FINGERPRINT BASED CAR IGNITION SYSTEM 1 To 4

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 52

CHAPTER ONE

INTRODUCTION

1.1 Background of the Study

Biometric technology is a method that requires the physical presence of the identified

person. It is a new state of art method for security systems. Fingerprint recognition is one of

the most widely used biometric system and also the oldest method. The use of fingerprint

ID goes back to ancient times, although the use of DNA evidence is considered more accurate

today. In ancient Babylonia and China, thumbprints and fingerprints were used on clay tablets

and seals as signatures. The idea that fingerprints might be unique to individual’s dates from the

fourteenth century. In 1686 the physiologist Marcello Malpighi examined fingerprints under a

microscope and noted a series of ridges and loops. In 1823, another physiologist, Jan Purkinje,

noted at least nine different fingerprint patterns.

The pioneer in fingerprint identification was Sir Francis Galton, an anthropologist by training,

who was the first to show scientifically how fingerprints could be used to identify individuals.

Beginning in the 1880s, Galton (a cousin of Charles Darwin) studied fingerprints to seek out

hereditary traits. He determined through his studies not only that no two fingerprints are exactly

alike, but also that fingerprints remain constant throughout an individual's lifetime. Galton

published a book on his findings in 1892 in which he listed the three most common fingerprint

types: loop, whorl, and arch. These classifications are still used today.

The use of fingerprints as personal code was also in tradition method. Developing a

prototype with biometric system will serve a robust and embedded real time fingerprints-

based ignition systems in vehicle. This project focuses about developing a prototype of

1
vehicle ignition using fingerprint. This system has a potential to avoid the vehicle from being

stolen. This lock security is developed to control the ignition of the vehicle by using

RFID (Radio Frequency Identification and fingerprint. The existing lock at the vehicle is not

highly secured which consist of handle lock and standard switch lock. To overcome this,

there are variety of security lock system that can be added to the vehicle. By creating

this prototype, security level of the vehicle ignition is highly protected and could help to

decrease theft. The main idea of this project is to have RFID sensor to validate the license of

the user and a fingerprint scanner will detect the authorized or an unauthorized user. In the

current era, there is high demand for robust security systems in vehicles. So, the

designing and developing a biometric security system using fingerprint technology to

prevent unauthorized vehicle is easy and very useful.

1.2 Statement of the Problem

A vehicle theft is becoming very common nowadays, which is one of the main issues

for a person having car or bike. The conventional method of ignition uses key which can

easily be manipulated and also there is some method that can be used to start a car without key

by cutting some wires in which this make the system not secure enough for owners of vehicle

because the vehicle can be access with or without a key. This system can prevent the vehicles

from being stolen. It is developed to control the ignition of the vehicle through the RFID

sensor and fingerprint scanner.

1.3 Significant of the Study

Vehicle ignition using fingerprint system is known as security system to prevent vehicle

theft. Vehicle security system depends on sensors that are way too costly and high

2
efficient. This system is developed to cut cost for the technology like only the premium

car makers are imposing this in the market. Thus, developing vehicle ignition using

fingerprint would be efficient and low cost for users who own vehicle to keep secure

their vehicle without any worries. Fingerprints biometric system is cheaper compared to

the rest of the biometrics and there is also high usage among users.

1.4 Aim and Objectives of the Study

The aim of this project is to construct “Fingerprint Based Car Ignition System using Arduino and

RFID”.

The objectives are:

1. To interface Arduino with RFID sensor to validate the license of the user using RFID tag

2. To interface Arduino with Fingerprint sensor to give access to authorize user and to

denied unauthorized user.

3. To display the information of the system for either authorize or unauthorized user using

LCD 16x2 display.

4. To reduce theft of vehicles using fingerprint security system.

1.5 Scope and Limitations of the Study

This project focuses on the use of fingerprints for vehicle ignition, as opposed to the

conventional method of using keys. The prototype system could be divided into the

following modules: RFID system for validation, fingerprint analysis software module that

accepts fingerprints images; hardware interface module and the ignition system module.

The fingerprint recognition software enables fingerprints of valid users of the vehicle to

be enrolled in a database. Before any user can ignite the vehicle, his/her fingerprint

3
image is matched against the fingerprints in the database while users with no match in

the database are prevented from igniting the vehicle. Control for the ignition system of

the vehicle is achieved by sending appropriate signals to the parallel port of the computer

and subsequently to the interface control circuit. The developed prototype serves as an

impetus to drive future research, geared towards developing a more robust and embedded

real-time fingerprint based ignition systems in vehicles.

