Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 40

A Project Work- I Report on

SECURE FINGERPRINT BANK LOCKER WITH IMAGE


CAPTURE
Submitted in partial fulfillment of the requirements for the award of the degree of
BACHELOR OF ENGINEERING
in
ELECTRONICS AND COMMUNICATION ENGINEERING
by

SANDHYA GONDI (160619735013)

SRIPURNA JANNAMARAJU (160619735020)

SHRUTHI SATHELLI (160619735037)


Under the esteemed guidance of
Mrs. R.Ramya Shree
Assistant Professor
SCETW

Department of Electronics and Communication Engineering


STANLEY COLLEGE OF ENGINEERING AND TECHNOLOGY
FOR WOMEN(AUTONOMOUS)
All UG courses Accredited by NBA and NAAC A Grade
(Affiliated to OU & Approved by AICTE)
Chapel road, Hyderabad – 500001
2022-2023
Stanley College of Engineering and Technology for Women
(Autonomous)
All UG courses Accredited by NBA and NAAC A Grade (Affiliated to OU &
Approved by AICTE)
Chapel Road, Hyderabad – 500001
_____________________________________________________________________
______

Ref No: SCETW/ECE Dept/PW 761 EC/2023/Batch no: A-11 Date:

CERTIFICATE
This is to certify that the project titled “SECURE FINGERPRINT
BANK LOCKER WITH IMAGE CAPTURE” is a bonafide work
carried over by Ms.G.Sandhya (160619735013), Ms.J.Sripurna
(160619735020) and Ms. S.Shruthi(160619735037)in partial fulfillment
of the requirements for the award of the Degree Bachelor of Engineering
in Electronics and Communication Engineering from Osmania
University, Hyderabad during the VII semester of their B.E course during
the Academic Year 2022-2023.

Project Guide Dr.


K.N.SAHU
Mrs. R. Ramya Shree Head of the Department
of ECE
Assistant Professor
Department of ECE

ACKNOWLEDGEMENT

This is an acknowledgement of the intensive drive and competence


of everyone who has contributed to the success of our project.
We are extremely grateful to our respected principal Dr. Satya
Prasad Lanka, for fostering an excellent academic climate in our
institution
and we also express our sincere gratitude to our respected head of the
department Dr. K. N. Sahu, for his encouragement, able guidance and
effort in
bringing out this project.
We are deeply indebted to our internal guide Mrs. R. Ramya
Shree, Assistant Professor, for his/her guidance, encouragement, co-
operation
and kindness during the entire duration of the course and academics.

