the skills of the future

researchers within the field of interest.

For IT Professionals. to help them gain knowledge in developing a certain system

and can use their previous systems as a reference for a system that the professional is

developing.

This may also serve as a reference for the future researchers that want to study about

this research; any improvements related to the said topic may be also applicable for the

study.

Time and Place of the Study

The study will be held in Cavite State University – Imus Campus library at January

2019 because the researchers use the thesis of other students as a reference for the study

and use the internet as other resources.


5

Scope and Limitation of the Study

When the Fingerprint Scanner scanned the wrong fingerprint or the fingerprint is

not yet enrolled in the system, it will send an alert to the owner thru SMS.

On scanning the right fingerprint or on entering the right password, it will send a

confirmation message that the door has opened.

The user can halt the system by sending ‘disable’ message to Arduino and it will

only go back to normal mode when you will send the ‘enable’ message to Arduino.

During halt, it won’t scan any fingerprint and it will only look for messages.

Definition of Terms

Fingerprint Scanner. type of electronic security system that uses fingerprints for

biometric authentication to grant a user access to information or to approve transactions.

Arduino. is an open-source hardware and software company, project and user

community that designs and manufactures single-board microcontrollers and

microcontroller kits for building digital devices and interactive objects that can sense and

control both physically and digitally.


REVIEW RELATED LITERATURE

Hsieh, C. T. et al. (2014) proposed an effective and efficient algorithm for

fingerprint image enhancement, which not only improves the quality of the clarity of the

image but also improves the continuity of the ridge structure based on global texture and

local orientation. The global texture is exposed using multi resolution analysis and local

orientation through wavelet transforms. In wavelet-based fingerprint analysis first input

image is converted into normalized image. Normalized image is decomposed using wavelet

decomposition. Wavelet decomposition image is processed again using global texture

filtering. Next Local directional compensation is done and finally, wavelet reconstruction

process is achieved. Normalization, Wavelet decomposition, Global texture filtering, Local

directional compensation, wavelet reconstruction are the flowchart components of

proposed enhancement algorithm.

Babatund (2015) modified some of the existing sub-models mathematical

algorithms for fingerprint image enhancement and obtained new version. The different sub

models of the new version are segmentation, normalization, ridge orientation estimation,

ridge frequency estimation, Gabor filtering, and Binarization and Thinning. In order to test

this new version, the author used windows vista home basic operating system and Matrix

Laboratory (Matlab) as Frontend engine. Synthetic fingerprint and real fingerprint were

used while testing in FVC2004 fingerprint database DB3. The new version performed well

in terms of efficiency and some other commonly used performance evaluation matrices.

Yuanyuan (2014) proposed new image enhancement algorithm based on elliptical

Gabor filter. The ridge information on the fingerprint is used for determining the range of
7

filtering dynamically. Estimating the degree of curvature and the frequency of fingerprint

ridge in local areas are used for accomplishing elliptical Gabor filter. To correct errors in

the input image and to obtain more precise enhancement, elliptical Gabor filter is used. The

experimental results show that the precision of minutiae extraction is significantly

improved and which results in good and higher accuracy rate of the subsequent operations

are also improved.

Tian, Luo, & Zhang (2014) developed fingerprint image enhancement algorithm

based on orientation fields with three aspects as ridge information for minutiae matching

process in a simple and effective way, use of variable sized boundary boxes, and use of

simpler alignment method. The first aspect overcomes the problem of reference point per

selection with low computational cost. The second aspect makes the algorithm more robust

to nonlinear deformation between fingerprints. The third approach reduces the complexity

of alignment.

Virdi (2014) by Fingerprint recognition is one of the interesting and complex image

processing problems, which requires a constant and continuous contribution to new

research from the research community. Even though the face recognition is automatic

pattern recognition system and controlled by the computer, the performance of the system

is directly dependent on the quality of the fingerprint images and the quality of the image

capturing device

Ronnel Kylon A. Mendoza (2016) Area security is very important nowadays, no

one wants their investments to be ruined by someone who intends to rob or destroy the

property. The proponents came up with this research to strengthen the existing security

system and develop a new way of securing a particular area. This system will use image
8

processing to determine the identity of the one who entered and distinguish if that one is

authorized personnel, an intruder, or a crop-destroying animal. A Closed-circuit television

(CCTV) will be used to monitor the area and provide a video record for security purposes.

A motion detector controlled by the Arduino Microcontroller will be the one to address the

Graphical User Interface (GUI) that is to be programmed by the proponents when to take

the snapshot on the video which is displayed on the GUI that will be used on image

processing to determine the identity of the captured object. An opto-isolator will be used

as the switch for the alarming system; it is connected on parallel port which is converted

from USB port to command when the switch will be on or off. If the system detects that

there is an intruder or crop-destroying animal, an alarm will trigger until it is turned off by

the respondents.

