Professional Documents
Culture Documents
Biometric
Biometric
INTRODUCTION
1.1 MOTIVATION
During the COVID situation, people are taking a lot of precautions to save
themselves from Corona viruses, but there are high chances of carelessness, which might
lead to consequences. The idea behind the project was basically to reduce the severity of
the consequences and enhance security. The security pattern includes an access control
system for doors. Traditional locks are no longer as secure as they once were; anyone can
gain access by breaking these locks. To improve safety measures, this project uses the
phone fingerprint to open the door, where the phone is an important necessity for everyone
in daily life, which eliminates contact and thus reduces the chances of spreading.
1.2 GENERAL DESCRIPTION
The implementation makes door unlocking systems integrated with smart device
technology, which will help people increase the quality of their lives. Furthermore,
everyone already has a smartphone and is more aware of the existence of a smart phone.
There is no need to forget the key or forget to put the key, and there is no need to
duplicate the key, but keep in mind the key security level. Sometimes, it is necessary to
open the door from the seat while concentrating on work, only to unlock it when it is a
little off from the table. As a result, opening the door is simple, which simplifies and
enhances our security.
1.3 OBJECTIVE OF THE PROJECT
A sense of safety is essential for every person. The security pattern includes an access
control system for doors. The implementation involves the integration of door unlocking
systems with smart device technology, which will enhance the quality of people's lives.
Moreover, most people already have a smartphone and are more aware of the existence of
smartphones. There is no need to forget the key or forget to put the key, and there is no
need to duplicate the key, but keep in mind the key security level. This project uses the
phone fingerprint to open the door, where the phone is an important necessity for
everyone in day-to-day life. An Android application is designed that scans, verifies the
1
fingerprint, and sends confirmation data to the Arduino through a Bluetooth module. To
interface, use the GSM module to send the data to a mobile phone.
1.4 ORGANIZATION OF DOCUMENTATON
The project includes the following:
Chapter 1: Explains the background, introduction, and objectives of the miniproject.
Chapter 2: Explains about the existing system, proposed system of the miniproject.
Chapter 3: Explains design and analysis of the mini project.
Chapter 4: Explain the result and analysis of the mini project.
Chapter 5: Conclusion and future scope.
2
CHAPTER 2
LITERATURE SURVEY
2.1 INTRODUCTION
An Arduino-based smart fingerprint authentication system is necessary for the
safety and well-being of homes, workplaces, shops, and banks currently. The design of
the project is intended to provide security in these areas. Clients utilizing these types of
darting frameworks either use a pin number, a unique mark, an RFIDcard, a pin, or a secret
key using a cell phone. Security development is not possible in the absence of a security
food chain in this framework. So, to enhance security, the project was designed. The
fingerprint sensor will take the fingerprint of the user and forward it to the
microcontroller to match its records. If the print matches one of the fingerprints in the
microcontroller’s memory, the microcontroller will lock or unlock the latch based on its
current state. The fingerprint sensor will take the fingerprint of the user and forward it to
the microcontroller to match its records. If the print matches one of the fingerprints in the
microcontroller’s memory, the microcontroller will lock or unlock the latch based on its
current state. When someone attempts to break the door, GSM is employed to send a
message to the admin. The biometric security framework was created to be easier to use by
adding two press buttons, one for erasing selected fingerprints and one more for enlisting
new fingerprints.
[1] J. Vegas, et.al., proposed two categories of identifying a person to access the door
lock system which information challenge-based identification and token- based
identification.
[2] H. Novita, et.al., proposed an information challenge-based system is known as
providing a secret information such as PIN number or password while the token-based
identification system is known as using a Radio Frequency Identification (RFID) card or
biometric.
[3] M. Meera, et.al., "Super secure door lock system for critical zones”, The information
challenge-based system is known as providing a secret information
3
such as PIN number or password while the token-based identification system is known as
using a Radio Frequency Identification (RFID) card or biometric.