G.Sandhya (160619735013)
J.Sripurna (160619735020)
S.Shruthi (160619735037)
Stanley College of Engineering and Technology for Women
(Autonomous)
Chapel Road, Abids, HYDERABAD – 500001
Department of Electronics and Communication Engineering
Vision of the Institute
Empowering girl students through professional education integrated with values and
character to make an impact in the World.
Mission of the Institute
M1: Providing quality engineering education for girl students to make them
competent and
confident to succeed in professional practice and advanced learning.
M2: Establish state-of-art-facilities and resources to facilitate world class education.
M3: Integrating qualities like humanity, social values, ethics, leadership in order to
encourage
contribution to society.
Vision of the Department
Empowering girl students with the contemporary knowledge in Electronics and
Communication Engineering for their success in life.
Mission of the Department
M1: To impart rationalized and high-quality technical education and knowledge.
M2: To achieve self-sustainability and overall development through Research and
Consultancy activities.
M3: To provide education for life by focusing on the inculcation of human and moral
values
through an honest and scientific approach
M4: To groom students with good attitude and personality skills.
Program Educational Objectives:
PEO-1: Graduate shall have skills to excel in professional career and in applied
research
through innovative design by acquiring the knowledge in Electronics and
Communication
Engineering principles
PEO-2: Graduate shall pursue higher education and participate in research and
development
activities or entrepreneurship to integrate engineering work in the environmental,
ethical and
broader societal contexts.
PEO-3: Graduate shall exhibit effective communication, good team building and
leadership
qualities to design socially accepted and economically feasible solutions through
multidisciplinary and interdisciplinary approaches for analysis of real-life problems
Stanley College of Engineering and Technology for Women
(Autonomous)
Chapel Road, Abids, HYDERABAD – 500 001
Department of Electronics and Communication Engineering
Program Outcomes:
1. Engineering knowledge: Apply the knowledge of mathematics, science,
engineering
fundamentals, and an engineering specialization to the solution of complex
engineering
problems.
2. Problem Analysis: Identify, formulate, review research literature, and analyse
complex
engineering problems reaching substantiated conclusions using first principles of
mathematics, natural sciences, and engineering sciences.
3. Design/development of solutions: Design solutions for complex engineering
problems
and design system components or processes that meet the specified needs with
appropriate
consideration for the public health and safety, and the cultural, societal, and
environmental
considerations.
4. Conduct investigations of complex problems: Use research-based knowledge and
research methods including design of experiments, analysis and interpretation of data,
and
synthesis of the information to provide valid conclusions.
5. Modern Tool Usage: Create, select, and apply appropriate techniques, resources,
and
modern engineering and IT tools including prediction and modelling to complex
engineering
activities with an understanding of the limitations.
6. The engineer and society: Apply reasoning informed by the contextual knowledge
to
assess societal, health, safety, legal and cultural issues and the consequent
responsibilities
relevant to the professional engineering practice.
7. Environment & sustainability: Understand the impact of professional engineering
solutions in societal and environmental contexts, and demonstrate the knowledge of,
and need
for sustainable development.
8. Ethics: Apply ethical principles and commit to professional ethics and
responsibilities and
norms of the engineering practice.
9. Individual and Team work: Function effectively as an individual, and as a
member or
leader in diverse teams, and in multidisciplinary settings.
10.Communication: Communicate effectively on complex engineering activities with
the
engineering community and with society at large, such as, being able to comprehend
and
write effective reports and design documentation, make effective presentations, and
give and
receive clear instructions.
11. Project Management and Finance: Demonstrate knowledge and understanding
of the
engineering and management principles and apply these to one’s own work, as a
member and
leader in a team, to manage projects and in multidisciplinary environments.
12. Life-long Learning: Recognize the need for, and have the preparation and ability
to
engage in independent and life-long learning in the broadest context of technological
change.
Program Specific Outcomes:
PSO1: Appertain to Communication and Automation Principles: To apply principles
of
Communication Engineering and Signal Processing both in private and public
organizations.
PSO2: Adaptability to Productive Environment: To be well equipped with
Management
skills, interdisciplinary and modern technologies
ABSTRACT