The Limitations of the project are:

1. The accuracy and working of the fingerprint sensor is affected by skin conditions of

people.

2. It is difficult to capture complete and accurate fingerprint image in some cases based on

age and occupation.

3. In the case of RFID sensor a particular RFID tag is attached which if lost the system

cannot be access because the tag serve as validation before fingerprint for authorization.

4
CHAPTER TWO

LITERATURE REVIEW

2.1 Introduction

There is a present demand for robust security systems in vehicles. Therefore, the usefulness of

designing and implementing a biometric security system using fingerprint technology, to prevent

unauthorized vehicle ignition cannot be overemphasized. This chapter review past work

associated with robust security system in vehicle.

2.1 Fingerprint Basics

All humans have minute raised ridges of skin on the inside surfaces of their hands and fingers

and on the bottom surfaces of their feet and toes, known as 'friction ridge skin'. The friction

ridges provide a gripping surface in much the same way that the tread pattern of a car tyre does.

Friction ridge skin constitutes the only skin on the body without hairs. Fingerprints are patterns

of ridges and valleys on the surface of the finger. Like everything in the human body, these

ridges form through a combination of genetic and environmental factors. The genetic code in

DNA gives general orders on the way skin should form in a developing fetus, but the specific

way it forms is a result of random events. The exact position of the fetus in the womb at a

particular moment and the exact composition and density of surrounding amniotic fluid decides

how every individual ridge will form. This development process occurs in such a way that, in the

entire course of human history, there is virtually no possibility of the same exact pattern forming

twice. Consequently, fingerprints are a unique marker for every person, even identical twins. No

matter how similar two prints may look at a glance, a trained investigator or suitable software

can pick out clear, defined differences. This is the basic idea of fingerprint analysis, in both

crime investigation and security. The two fundamental principles underlying the use of

5
fingerprints as a means of identifying individuals are: immutability and individuality or

uniqueness.

Immutability: This refers to the permanent and unchanging character of the pattern on each

Finger. Several years accumulated fingerprint study and experience has demonstrated that

friction ridge patterns do not change naturally during the life of a person. This pattern starts

developing in the third month of pregnancy and is fully formed by the fourth month. During a

person's lifetime, the pattern remains the same, apart from changing in size or by accident,

mutilation or skin disease, until death. In fact, the friction ridge patterns will remain after death

until the body decomposes.

Uniqueness: Individuality refers to the uniqueness of ridge details across individuals; the

probability that two fingerprints are alike is about 1 in 1.9x1015. Friction ridge detail forms in a

purely random manner during foetal development in the womb. There is sufficient variability in

the arrangement of minutiae to ensure that no two friction ridge patterns are identical, whether

they are on different fingers of the same person or on the fingers of different people. Although

this is difficult to prove empirically, no two fingerprints have ever been found to be identical in

over a century of the use of fingerprinting. Studies have further shown that while identical twins

share the same DNA profile markers, they can nevertheless be differentiated by their

fingerprints. The patterns of the fingerprints are classified as arch, tented arch, right loop, left

loop and the whorl. Arches are basic type of fingerprints formed by ridges. It enters at one side

and exits at another side. This is the same for the plain arch and also the tented arch. Whorls

contains at least one of the ridge that makes a whole circuit and loops are one or more ridges

entering from one side of the print, re-curving and existing at the same side of the print. After a

fingerprint picture is obtained by the fingerprint reader equipment, this fingerprint must be

6
interpreted. It must be prepared such that read-outs can be effectively thought about and

coordinated against each other. Two sorts of coordinating software exist, which is minutiae

matching and pattern matching.

Fig. 2.1. Patterns of Fingerprints.

2.1.1 Fingerprint Sensor

A fingerprint sensor is a type of electronic security system that uses fingerprints for biometric

authentication to grant a user access to information or to approve transactions. Human

fingerprints are practically unique, which is why they’re successful at identifying individuals.

It’s not just law enforcement agencies that collect and maintain databases of fingerprints.