[4] R. Lenka, et.al., "Realization of Security System using Facial Recognition and
Arduino Keypad Door Lock System", The information challenge-based system is known
providing secret information such as PIN number or password [. while the token-based
identification system is known as using a Radio Frequency Identification (RFID) card or
as biometric.
2.2 EXISTING SYSTEM
Fingerprint recognition is one of the oldest and most reliable biometrics used for
personal identification. Fingerprint recognition has been used for over one hundred years
now and has come a long way from tedious manual fingerprint matching. The existing
system for the project is biometric fingerprint recognition. The device is placed on the wall
or the door of the house; whenever someone wants to open the door, they must place their
fingerprint on the sensor, which the device recognizes. Either way of opening the door is
by entering the pin. The enrollment of the fingerprint patterns should be done to complete
the above process. A mechanism that opens or closes the lock on a door. The door
automatically with a key code. There are two work processes for this experiment which
are:
Case 1: The lock will open. A keypad will input values, allowing us to compare the
values with the string of integer values that are set in the code. When inputting a code
comprising integer values with the help of the keyboard, check if the string is an integer.
If the values match the string of integer values already fixed in the code, the keypad will
send a signal to the display, and the "Code Accepted" message will be shown. If the code
is accepted, the Arduino will senda signal to the servo motor. The motor will then rotate
90° and open the lock, allowing the door to be unlocked
Case 2: The lock will not open. If the code inserted into the keypad does not match
the fixed string in the code, the keyboard will send a signal to the display to show the
"Wrong Code" message. Pressing the wrong values on the keypad will automatically
instruct the user to start again from the beginning.
4
If the "Wrong Code" message is shown, the servo motor will not rotate. The lock
will not open, allowing the door to remain locked. The proposed system consists of both
Hardware and the software part. The system proposed consists of both hardware and
software components. An Arduino Nano with a Bluetooth module, a solenoid lock, and an
Android smartphone are utilized in the hardware part of the project. The Android
application is designed to scan and verify fingerprints and send confirmation data to
Arduino via Bluetooth serial communication.
A smartphone fingerprint sensor is used by this system to lock and unlock the door.
2.3 DISADVANTAGES OF EXISTING SYSTEM
Malfunction
False positive’s
Fingers that are burnt or damaged cannot be authorized.
Scanner issue
No Remote Access
2.4 PROPOSED SYSTEM
During the COVID situation, people are taking a lot of precautions to save
themselves from Corona viruses, but there are high chances of carelessness, which might
lead to consequences. The idea behind the project was basically to reduce the severity of
the consequences and enhance security. The security pattern includes an access control
system for doors. Traditional locks are no longer as secure as they once were; anyone can
gain access by breaking these locks. To improve safety measures, this project uses the
phone fingerprint to open the door, where the phone is an important necessity for everyone
in daily life, which eliminates contact and thus reduces the chances of spreading.
The system proposed consists of both hardware and software components. An
Arduino Nano with a Bluetooth module, a solenoid lock, and an Android smartphone
are utilized in the hardware part of the project. The Android application is designed to
scan and verify fingerprints and send confirmation data to Arduino via Bluetooth serial
communication. A smartphone fingerprint sensoris used by this system to lock and unlock
the door. With the help of the Bluetooth module, the phone is connected. The Arduino
Nano is dumped with the embedded C code. Sends a message to the admin when someone
attempts to break the doorusing GSM and the buzzer rings inside the house.
5
It provides a lot of security when compared to the traditional method as only
authorized users can use the services of this app.
This project is easy to maintain and run, and it is scalable, affordable, and reliable.
If someone tries to break into your door, it reports immediately through the message.
People always carry their phones with them, so unauthorized people cannot open the
door with the false impression of a fingerprint. Most importantly, this project
supports contactless door opening and closing. In a pandemic situation like the
coronavirus, the best safety measure is to open the door without contact to avoid
spreading the virus.
