Professional Documents
Culture Documents
Home Security Using Fingerprint Scanner and Keypad Lock With Sms Notification
Home Security Using Fingerprint Scanner and Keypad Lock With Sms Notification
Home Security Using Fingerprint Scanner and Keypad Lock With Sms Notification
In Partial fulfillment
of the requirements for the degree
Bachelor of Science in Information Technology
TABLE OF CONTENTS
Page
INTRODUCTION………………………………………………………………. 1
Definition of Terms……………………………………………………….. 5
METHODOLOGY……………………………………………………………… 12
Materials……….…………………………………………………………. 12
Methods….……………………………………………………………….. 12
TECHNICHAL DESIGN………………………………………………………. 14
Data Schema……………………………………………………………… 14
Context Diagram…………………………………………………………. 15
Flow Chart………………………………………………………………... 16
Gantt Chart……………………………………………………………….. 18
APPENDICES………………………………………………………………….. 19
REFERENCES…………………………………………………………………. 22
HOME SECURITY USING FINGERPRINT SCANNER AND KEYPAD LOCK
WITH SMS NOTIFICATION
INTRODUCTION
As theft is increasing day by day, security is becoming a major concern. Locks have
been a staple of homes, and the foundation of home security for centuries. They tend to be
taken for granted, and it seems that locks have faded gradually into the background of
security, even though they still hold a great amount of significance. Many people don’t
realize how much of an impact their locks have until they are either locked out, or they find
themselves unable to lock their residential doors, office doors, or car doors. Locks are
important because they provide the cornerstone for security. Technology has done a lot of
good for the world, and it even makes some of the most complicated tasks easier than ever
to complete. This same driving force that birthed a generation of smart locks that many
homeowners have fallen in love with. Smart locks promised to revolutionize the way
people looked at locks because they allowed you to accomplish much more than what a
regular lock could. They allowed you to control your home in ways homeowners never
2
had. The main reason why smart locks seem so appealing to many homeowners is because
However, even though there are so many homeowners that are enamored with these
smart locks, there are also a great deal of homeowners that believe that smart locks are not
secure enough to protect their families. It is hard to declare any of these locks the better
option without taking an in-depth look at them first. This is because there are many variants
of each of these locks, and one might suit your lifestyle or door better than the other. In
their simplest form, smart locks are automated versions of traditional locks. In most cases,
a smart lock will make use of the traditional lock mechanism, but the lock mechanism can
be engaged electronically or remotely. These locks are different because they require a
different interaction (between the user and the lock) than traditional locks. The name ‘smart
locks’ also stems from their ability to be controlled and operated by smartphones, as well
These locks allow homeowners to control and monitor their locks in a way that
traditional locks do not. If the smart locks are working the way it is intended to, it provides
unparalleled ease of access and comfort. However, this does not always mean it is the most
secure option. Smart lock manufacturers tend to focus more on the efficiency and added
features that the lock brings to the table, which makes them skimp on the security factors
This door lock system uses a technology which makes it difficult for intruders to
enter a house. Thus, people can stop worrying about illegal entries while they are away
from their homes. Any unauthorized persons trying to enter the home will have to know
the access number of the door lock first before they can open the door.
3
Locks are meant to ensure privacy and restrict unauthorized access to certain areas
and as theft is increasing day by day, security is becoming a major concern. So, the
researchers came out to the idea of “What additional security can you use in your home?”
Most of us is always far from home because of some various reasons, this is the
time the thieves are looking for to enter and steal from your property. The researchers
created the idea of “How would you know if someone tried to get into your property when
you left?”
Stranger could easily walk in off the street and make their way into your home by
using lock picking tools. Also, many people accidentally lose their Keys for some reason.
So, the researchers came out to the idea of “How to open the door without using a key?”
Generally, this study aims to develop Home Security using Fingerprint Scanner and
2. build a Prototype Device that notifies user thru Short Message System (SMS)
4. generate a System Report that shows the Activity Logs Report and History
Report.
The importance of the study that the researchers conducted in order to help other
people that are conscious about their health and also to the health of other people.
For Researchers. The study may enhance and explore the skills of the future
and can use their previous systems as a reference for a system that the professional is
developing.
This may also serve as a reference for the future researchers that want to study about
this research; any improvements related to the said topic may be also applicable for the
study.
The study will be held in Cavite State University – Imus Campus library at January
2019 because the researchers use the thesis of other students as a reference for the study
When the Fingerprint Scanner scanned the wrong fingerprint or the fingerprint is
not yet enrolled in the system, it will send an alert to the owner thru SMS.