As today fingerprint based system provides high accuracy in terms


of security. Also there is a high demand for integration of fingerprint
matching techniques for making secure authentication systems. This
research paper introduces this bank locker system which integrates
fingerprint reader in it so as to provide a good level of security. The main
goal of fingerprint bank locker with image capture project is to provide
security with no manual security flaws. It is easy to use and requires no
special training or equipment. This system needs fingerprint
authentication while operating the bank locker as well as captures the
images of person who is handling the locker and send it to the authorized
person. The functionality of system is that it will scan the fingerprint and
if it matches with registered fingerprint the locker opens and also captures
the image of user.
The system uses an ESP32 microcontroller for this purpose. The
microcontroller processes data sent by the access. Controller operates the
motors to open the locker door on encountering registered valid users. If
the fingerprint does not match with register fingerprint of user, it will
show the error message as unauthorized user and immediately send the
picture to the authorized. So, the system is very beneficial for stopping
the robbery by providing security.
TABLE OF CONTENTS
LIST OF FIGURES
CHAPTER 1
1.INTRODUCTION
Theft is one of the major problem in today’s world places like in offices and other
public places should not be secured so that issues to make secure our documents and
precious things so we have decided to make this type of security system that will be
more usable to all the people . This system assures the perfect use on the fingerprints
for door opening and closing. Through the project we can provide high security to
users. The fingerprint most of the banks have lockers such that one key is with the
user and the bank has a master key. They also have password which the user has to
tell the bank before going in the locker room, now if the user loses the key then, it is a
big security risk. there are many thieves around us that they can easily or forcefully
break our lockers so we can lost our property so to overcome this problem we are
creating this type of security system Many of the bank lockers do not guarantee full
safety of the user. In the fingerprint bank locker system we can easily add more than 1
fingerprint in the system so we can add our family member fingerprint as a nominee.
And we can insert our multi hand fingerprint if we are facing accident and if we
wound or a cut in our finger so we can use our nominee fingerprint or other multi
hand fingerprint. If we are away from our house and we required urgent document or
property so our family members can also use our lockers. this is a very a unique idea
instead to keep keys or to protect that keys. Biometric devices are highly secured
security identification and authentication device. Such devices use automated methods
of verifying and recognizing the identity of a living person based on a physiological
behavioral characteristic. These characteristics include fingerprints, facial images, iris
and voice reorganization Fingerprint - is unique and not similar to anybody and using
fingerprint can provide more security .even illiterate people are also capable of using
this security method. This method takes less time to be operated by the user. The
fingerprint can also be used in forensic departments while catching the suspect who
can be a murderer or a thief. Even the zoological experts use the fingerprint technique
to check on the animals in the forest that if the animal is dead or alive by this way
they carry on the census of the animals. The new species can also be discovered by
using their fingerprint to check on to the new species and the already existing species.
CHAPTER 2
LITERATURE SURVEY
EXISTING ALGORITHM:
Fingerprint identification is based on pattern recognition where the arches, loops and whorls
of the fingerprint ridges are compared with stored data. Identification is performed in three
parts.
A picture is taken of the fingerprint. The picture can be taken optically with a camera in the
reader or electronically, or as a combination of these two methods. The end result is a digital
black and white photograph of the ridges in the fingerprint. The fingerprint is then
transformed into a numerical model which stores the fingerprint’s unique characteristics, such
as the arches and loops and their distance from each other, as a series of numbers. A
recognized numerical model is compared with a stored numerical model (or models) to find
similarities.

Security is provided
using Locks & Keys. It
may not provide good
security.
• Others can steal the
user’s entry key an
Merits: Security is provided using using locks and keys.
It may provided good security.

PROPOSED SYSTEM:

he banking is a field that


always requires many
levels of security. In
that
field no security is
extravagant security.
And the bank security
is needed to be
updated every time.
The fingerprint based
security is now
considered to the most
he banking is a field that
always requires many
levels of security. In
that
field no security is
extravagant security.
And the bank security
is needed to be
updated every time.
The fingerprint based
security is now
considered to the most
he banking is a field that
always requires many
levels of security. In
that
field no security is
extravagant security.
And the bank security
is needed to be
updated every time.
The fingerprint based
security is now
considered to the most
he banking is a field that
always requires many
levels of security. In
that
field no security is
extravagant security.
And the bank security
is needed to be
updated every time.
The fingerprint based
security is now
considered to the most
Security is provided
using Locks & Keys. It
may not provide good
security.
• Others can steal the
user’s entry key an
CHAPTER 3
CONCEPT

3.1 FUNCTIONAL BLOCK DIAGRAM


Fig.3.1:Functional Block Diagram

3.2 DESCRIPTION OF COMPONENTS

3.2.1 FINGERPRINT R305:

R305 Fingerprint Identification module defined as TTL UART interface that offers
direct connections to microcontroller UART or to PC through MAX232 / USB-Serial
adapter. This sensor stores the user’s fingerprint data and configures it in 1:1 or 1: N
mode for identifying the person. This module operates in a wide range of applications
such as building electric safes, home automation projects, attendance related projects,
etc

Fig 3.2.1.1 Finger Print R305

Fingerprint module processing consists of two parts; Fingerprint Enrollment and


Fingerprint Matching (the matching can be 1:1 or 1:N). During the enrolling process,
the user needs to enter the fingerprint two times. And the system will process finger
images twice. Thus generates a template of the finger based on processing results and
thus store the template. During matching, the user enters the finger through an optical
sensor and the system will generate a template of the finger. This template is
compared with the template in the finger library. For 1:1 matching, the live finger is
compared with a specific template designated in the Module. Whereas for 1:N
matching, the system will search the whole finger library for the matching finger.