Many types of occupations that require professional licensing or certification (e.g. financial

advisors, stockbrokers, real estate agents, teachers, doctors/nurses, security, contractors, etc.)

mandate fingerprinting as a condition of employment. It's also typical to provide fingerprints

when having documents notarized. Advancements in technology have been able to incorporate

fingerprint scanners (can also be referred to as ‘readers’ or ‘scanner’) as another (optional)

security feature for mobile devices. Fingerprint scanners are one of the latest in an ever-

growing list pin codes, pattern codes, passwords, face recognition, location detection, iris

scanning, voice recognition, trusted Bluetooth or NFC connection of ways to lock and unlock

7
smartphones. The reason why people use a fingerprint scanner is because many enjoy it for the

security, convenience, and futuristic feel. Fingerprint scanners work by capturing the pattern of

ridges and valleys on a finger. The information is then processed by the device’s pattern

analysis/matching software, which compares it to the list of registered fingerprints on file. A

successful match means that an identity has been verified, thereby granting access. The method

of capturing fingerprint data depends on the type of scanner being used.

2.1.2 Classification of Fingerprint Sensors

1. Capacitive sensor- This is a CMOS reader that uses capacitors and an image is formed

using electrical current. It is more expensive compared to optical readers. The advantage

of using capacitive sensor is that it requires a real fingerprint shape, not only a visual

image. This is the reason for CMOS to be harder to get tricked. It is embedded in a

Silicon chip composed of 2D array of micro capacitor. Between the finger surface and the

Silicon plates, electrical charges are created. Plate’s leads to pattern of distinguished

capacitances are respected with the distance of variation of ridges and valleys.

Fig. 2.2. Capacitive sensor.

2. Optical sensor- This are the oldest to come by of capturing the fingerprints and then

comparing them. Firstly, an image is captured as in a photograph; unique algorithms are

then used to detect patterns on the finger’s surface to mark off any marks and ridges. This

8
is done by differentiating the dark and light areas of the captured image. The sensors are

designed to have a specific resolution. If the resolution is higher, the sensor can capture

finer details of your finger. They essentially capture a two-dimensional picture. The

Suprema Realscan G10 is a portable scanner that employs advanced optical technology to

capture the patterns and ridges in dry and wet fingers.

Fig. 2.3. Optical sensor

2.2 Ignition Systems of Vehicles

The ignition system of an internal-combustion engine is an important part of the overall engine

system that provides for the timely burning of the fuel mixture within the engine. All

conventional petrol (gasoline) engines require an ignition system. The ignition system is usually

switched on/off through a lock switch, operated with a key or code patch. The ignition system

works in perfect concert with the rest of the engine of a vehicle. The goal is to ignite the fuel at

exactly the right time so that the expanding gases can do the maximum amount of work that in

line with the processes to make the vehicle move. If the ignition system fires at the wrong time,

power will fall and gas consumption and emissions can increase. The part of the ignition system

that first initiates the process of moving a vehicle is the key system in conjunction with the kick

starter. A wire from the battery in the vehicle connects to the kick starter and other wires connect

9
the kick starter to the key system. When the car key in the ignition system is turned once, two

wires coming from the kick starter to the key system are bridged. This causes the engine and

some other parts of the vehicle to be put in a READY or ON state. Turning the key again makes

a third wire to temporarily join the already bridged wires, causing voltage to flow from the

battery to the necessary parts vehicle so as to enable the vehicle move.

2.3 Review of Past Work

2.3.1 Face Recognition Based Car Ignition and Security System

Bhojane and Thorat, briefly discussed about how the car provides ignition to the engine. Literally

this system replaces the key off a vehicle with specific user’s face. In this paper, a facial

recognition system by embedding face detection and face tracking system algorithm found in

MATLAB with the use of Raspberry Pi B is discussed. The purpose of this system to prohibit

vehicles getting steal from thieves. Owners of the vehicles face towards technology as an anti-

robbery system by developing this face recognition system. With the knowledge and applications

of large amount embedded techniques, car security program study and analyses are consistently

improving. Many trendy techniques, a well-known as biometric passport campaign, perception

processing technique, communication technique thus, have been entire into car security systems.

At the same anticipate, the approach to the cars remains valuable. So, one efficient car security

program should be sensible, competent and reliable. So to prohibit vehicles stealing from thieves,

owners of the automobiles are facing towards technology as an anti-robbery system. In this

paper, use of Haar-like feature is been used to detect and recognize the face of the authenticated

user. This is to achieve the secure environment for ignition and accessing the car a typical

rectangular haar-like feature. Objective of this car ignition system is creating a secure

environment associated with the face of the individual.