6
CHAPTER 3
DESIGN AND ANALYSIS
3.1 INTRODUCTION
An embedded system is a combination of computer hardware and software and
additional mechanical parts designed to perform specific functions.A good example is the
microwave. Every household has one, and ten million ofthem are used every day, but
very few people realize that a processor and software engage in lunch and dinner. Smart,
embedded systems are found everywhere in our daily lives, from mobile phones to
household appliances, from robotic manufacturing systems to airplanes, satellites,
healthcare devices,and even elevators. They are low-cost, low power consuming, small
computersthat are embedded in other mechanical or electrical systems. They comprise a
processor, power supply, memory, and communication ports. Embedded systems use the
communication ports to transmit data between the processor andperipheral devices—often
other embedded systems—using a communication protocol. The processor interprets this
data with the help of minimal software stored in memory. The software is usually highly
specific to the function that the embedded system serves.
Android is an operating system based on the Linux kernel and designed primarily
for touch-screen mobile devices such as smart phones and tablet computers. Initially
developed by Android, Inc., which Google backed financially and later bought in 2005,
Android was unveiled in 2007 along with the founding of the Open Handset Alliance, a
consortium of hardware, software, and telecommunication companies devoted to
advancing open standards for mobile devices. Android has a complete software package
consisting of an operating system, a middleware layer, and core applications. Different
from other existing platforms like iOS (iPhone OS), it comes with a software development
kit (SDK), which provides essential tools and applications. Using a smartphone as the
“brain” of a device is already an active research field with several open opportunities and
promising possibilities. In this project, we present a review of current devices
controlled by mobile phones and discuss closed-loop control systems using audio
channels on mobile devices, such as phones and tablet computers.
7
3.2 BLOCK DIAGRAM
8
secure or release a door, gate, or other access point. The nano sends the signal to the
solenoid, which unlocks the door with the help of the real. A relay is a switch that can be
electrically operated and used to control high-power devices or components with a low
power signal. GSM (Global System for Mobile Communications) is used for a variety of
telecommunications services and applications. This allows you to make voice calls, send
and receive SMS (short message service) messages, and establish data connections over
your mobile network. If someone breaks the door, a message will be sent to the
administrator,and a buzzer will sound.
3.4 SCHEMATIC DECRIPTION
As shown in the schematic Diagram 3.2, the connections are simple. To connect
the HC-05 Bluetooth module to the Nano, supply 5V power to the device,connect the TX
to the RX pin of the microcontroller, and connect the RX pin to the TX pin of the
microcontroller. The red LED indicates the power status of the Arduino Nano, and the
green LED indicates whether the door is unlocked. The VCC and GND pins of the
Bluetooth module are connected to the Nano's 5V and GND, and the Tx and Rx pins are
connected to the Arduino Nano's Rx and Tx, respectively. The positive pin of the buzzer
9
is connected to digital pin 4 of the Arduino and the negative pin is connected to the GND
of the Arduino Nano.. Similarly, the input pin of the relay is connected to digital pin 2
of the Arduino Nano, and the VCC and ground pins are connected to the 5V and
GND pins of the Arduino Nano.To control the solenoid lock, there is a need to control a
circuit that includes an NPN transistor and an N-channel MOSFET and to control the
NPN transistor by connecting the Nano's D2 pin to the base pin of the transistor through a
550-ohm connection. there is. Connect a resistor to control the current flowing through
the transistor. When the D2 pin is pulled high, it turns on the transistor, pulls the gate pin
of the MOSFET to ground, and turns off the MOSFET and magnetic latch. When the D2
pin is pulled low, the NPN transistor is turned off. This means the gate of the MOSFET is
pulled down to 12V through a 2k ohm pull-up resistor, turning on the MOSFET and
powering the magnetic latch. A buzzer is connected to the open/close relay contacts,
which will sound an alarm in the event of an intruder. The complete circuit is on a perfect
board to make it compact. The 5 pin of the Arduino is connected to the GSM, where it
enables you to make voice calls, send and receive SMS (Short Message Service)
messages, and establish data connections on the cellular network. When someone tries to
break the door with the help of the network, it sends a message to the admin or the owner
of the house.