In both cases, the system returns the matching result, whether success or failure. We
can also enrol new fingers directly up to 162 fingerprints can be stored in the onboard
FLASH memory. The red LED in the lens lights up during a photo indicating that it’s
working. This module also features good image processing capabilities that can
successfully capture an image up to a resolution of 500 dpi. Also, Low power
consumption, low cost, small size, and excellent performance make it ideal for wide
applications.

3.2.2 ESP32 MICROCONTROLLER

Fig 3.2.2.1 ESP 32 Microcontroller pin

The ESP32 chip comes with 48 pins with multiple functions. Not all pins are exposed
in all ESP32 development boards, and some pins cannot be used.

There are many questions on how to use the ESP32 GPIOs. What pins should you
use? What pins should you avoid using in your projects? This post aims to be a simple
and easy-to-follow reference guide for the ESP32 GPIOs.

ESP32 Peripherals and I/O

Although the ESP32 has total 48 GPIO pins, only 25 of them are broken out to the
pin headers on both sides of the development board. These pins can be assigned to all
sorts of peripheral duties, including:

15 ADC channels 15 channels of 12-bit SAR ADC’s. The ADC range can be


set, in firmware, to either 0-1V, 0-1.4V, 0-2V, or 0-4V
2 UART interfaces 2 UART interfaces. One is used to load code serially. They
feature flow control, and support IrDA too!
25 PWM outputs 25 channels of PWM pins for dimming LEDs or controlling
motors
2 DAC channels 8-bit DACs to produce true analog voltages.

3 SPI There are 3 SPI and 1 I2C interfaces to hook up all sorts of
sensors and peripherals.
9 Touch Pads 9 GPIOs feature capacitive touch sensing.

The ESP32 development board has a total of 30 pins that connect it to the outside
world. For simplicity, pins with similar functionality are grouped together. The pinout
is as follows:

Table 3.2.2.1 Pin Description of Microcontroller


Fig 3.2.2.2 Fig of Esp 32 Peripherals and I/O

Let us analyze the ESP32 pins and their functions one by one in more detail.

GPIO Pins

ESP32 development board has 25 GPIO pins which can be assigned tvariousfunctions
programmatically. Each digital enabled GPIO can be configured to internal pull-up or
pull-down, or set to high impedance.

Touch Pins

ESP32 has 9 capacitive touch-sensing GPIOs. When a capacitive load (such as a


human finger) is in close proximity to the GPIO, the ESP32 detects the change in
capacitance.
Fig 3.2.2.3 Fig of Touch Pins

These pins can be easily turned into a touchpad by connecting them to any conductive
object such as wire, thread, foil, cloth, conductive paint, etc. The low-noise nature of
the design and the high sensitivity of the circuit allow relatively small pads to be used.

SPI Pins

SPI Pins ESP32 features three SPIs (SPI, HSPI and VSPI) in slave and master modes.
These SPIs also support the following general-purpose SPI features:

4 timing modes of the SPI format transfer

Up to 80 MHz and the divided clocks of 80 MHz

Up to 64-Byte FIFO
Fig 3.2.2.4 fig of SPI Pins

Only VSPI and HSPI are usable SPI interfaces and the third SPI bus is used by the
integrated flash memory chip. Standard libraries usually use VSPI pins between the
two.

I2C Pins

The ESP32 has a single I2C bus that allows you to connect up to 112 sensors and
peripherals. The SDA and SCL pins are, by default, assigned to the following pins.

However, you can bit-bang the I2C protocol on any GPIO pins with  wire.begin(SDA,

SCL)  command.

Fig 3.2.2.5 I2C Pins

UART Pins
ESP32 has 2 UART interfaces, i.e. UART0 and UART2, which provide asynchronous
communication (RS232 and RS485) and IrDA support, and communicate at up to 5
Mbps.

UART0 pins are connected to the USB-to-Serial converter and are used for flashing
and debugging. Therefore it is not recommended to use the UART0 pins.