10
2.3.2 Fingerprint Based Lock System

Omidiora E.O. et al. mainly focuses on the replacement of keys with the biometric specially

fingerprint based lock systems in the vehicles because fingerprints are the oldest and most widely

used form of biometric identification and also provide a robust security mechanism for various

security domains. Their prototype consists of fingerprint software module used to store the

database of the valid users, a hardware unit for interfacing and the ignition system module to

ignite the vehicle. It is often used in computer controlled robots, Atmel/PIC programmers.

Programming can be done with the help of Visual Basics, Visual C and Visual C++. The results

were successful and the controller was able to differentiate between the authentic user and the

false user. The recognition software was able to distinguish high, medium and low quality test

images on the basis of the minutiae extract ion. Logic 1 was transferred on the matched case and

the logic 0 was transferred when the mismatch occurs.

2.3.3 Real Time Biometrics Vehicle Security System with GPS and GSM Technology

Kiruthiga et al. have been discussed about saving the vehicle from theft. This system is literally

to defend the vehicle from any illegal access, easy to use, fast usage; clear, consistently good in

performance and also reasonable fingerprint recognition technique. This development intimates

the position of the vehicle to the authorized user by Global System for Mobile (GSM)

technology. If an authorized person tries to access the vehicle, it is allowed meanwhile if an

unauthorized person tries to access a message will be sent to owner of the vehicle and the engine

will be immobilized. The GPS system is attached to know the position of the vehicle and its

current location. In any cases the vehicle got towed or theft detection the location will be

detected. If an engine is switched off, but the GPS changes significantly a message will send to

the authorized user to alert them. Besides that, PIC16F877a is used as the main platform of the

11
security system which monitors all the input and output of the system. Status of the system will

be displayed on LCD and SMS will be sent to notify the authorized user.

12
CHAPTER THREE

DESIGN AND CONSTRUCTION PROCEDURE

3.0 Methodology

The method used in the construction of this project comprises the use of serial communication

protocol, signal processing, programming the Arduino board with Arduino IDE. In other to

establish the aim of the project these method were combined from the design stage to the

construction and performance results of the system. Using carefully selected materials and

software implementation to drive the complete system as seen in the final construction.

This chapter entails the design procedure of the system detailing the theoretical analysis, choice

of components and values and construction and packaging materials. Indicating calculations,

schematics and drawing.

3.1 Hardware Design Analysis

The circuit consist of DC power supply, RFID Module, Fingerprint Module, Arduino Board,

LCD display and DC motor. Below is the block diagram of the system and explanation of each

of the module.

13
Fig. 3.1 System block diagram

3.1.1 Power Supply Unit

The power supply employed in this project is DC which is obtain from a battery.

A battery is a device that stores electric power in the form of chemical energy. When necessary,

the energy is again released as electric power for DC consumers such as lighting and starter

motors.

3.1.2 The Arduino Nano Board

Arduino is an open-source electronics platform based on easy-to-use hardware and software.

Arduino board are able to read inputs - light on a sensor, a finger on a button, or a Twitter

message - and turn it into an output - activating a motor, turning on an LED, publishing

something online. We can tell the board what to do by sending a set of instructions to the

microcontroller on the board. To do so you use the Arduino programming language (based on

14
Wiring), and the Arduino Software (IDE), based on Processing. Arduino was born at the Ivrea

Interaction Design Institute as an easy tool for fast prototyping, aimed at students without a

background in electronics and programming. As soon as it reached a wider community, the

Arduino board started changing to adapt to new needs and challenges, differentiating its offer

from simple 8-bit boards to products for IoT applications, wearable, 3D printing, and embedded

environments.

Arduino Nano is a small, complete, flexible and breadboard-friendly Microcontroller board,

based on ATmega328p developed by Arduino.cc in Italy in 2008 and contains 30 male I/O

headers, configured in a DIP30 style.

Features of Arduino Nano Board

• Arduino Nano Pinout contains 14 digital pins, 8 analog Pins, 2 Reset Pins & 6 Power

Pins.

• It is programmed using Arduino IDE, which can be downloaded from Arduino Official

site.

• Arduino Nano is simply a smaller version of Arduino UNO, thus both have almost the

same functionalities.

• It comes with an operating voltage of 5V, and the input voltage can vary from 7 to 12V.

15
• Arduino Nano’s maximum current rating is 40mA, so the load attached to its pins

shouldn’t draw current more than that.

• Each of these Digital & Analog Pins is assigned with multiple functions but their main

function is to be configured as Input/Output.