10
3.5 FLOW CHART
Fig.3.1. Flowchart
Flowchart Fig. 3.1 explains the whole process of locking and unlocking the door. It
gives the step-by-step process of the project. Firstly, the person must connect the phone
to the Bluetooth module in the Arduino door lock app and enroll the fingerprint on the
phone. Open the app on the phone and verify if the fingerprint matches the fingerprint
before enrolling. If the fingerprint matches, the door opens automatically, with the help of
the solenoid lock where the Arduino sends the data and the door locks immediately, or
else the buzzer rings due to the wrong fingerprint. The device can hold multiple
fingerprints, which gives access to users. If someone tries to break the door, the buzzer
rings inside the door, and the message will be sent to the administrator or owner of the
house.so, the admin can take the necessary actions accordingly.
11
3.6 ALGORITHAM
Step 1: Start
Step 2: Connect Bluetooth to your smartphone
Step 3: Place your fingerprint on the sensor
Step 4: If the fingerprints match, the door will open, if there is unmatched, the buzzer
will sound
Step 5: End
12
CHAPTER 4
RESULT AND ANALYSIS
4.1 OBJECTIVE
A sense of safety is essential for every person. The security pattern includesan access
control system for doors. The implementation involves the integration of door unlocking
systems with smart device technology, which will enhance the quality of people's lives.
Moreover, most people already have a smartphone and are more aware of the existence of
smartphones. There is no need to forget the key or forget to put the key, and there is no
need to duplicate the key, but keep in mind the key security level. This project uses the
phone fingerprint to open the door, where the phone is an important necessity for
everyone in day-to-day life. An Android application is designed that scans and verifies
the fingerprint and sends confirmation data to the Arduino through a Bluetooth module. To
interface,use the GSM module to send the data to a mobile phone.
4.2 TEST SETUP
A
E
F
C
D G
13
A-Trasformer
B- Relay
C- Arduino Nano
D-05 Bluetooth Module
E-GSM
F-Relay
G- Solenoid Lock
4.2 RESULT ANALYSIS
The work applies the common trend of smart homes by integrating smart devicesto
lock and unlock the door. A user-friendly technology is deployed to render the entire door
automation system with its process controlled.
14
Fig.4.2 Setup Result
4.4 APPLICATIONS
Home applications
Industrial applications
15
CHAPTER 5
CONCLUSION
The future scope of a wireless door unlock system using mobile fingerprint
authentication and security features holds exciting potential due to ongoing technological
advancements and increasing demand for smart and secure access control solutions
• Continuous improvement in security features such as multi-factor
authentication, facial recognition, voice recognition, and AI-driven anomaly detection
can make these systems even more secure.
• The ability to monitor and control the door unlock system remotely using a
smartphone app is likely to become more advanced. This can include features like
granting temporary access to guests or delivery personnel, even when you are not at
home.
16
REFERENCES
17
APPENDIX A
#include <SoftwareSerial.h>
SoftwareSerial mySerial(9,10);
int value1;
#define relay 2
const int buzzer = 4;
const int ls = 5;
void setup()
{
Serial.begin(9600);
mySerial.begin(9600);
pinMode(relay, OUTPUT);
pinMode(buzzer, OUTPUT);
pinMode(ls, INPUT);
digitalWrite(ls, HIGH);
digitalWrite(relay, LOW);
}
void loop()
{
// Serial.print("Reading");
if(digitalRead(ls)==LOW)
{
digitalWrite(buzzer, HIGH);
mySerial.begin(9600);
mySerial.print("AT+CMGF=1\n\r");
delay(1000);
mySerial.println("AT"); //Handshaking with SIM900
delay(1000);
mySerial.println("AT+CMGF=1"); // Configuring TEXT mode
delay(1000);
18
18 mySerial.println("AT+CMGS=\"+917981417614\"");//change ZZ with country code
and xxxxxxxxxxx with phone number to sms
delay(1000);
mySerial.print("ALERT,DOOR BREAK DETECTED");
delay(1000);
mySerial.write(26);
delay(1000);
digitalWrite(buzzer, LOW);
}
if(Serial.available()>0) // Send data only when you receive data:
{
value1 = Serial.read();
Serial.print(value1);
if (value1==1)
{
Serial.print("Unlocking");
digitalWrite(relay, HIGH);
delay(5000);
digitalWrite(relay, LOW);
}
if (value1==0)
{
digitalWrite(relay, LOW);
digitalWrite(buzzer, HIGH);
delay(5000);
digitalWrite(buzzer, LOW);
Serial.print("Locking");
}
}
}
19
APPENDIX B
ARDUINO IDE
The Arduino integrated development environment (IDE) is a cross platform
application written in Java and is derived from the IDE for the Processing programming
language and the Wiring projects. It includes a code editor which is capable of compiling
and uploading programs to the board with a single click. A program or code written for
Arduino is called a "sketch.”