UART2, on the other hand, are additional Serial1 pins, and are not connected to the
USB-to-Serial converter. This means that you can use them to connect to UART-
devices such as GPS, fingerprint sensor, etc.

Fig 3.2.3.6 Fig of UART Pins


PWM Pins

The board has 25 channels (Nearly All GPIO pins) of PWM pins controlled by Pulse
Width Modulation (PWM) controller. The PWM output can be used for driving digital
motors and LEDs.

The controller consists of PWM timers and the PWM operator. Each timer provides
timing in synchronous or independent form, and each PWM operator generates the
waveform for one PWM channel.
Fig 3.2.2.7 Fig of PWM Pins

RTC GPIO Pins

Some GPIOs are routed to the RTC low-power subsystem, they are called RTC
GPIOs. These are special pins that are used to wake the ESP32 from deep sleep when
the Ultra Low Power (ULP) co-processor is running. The following GPIOs can be
used as external wake up sources.

Fig 3.2.2.8 Fig of RTC GPIO Pins


Power Pins

There are two power pins viz. VIN pin & 3.3V pin. The VIN pin can be used to
directly supply the ESP32 and its peripherals, if you have a regulated 5V voltage
source. The 3.3V pin is the output of an on-board voltage regulator. This pin can be
used to supply power to external components. GND is a ground pin of ESP32
development board.

Fig 3.2.2.9 Fig of Power Pins


Enable Pin

EN Pin is used to enable ESP32. The chip is enabled when pulled HIGH. When pulled
LOW the chip works at minimum power.

Fig 3.2.2.10 Fig of Enable Pin


3.2.3 LCD (Liquid Crystal Display)

LCD (Liquid Crystal Display) screen is an electronic display module and find
a wide range of applications. A 16×2 LCD display is very basic module and is very
commonly used in various devices and circuits. These modules are preferred over
seven segments and other multi segment LEDs. The reasons being: LCDs are
economical; easily programmable; have no limitation of displaying special & even
custom characters (unlike in seven segments), animations and so on.

A 16×2 LCD means it can display 16 characters per line and there are 2 such
lines. In this LCD each character is displayed in 5×7 pixel matrix. This LCD has two
registers, namely, Command and Data.

The command register stores the command instructions given to the LCD. A
command is an instruction given to LCD to do a predefined task like initializing it,
clearing its screen, setting the cursor position, controlling display etc. The data
register stores the data to be displayed on the LCD. The data is the ASCII value of the
character to be displayed on the LCD. Click to learn more about internal structure of a
LCD.

Fig 3.2.3.1 Fig of 16x2 LCD


How LCDs are Constructed?

 The basic structure of LCD should be controlled by changing the applied


current.
 We must use a polarized light.
 Liquid crystal should able be to control both of the operation to transmit or can
also able to change the polarized light.

As mentioned above that we need to take two polarized glass pieces filter in the
making of the liquid crystal. The glass which does not have a polarized film on the
surface of it must be rubbed with a special polymer which will create microscopic
grooves on the surface of the polarized glass filter. The grooves must be in the same
direction of the polarized film. Now we have to add a coating of pneumatic liquid
phase crystal on one of the polarized filter of the polarized glass. The microscopic
channel cause the first layer molecule to align with filter orientation. When the right
angle appears at the first layer piece, we should add a second piece of glass with the
polarized film. The first filter will be naturally polarized as the light strikes it at the
starting stage.

Thus the light travels through each layer and guided on the next with the help
of molecule. The molecule tends to change its plane of vibration of the light in order
to match their angle.  When the light reaches to the far end of the liquid crystal
substance, it vibrates at the same angle as that of the final layer of the molecule
vibrates. The light is allowed to enter into the device only if the second layer of the
polarized glass matches with the final layer of the molecule.