On scanning the right fingerprint or on entering the right password, it will send a
The user can halt the system by sending ‘disable’ message to Arduino and it will
only go back to normal mode when you will send the ‘enable’ message to Arduino.
During halt, it won’t scan any fingerprint and it will only look for messages.
Definition of Terms
Fingerprint Scanner. type of electronic security system that uses fingerprints for
microcontroller kits for building digital devices and interactive objects that can sense and
fingerprint image enhancement, which not only improves the quality of the clarity of the
image but also improves the continuity of the ridge structure based on global texture and
local orientation. The global texture is exposed using multi resolution analysis and local
image is converted into normalized image. Normalized image is decomposed using wavelet
filtering. Next Local directional compensation is done and finally, wavelet reconstruction
algorithms for fingerprint image enhancement and obtained new version. The different sub
models of the new version are segmentation, normalization, ridge orientation estimation,
ridge frequency estimation, Gabor filtering, and Binarization and Thinning. In order to test
this new version, the author used windows vista home basic operating system and Matrix
Laboratory (Matlab) as Frontend engine. Synthetic fingerprint and real fingerprint were
used while testing in FVC2004 fingerprint database DB3. The new version performed well
in terms of efficiency and some other commonly used performance evaluation matrices.
Gabor filter. The ridge information on the fingerprint is used for determining the range of
7
filtering dynamically. Estimating the degree of curvature and the frequency of fingerprint
ridge in local areas are used for accomplishing elliptical Gabor filter. To correct errors in
the input image and to obtain more precise enhancement, elliptical Gabor filter is used. The
improved and which results in good and higher accuracy rate of the subsequent operations
Tian, Luo, & Zhang (2014) developed fingerprint image enhancement algorithm
based on orientation fields with three aspects as ridge information for minutiae matching
process in a simple and effective way, use of variable sized boundary boxes, and use of
simpler alignment method. The first aspect overcomes the problem of reference point per
selection with low computational cost. The second aspect makes the algorithm more robust
to nonlinear deformation between fingerprints. The third approach reduces the complexity
of alignment.
Virdi (2014) by Fingerprint recognition is one of the interesting and complex image
research from the research community. Even though the face recognition is automatic
pattern recognition system and controlled by the computer, the performance of the system
is directly dependent on the quality of the fingerprint images and the quality of the image
capturing device
one wants their investments to be ruined by someone who intends to rob or destroy the
property. The proponents came up with this research to strengthen the existing security
system and develop a new way of securing a particular area. This system will use image
8
processing to determine the identity of the one who entered and distinguish if that one is
(CCTV) will be used to monitor the area and provide a video record for security purposes.
A motion detector controlled by the Arduino Microcontroller will be the one to address the
Graphical User Interface (GUI) that is to be programmed by the proponents when to take
the snapshot on the video which is displayed on the GUI that will be used on image
processing to determine the identity of the captured object. An opto-isolator will be used
as the switch for the alarming system; it is connected on parallel port which is converted
from USB port to command when the switch will be on or off. If the system detects that
there is an intruder or crop-destroying animal, an alarm will trigger until it is turned off by
the respondents.
Rhowel Dellosa (2014) aimed to design, assemble and determine the performance
of the anti-theft device using motion detection and body temperature. The study utilized
developmental design to observe the functionality of the device. Study showed that the
anti-theft device can detect motion from a moving object for those with body temperature.
A signal from the sensor circuits will trigger the receiver circuit to produce an audible
sound that served as alarm. It was also found out that the output of the study is accurate in
terms of detecting moving objects with body temperature during day and night times. The
showed that the device had a good performance and acceptable in terms of functionality. It
is strongly recommended that further studies be conducted to enrich the anti-theft device
using motion detection and body temperature in a controlled environment like museum and
Crystalynne D. Cortez, et al. (2016) The paper presents the development of a cost-
effective microcontroller-based multi-home alarm system that can detect smoke and home
intrusion. Acquisition of local materials was taken into consideration. The developed
prototype can send notification text message whenever smoke or intrusion was detected.
Developmental research design was used to come up with a working prototype of the
design. To test the smoke alarm, the system was exposed to different burning materials
such as paper, wood, plastic, cloth and rubber; and to test the intrusion alarm, the system
was placed at different distances. Based from the findings of the study, all materials
acquired locally were able to function properly. The system was found to be consistent and
efficient with data transmission, processing and reception. Response time of less than 20
seconds for smoke alarm and less than 2 seconds for lock mechanism were recorded. The
system instantly sent notification messages to the user after fire and proximity sensors were
triggered.