Following are the steps involved:
1. Open Arduino IDE as shown below
20
2. Select the COM Port from tools
21
4. Write the sketch in Arduino IDE
22
APPENDIX C
HARDWARE REQUIREMENTS AND SPECIFICATIONS
Transformer
Regulator
HC-05 Bluetooth module
Arduino nano
Solenoid lock
Relay
GSM
Buzzer
TRASNFORMER
Transformer, a device that transfers electric energy from one alternating- current
circuit to a direct current.0020Here, it is used to convert the 230-volt AC current to a
12volt DC current.
Fig.C.1 Transformer
23
REGULATOR
A voltage regulator is a component of the power supply unit that ensures a steady,
constant voltage supply through all operational conditions and steps down the twelve volts
to 5 volts.
Fig.C.2 Regulator
24
ARDUINO NANO
Arduino Nano is a microcontroller board based on an 8-bit Mega328P
microcontroller. Along with the Mega328P board, this Arduino Nano has fourteen digital
pins (out of 6 used as PWM outputs), 6 analog-featured i/o input pins, and a USB-B-type
connection port.
SOLENOID LOCK
A solenoid lock is an electromechanical device that uses a solenoid tocontrol
the locking and unlocking of a mechanism, such as a door or a gate.
25
RELAY
A relay is an electrical switch that uses an electromagnet to control the flow of
electricity in a circuit. It allows a low-power signal to control a high-power circuit,
making it a fundamental component in many electrical and electronic systems. Relays are
used for various purposes, including switching high-voltageloads
Fig.C.6 Relay
GSM
GSM 900 provides good coverage and range, especially in rural and suburban
areas. Its better propagation characteristics, allowing signals to penetrate buildings and
travel longer distances compared to higher-frequency bands.
Fig.C.7 GSM
26
APPENDIX D
IC APPLICATIONS IC 7805
The IC 7805 is a widely used voltage regulator IC (integrated circuit) that provides
a fixed positive output voltage. Specifically, the IC 7805 is a member of the 78xx series of
voltage regulators, which are designed to provide a stable and regulated DC voltage
output. The "7805" designation corresponds to the specific voltage regulator within the
78xx series that outputs +5 volts DC. The 7805 is available in different packages,
including TO-220, TO-92, and other variations, to accommodate various applications and
mounting methods. Voltage regulators are common in electronic circuits. They provide a
constant output voltage for a varied input voltage. In our case the 7805 IC is an iconic
regulator IC that finds its application in most the projects. The name 7805 signifies two
meanings, “78” means that it is a positive voltage regulator and “05” means that it provides
5V asoutput. So, our 7805 will provide a +5V output voltage.
The output current of this IC can go up to 1.5A. But the IC suffers from heavy
heat loss hence a Heat sink recommended for projects that consume more current. For
example, if the input voltage is 12V and you are consuming 1A, then(12-5) * 1 = 7W.
Fig:D.1 IC7805
27
SPECIFICATION OF IC 7805
SPECIFICATIONS IC 7805
V out 5V
Vein-V out Difference 5V-20V
Output Imax 1A
28