Working

The principle behind the LCD’s is that when an electrical current is applied to
the liquid crystal molecule, the molecule tends to untwist. This causes the angle of
light which is passing through the molecule of the polarized glass and also cause a
change in the angle of the top polarizing filter. As a result a little light is allowed to
pass the polarized glass through a particular area of the LCD. Thus that particular area
will become dark compared to other. The LCD works on the principle of blocking
light. While constructing the LCD’s, a reflected mirror is arranged at the back. An
electrode plane is made of indium-tin oxide which is kept on top and a polarized glass
with a polarizing film is also added on the bottom of the device. The complete region
of the LCD has to be enclosed by a common electrode and above it should be the
liquid crystal matter.

Fig 3.2.3.2 Fig of LCD Constructi

Next comes to the second piece of glass with an electrode in the form of the rectangle
on the bottom and, on top, another polarizing film. It must be considered that both the
pieces are kept at right angles. When there is no current, the light passes through the
front of the LCD it will be reflected by the mirror and bounced back. As the electrode
is connected to a battery the current from it will cause the liquid crystals between the
common-plane electrode and the electrode shaped like a rectangle to untwist. Thus the
light is blocked from passing through. That particular rectangular area appears blank.

16X2 LCD pinout diagram


Fig 3.2.3.3 Fig of LCD Pin out

Sr. Pin
Pin Name Pin Type Pin Description Pin Connection
No No.

Connected to the
Pin This is a ground pin of ground of the
1 Ground Source Pin
1 LCD MCU/ Power
source

Connected to the
Pin This is the supply voltage
2 VCC Source Pin supply pin of
2 pin of LCD
Power source

Connected to a
Pin Adjusts the contrast of the
3 V0/VEE Control Pin variable POT that
3 LCD.
can source 0-5V

Connected to a
MCU pin and gets
either 0 or 1.
Pin Register Toggles between
4 Control Pin
4 Select Command/Data Register 0 -> Command
Mode

1-> Data Mode

5 Pin Read/Write Control Pin Toggles the LCD between Connected to a


MCU pin and gets
either 0 or 1.

0 -> Write
5 Read/Write Operation
Operation

1-> Read
Operation

Must be held high to Connected to MCU


Pin
6 Enable Control Pin perform Read/Write and always held
6
Operation high.

In 4-Wire Mode

Only 4 pins (0-3) is


Pins used to send connected to MCU
Pin Data Bits Data/Command
7 Command or data to the
7-14 (0-7) Pin
LCD. In 8-Wire Mode

All 8 pins(0-7) are


connected to MCU

Normal LED like


Pin LED
8 LED Pin operation to illuminate the Connected to +5V
15 Positive
LCD

Normal LED like


Pin LED operation to illuminate the Connected to
9 LED Pin
16 Negative LCD connected with ground
GND.

Table 3.2.3.1 Table of LCD Pin

Features of 16×2 LCD module

 Operating Voltage is 4.7V to 5.3V


 Current consumption is 1mA without backlight
 Alphanumeric LCD display module, meaning can display alphabets and
numbers
 Consists of two rows and each row can print 16 characters.
 Each character is build by a 5×8 pixel box
 Can work on both 8-bit and 4-bit mode
 It can also display any custom generated characters
 Available in Green and Blue Backlight

Advantages

 LCD’s consumes less amount of power compared to CRT and LED


 LCD’s are consist of some microwatts for display in comparison to some mill
watts for LED’s
 LCDs are of low cost
 Provides excellent contrast
 LCD’s are thinner and lighter when compared to cathode ray tube and LED

Disadvantages 

 Require additional light sources


 Range of temperature is limited for operation
 Low reliability
 Speed is very low
 LCD’s need an AC drive

Applications 

 Liquid crystal technology has major applications in the field of science and
engineering as well on electronic devices.
 Liquid crystal thermometer
 Optical imaging
 The liquid crystal display technique is also applicable in visualization of the
radio frequency waves in the waveguide
 Used in the medical applications