Orven F. Mendoza (2017) The security of vehicles is extremely essential for vehicle
owners especially to those whose hard-earned income was used to avail of one or simply,
its loss would mean inconveniences to family and work. With these, it becomes the major
System with Tracking Capability using GSM and GPS Technologies, is a system that can
be used to increase vehicle security, as it can track location of missing vehicle, and help
authorities have credible evidence that the vehicle is stolen. The project uses the Global
System for Mobile (GSM) and the Global Positioning System (GPS) technology, which
includes the use of GPS receiver module, GSM module, and microcontroller as its primary
components. It also uses a vibration sensor that senses vehicle movement and a buzzer that
10
sends an alarm when sensors are triggered. A confirmation message is sent to the vehicle
owner of the vehicle by the device. The system also features capability of tracking the
location of the vehicle with the help of the GPS receiver which gives data to the location
of the vehicle by way of coordinates. These coordinates provide exact location of the motor
vehicle. The SMS message that the vehicle owner will send to the device attached to the
vehicle should follow correct format of limitation for successful use and the use of the four-
character password followed by the command. The command is for power switching or
activating automatically the key switch, engine and alarm. If not observed, the device
would not work. The project is deemed to provide vehicle owners the security of their
vehicle. The system will not only ensure vehicle security but also lessen the threats on
vehicles.
considered as one of the important components of student services. The study traced the
security personnel’s profile, as well as the perceptions of the respondents on the level of
security personnel and one hundred six other respondents composed of administrators,
heads of offices, employees, and students, were the respondents of the study. The
gathering data, statistically treated using frequency counts, percentages, ranking, mean,
and chi-square test. Majority of the security personnel respondents were young, married,
college graduates. Most had few years in service and have not attended trainings. Security
management level was rated very satisfactory. Civil status, and attendance to trainings
On the basis of the forgoing concepts, related literatures and studies presented and
insights taken from them, a conceptual model was developed as shown below.
Knowledge Requirements
• Programming Skills
• SMS Technology
EVALUATION
Figure 1. The Input-Process-Output of Home Security using Fingerprint Scanner and
Keypad Lock with SMS Notification
METHODOLOGY
This chapter represents how the study was conducted. It describes the materials,
Materials
Arduino Uno with GSM Module SIM900A, Breadboard, 16x2 LCD, Fingerprint
Scanner, 4x4 Keypad, Electronic Deadbolt, Switch, Red LED, Green LED, Diode, AA
Methods
The researchers used iterative model in developing their application. Unlike the
development stages, the iterative model is best thought of as a cyclical process. After
an initial planning phase, a small handful of stages are repeated over and over, with
each completion of the cycle incrementally improving and iterating on the software.
allowing the next iteration to be at least marginally better than the last.
13
Planning: As with most any development project, the first step is going through
an initial planning stage to map out the specification documents, establish
hardware requirements, and generally prepare for the upcoming stages of the
cycle.
Analysis and Design: Once planning is complete; an analysis is performed to nail
down the appropriate materials and hardware that will be required at this stage in
the project.
Implementation: With the planning and analysis out of the way, the actual
Testing: Once this current build iteration has been coded and implemented, the
next step is to go through a series of testing procedures to identify and locate any
Evaluation: Once all prior stages have been completed, it is time for a thorough
TECHNICAL DESIGN
History Module
Home Owner
Figure 6. Use Case diagram of Home Security using Fingerprint Scanner and
Keypad Lock with SMS Notification
18
APPENDICES
Materials
Most of us people are using
traditional pad locks. No other type of
home security
except traditional
Pad locks uses a certain Key pad locks
to open. If the Key and Pad
lock didn’t match, the lock
will not open.
Method
Appendix 1. Fishbone diagram of the first statement of the problem
20
Materials
Lack of devices that can record
Unawareness of
the act of theft attempt or theft attempt or
unauthorized entry. unauthorized
entry
Busy people who always
away from home.
People
Appendix 2. Fishbone diagram of the second statement of the problem
21
Materials
Lock-pickers usually use
Hair pins and specialized
tubular lock pick
Method People
Appendix 3. Fishbone diagram of the third statement of the problem
REFERECES
Hsieh, C. T., Lai, E., & Wang, Y. C. (2014). An effective algorithm for fingerprint image
enhancement based on wavelet transform. Pattern Recognition, 36(2), 303-312.
He, Y., Tian, J., Luo, X., & Zhang, T. (2014). Image enhancement and minutiae matching
in fingerprint verification. Pattern Recognition Letters, 24(9–10), 1349–1360.