Rhowel Dellosa (2014) aimed to design, assemble and determine the performance

of the anti-theft device using motion detection and body temperature. The study utilized

developmental design to observe the functionality of the device. Study showed that the

anti-theft device can detect motion from a moving object for those with body temperature.

A signal from the sensor circuits will trigger the receiver circuit to produce an audible

sound that served as alarm. It was also found out that the output of the study is accurate in

terms of detecting moving objects with body temperature during day and night times. The

researchers formulated an evaluation instrument to determine its performance. Results

showed that the device had a good performance and acceptable in terms of functionality. It

is strongly recommended that further studies be conducted to enrich the anti-theft device

using motion detection and body temperature in a controlled environment like museum and

banks to determine the effectiveness of the integration of the anti-theft device.


9

Crystalynne D. Cortez, et al. (2016) The paper presents the development of a cost-

effective microcontroller-based multi-home alarm system that can detect smoke and home

intrusion. Acquisition of local materials was taken into consideration. The developed

prototype can send notification text message whenever smoke or intrusion was detected.

Developmental research design was used to come up with a working prototype of the

design. To test the smoke alarm, the system was exposed to different burning materials

such as paper, wood, plastic, cloth and rubber; and to test the intrusion alarm, the system

was placed at different distances. Based from the findings of the study, all materials

acquired locally were able to function properly. The system was found to be consistent and

efficient with data transmission, processing and reception. Response time of less than 20

seconds for smoke alarm and less than 2 seconds for lock mechanism were recorded. The

system instantly sent notification messages to the user after fire and proximity sensors were

triggered.

Orven F. Mendoza (2017) The security of vehicles is extremely essential for vehicle

owners especially to those whose hard-earned income was used to avail of one or simply,

its loss would mean inconveniences to family and work. With these, it becomes the major

problem of every vehicle owner. This thesis, Microcontroller-based Vehicle Security

System with Tracking Capability using GSM and GPS Technologies, is a system that can

be used to increase vehicle security, as it can track location of missing vehicle, and help

authorities have credible evidence that the vehicle is stolen. The project uses the Global

System for Mobile (GSM) and the Global Positioning System (GPS) technology, which

includes the use of GPS receiver module, GSM module, and microcontroller as its primary

components. It also uses a vibration sensor that senses vehicle movement and a buzzer that
10

sends an alarm when sensors are triggered. A confirmation message is sent to the vehicle

owner of the vehicle by the device. The system also features capability of tracking the

location of the vehicle with the help of the GPS receiver which gives data to the location

of the vehicle by way of coordinates. These coordinates provide exact location of the motor

vehicle. The SMS message that the vehicle owner will send to the device attached to the

vehicle should follow correct format of limitation for successful use and the use of the four-

character password followed by the command. The command is for power switching or

activating automatically the key switch, engine and alarm. If not observed, the device

would not work. The project is deemed to provide vehicle owners the security of their

vehicle. The system will not only ensure vehicle security but also lessen the threats on

vehicles.

Joy E. Presado (2016) Security is one of the prime concerns of institutions as it is

considered as one of the important components of student services. The study traced the

security personnel’s profile, as well as the perceptions of the respondents on the level of

security management, and the problems encountered by the respondents. Thirty-seven

security personnel and one hundred six other respondents composed of administrators,

heads of offices, employees, and students, were the respondents of the study. The

descriptive-correlational research method was used using a survey questionnaire in

gathering data, statistically treated using frequency counts, percentages, ranking, mean,

and chi-square test. Majority of the security personnel respondents were young, married,

college graduates. Most had few years in service and have not attended trainings. Security

management level was rated very satisfactory. Civil status, and attendance to trainings

significantly related to security management level.


11

Conceptual Framework of study

On the basis of the forgoing concepts, related literatures and studies presented and

insights taken from them, a conceptual model was developed as shown below.

INPUT PROCESS OUTPUT

Knowledge Requirements
• Programming Skills

• SMS Technology

• Electronic Lock PROCESS


Concepts System Analysis

Software Requirements  Requirement


• Arduino IDE Analysis
Hardware Requirements  Requirements
• Fingerprint Sensor Home Security using
Definition
Fingerprint Scanner
• Arduino System Design and Keypad Lock
• 4 x 4 Matrix Keypad  Wireframe with SMS
Notification
• GSM Module
System Testing
• Electric Door Strike
 Alpha Testing
• 16x2 character LCD
 Beta Testing

EVALUATION
Figure 1. The Input-Process-Output of Home Security using Fingerprint Scanner and
Keypad Lock with SMS Notification
METHODOLOGY

This chapter represents how the study was conducted. It describes the materials,

methods and the process of project development.

Materials

Personal Computer composed of Windows 10 with 4gb of RAM and 1TB of

storage for programming.

Arduino Uno with GSM Module SIM900A, Breadboard, 16x2 LCD, Fingerprint

Scanner, 4x4 Keypad, Electronic Deadbolt, Switch, Red LED, Green LED, Diode, AA

batteries x6 and 6xAA battery holder.