CHAPTER 4

SUMMARY OF LITERATURE SURVEY

Embedded systems often reside in machines that are expected to run continuously for
years without errors and in some cases recover by them if an error occurs. Therefore
the software is usually developed and tested more carefully than that for personal
computers, and unreliable mechanical moving parts such as disk drives, switches or
buttons are avoided. Specific reliability issues may include: The system cannot safely
be shut down for repair, or it is too inaccessible to repair. Examples include space
systems, undersea cables, navigational beacons, bore-hole systems, and automobiles.
The system must be kept running for safety reasons. "Limp modes" are less tolerable.
Often backups are selected by an operator. Examples include aircraft navigation,
reactor control systems, safety-critical chemical factory controls, train signals, engines
on single-engine aircraft. The system will lose large amounts of money when shut
down: Telephone switches, factory controls, bridge and elevator controls, funds
transfer and market making, automated sales and service. A variety of techniques are
used, sometimes in combination, to recover from errors both software bugs such as
memory leaks, and also soft errors in the hardware: Watchdog timer that resets the
computer unless the software periodically notifies the watchdog Subsystems with
redundant spares that can be switched over to software "limp modes" that provide
partial function Designing with a Trusted Computing Base (TCB) architecture[6]
ensures a highly secure & reliable system environment An Embedded Hypervisor is
able to provide secure encapsulation for any subsystem component, so that a
compromised software component cannot interfere with other subsystems, or
privileged-level system software. This encapsulation keeps faults from propagating
from one subsystem to another, improving reliability. This may also allow a
subsystem to be automatically shut down and restarted on fault detection. Immunity
Aware Programming

REFERENCE
1. Sagar S. Palsodkar*, Prof S.B. Patil , “Review: Biometric and GSM Security for
Lockers” Int. Journal of Engineering Research and Applications , Vol. 4, Issue 12(Part
6),December 2014.
2. R.Ramani , S. Selvaraju , S.Valarmathy, P.Niranjan , “Bank Locker Security
System based on RFID and GSM Technology ’’, International Journal of Computer
Applications (0975 – 8887) Volume 57– No.18, November 2012
3. P. Sugapriya#1, K. Amsavalli#2,“Smart Banking Security System Using
PatternAnalyzer”,International Journal of Innovative Research in Computer and
Communication Engineering ,Vol.3, Special Issue 8, October 2015
4. M.Gayathri, P.Selvakumari, R.Brindha “Fingerprint and GSM based Security
System” International Journal of Engineering Sciences & Research Technology,
ISSN: 2277-9655, Gayathri et al.3(4): April, 2014.
5. Mary Lourde R and DushyantKhosla “Fingerprint Identification in Biometric
Security Systems” International Journal of Computer and Electrical Engineering,
Vol.2, No. 5, October, 2010
6. Pramila D Kamble and Dr. Bharti W. Gawali “Fingerprint Verification of ATM
Security System by Using Biometric and Hybridization” International Journal of
Scientific and Research Publications, Volume 2, Issue 11, November 2012.
7. Ashish M. Jaiswal andMahipBartere “Enhancing ATM Security Using Fingerprint
And GSM Technology”, International Journal of Computing Science and Mobile
Computing Vol. 3, Issue. 4, April 2014.
8. Bhalekar S.D., Kulkarni R.R., Lawande A.K., Patil V.V., “On line Ration card
System by using RFID and Biometrics”, International journal of Advanced Research
in Computer Science & Software engineering., Vol. 5Issue 10, October 2015.
9. Abhilasha A Sayar1 , Dr. Sunil N Pawar2 , “Review of Bank Locker System Using
Embedded System” , International Journal of Advanced Research in Computer and
Communication Engineering .,Vol. 5, Issue 2, February 2016 .
10. SanalMalhotra, “Banking Locker System With Odor Identification & Security
Question Using RFID GSM Technology”. International Journal of Advances in
Electronics Engineering – IJAEE Volume 4 : Issue 3.
PO’S ATTAINED
PO1: Engineering Knowledge
PO2: Problem Analysis
PO3: Design/ development of solution
PO4: Conduct investigation of complex problems
PO5: Modern tool usage
PO6: The engineer and society
PO7: Environment & sustainability
PO8: Ethics
PO10: Communication
PO11: Project Management and Finance
PO12: Life – long learning
PSO1: Skilled Engineering
PSO2: Research Abilit

You might also like