Methods

The researchers used iterative model in developing their application. Unlike the

more traditional waterfall model, which focuses on a stringent step-by-step process of

development stages, the iterative model is best thought of as a cyclical process. After

an initial planning phase, a small handful of stages are repeated over and over, with

each completion of the cycle incrementally improving and iterating on the software.

Enhancements can quickly be recognized and implemented throughout each iteration,

allowing the next iteration to be at least marginally better than the last.
13

Figure 2. Iterative model

 Planning: As with most any development project, the first step is going through
an initial planning stage to map out the specification documents, establish
hardware requirements, and generally prepare for the upcoming stages of the
cycle.
 Analysis and Design: Once planning is complete; an analysis is performed to nail

down the appropriate materials and hardware that will be required at this stage in

the project.

 Implementation: With the planning and analysis out of the way, the actual

implementation and coding process can now begin.

 Testing: Once this current build iteration has been coded and implemented, the

next step is to go through a series of testing procedures to identify and locate any

potential bugs or issues.

 Evaluation: Once all prior stages have been completed, it is time for a thorough

evaluation of development up to this stage.


14

TECHNICAL DESIGN

Accounts Module Activity Reports Module

- Fingerprint Data - Time & Date: date


- Date Enrolled: date
- Name: varchar (255)

History Module

- Time & Date: date

Figure 3. Data Schema of Home Security using Fingerprint Scanner and


Keypad Lock with SMS Notification
15

Home Owner

Request View History Messages regarding in Registering their


History and and Log the current activity of Fingerprint & set a
Log Reports. Reports. the device. 4-digit pin code.

Home Security using


Fingerprint Scanner and
Keypad Lock with SMS
Notification

Figure 4. Context Diagram of Home Security using Fingerprint Scanner and


Keypad Lock with SMS Notification
16

Figure 5. Flow Chart of Home Security using Fingerprint Scanner and

Keypad Lock with SMS Notification


17

Figure 6. Use Case diagram of Home Security using Fingerprint Scanner and
Keypad Lock with SMS Notification
18

Figure 7. Gantt Chart


19

APPENDICES

Materials
Most of us people are using
traditional pad locks. No other type of
home security
except traditional
Pad locks uses a certain Key pad locks
to open. If the Key and Pad
lock didn’t match, the lock
will not open.

Method
Appendix 1. Fishbone diagram of the first statement of the problem
20

Materials
Lack of devices that can record
Unawareness of
the act of theft attempt or theft attempt or
unauthorized entry. unauthorized
entry
Busy people who always
away from home.

People
Appendix 2. Fishbone diagram of the second statement of the problem
21

Materials
Lock-pickers usually use
Hair pins and specialized
tubular lock pick

Lose keys and


unsafe lock from
The tool is pushed into the
Lock-Pickers
lock, each of the pins is Accidentally
slowly forced down until lose keys
they stop.

Method People
Appendix 3. Fishbone diagram of the third statement of the problem
REFERECES

Hsieh, C. T., Lai, E., & Wang, Y. C. (2014). An effective algorithm for fingerprint image
enhancement based on wavelet transform. Pattern Recognition, 36(2), 303-312.

Virdi, M. K. (2014). Fingerprint Matching System for Spurious Minutiae. Journal of


Basic and Applied Engineering Research, 1(11), 50-53.

Babatunde, I. G. (2015). Fingerprint Image Enhancement : Segmentation to


Thinning.(IJACSA) International Journal of Advanced Computer Science and
Applications, 3(1), 15–24.

He, Y., Tian, J., Luo, X., & Zhang, T. (2014). Image enhancement and minutiae matching
in fingerprint verification. Pattern Recognition Letters, 24(9–10), 1349–1360.

Yuanyuan, Z. (2014). Fingerprint image enhancement based on elliptical shape Gabor


filter. 6th IEEE International Conference Intelligent Systems, 344–348.

R. K. Mendoza, B. J. Malijan, R. Caldo (2016). Development of Smart Farm Security


System with Alarm Mechanism using Image Processing, LPU-Laguna Journal of
Engineering and Computer Studies, Vol. 3 No.3.

R. Dellosa (2014). Development of an Anti-Theft Device using Motion Detection and


Body Temperature, Asia Pacific Journal of Multidisciplinary Research. Volume 2,
No. 6.

C. D. Cortez, J. Santos, K. Alberto, P. Kua, K. Pontiveros (2016). Development of Multi-


Home Alarm System Based on GSM Technology, International Journal of
Electronics and Electrical Engineering, Vol. 4, No. 4.

O. F. Mendoza (2017). Microcontroller-based Vehicle Security System with Tracking


Capability using GSM and GPS Technologies. Asia Pacific Journal of
Multidisciplinary Research, Vol. 5, No. 2.

You might also like