• Arduino Pins are acted as Input Pins when they are interfaced with sensors, but if you are

driving some load then we need to use them as an Output Pin.

• Functions like pinMode() and digitalWrite() are used to control the operations of digital

pins while analogRead() is used to control analog pins.

• The analog pins come with a total resolution of 10-bits which measures the value from 0

to 5V.

• Arduino Nano comes with a crystal oscillator of frequency 16 MHz. It is used to produce

a clock of precise frequency using constant voltage.

• There is one limitation of using Arduino Nano i.e. it doesn’t come with a DC power jack,

which means you cannot supply an external power source through a battery.

• This board doesn’t use standard USB for connection with a computer, instead, it comes

with Type-B Micro USB.

16
• The tiny size and breadboard-friendly nature make this device an ideal choice for most

applications where the size of the electronic components is of great concern.

• Flash memory is 16KB or 32KB that all depends on the Atmega board i.e. Atmega168

comes with 16KB of flash memory while Atmega328 comes with a flash memory of

32KB. Flash memory is used for storing code. The 2KB of memory out of total flash

memory is used for a boot loader.

• The SRAM memory of 2KB is present in Arduino Nano.

• Arduino Nano has an EEPROM memory of 1KB

• It is programmed using Arduino IDE which is an Integrated Development Environment

that runs both offline and online.

• No prior arrangements are required to run the board. All you need is a board, mini USB

cable and Arduino IDE software installed on the computer.

• USB cable is used to transfer the program from the computer to the board.

• No separate burner is required to compile and burn the program as this board comes with

a built-in boot-loader.

17
Fig. 3.2 Arduino Nano Pinout

3.1.3 16*2 LCD Display

The term LCD stands for liquid crystal display. It is one kind of electronic display module used

in an extensive range of applications like various circuits & devices like mobile phones,

calculators, computers, TV sets, etc. These displays are mainly preferred for multi-segment light-

emitting diodes and seven segments. The main benefits of using this module are inexpensive;

simply programmable, animations, and there are no limitations for displaying custom characters,

special and even animations, etc.

18
Fig. 3.3 16×2 LCD Display Pin Diagram

The 16×2 LCD Display pinout explanation is shown below.

• Pin1 (Ground/Source Pin): This is a GND pin of display, used to connect the GND

terminal of the microcontroller unit or power source.

• Pin2 (VCC/Source Pin): This is the voltage supply pin of the display, used to connect

the supply pin of the power source.

• Pin3 (V0/VEE/Control Pin): This pin regulates the difference of the display, used to

connect a changeable POT that can supply 0 to 5V.

19
• Pin4 (Register Select/Control Pin): This pin toggles among command or data register,

used to connect a microcontroller unit pin and obtains either 0 or 1(0 = data mode, and 1

= command mode).

• Pin5 (Read/Write/Control Pin): This pin toggles the display among the read or writes

operation, and it is connected to a microcontroller unit pin to get either 0 or 1 (0 = Write

Operation, and 1 = Read Operation).

• Pin 6 (Enable/Control Pin): This pin should be held high to execute Read/Write

process, and it is connected to the microcontroller unit & constantly held high.

• Pins 7-14 (Data Pins): These pins are used to send data to the display. These pins are

connected in two-wire modes like 4-wire mode and 8-wire mode. In 4-wire mode, only

four pins are connected to the microcontroller unit like 0 to 3, whereas in 8-wire mode,

8pins are connected to microcontroller unit like 0 to 7.

• Pin15 (+ve pin of the LED): This pin is connected to +5V

• Pin 16 (-ve pin of the LED): This pin is connected to GND.

3.1.4 Fingerprint Sensor Module (AS608)

The optical fingerprint scanner takes images of fingerprints and converts them into unique

identifiers. The fingerprint scanner stores up to 128 different fingerprints and is able to store

them and scan to find the correct fingerprint match, all of which is done through the scanner and

Arduino board.

20
Fig. 3.4 AS608 Fingerprint Module Image

Module Characteristics:

• Supply voltage: 3.3V-5V DC

• Working Current: <120mA

• Fingerprint imaging Time: <1.0 seconds

• Image Scan size: 14 * 18 mm

• Safety level: 5

• False Accept Rate (FAR): <0.001% (security level 3)

• False Reject Rate (FRR): <1.0% (security level 3)

21
• Search time: <1.0 seconds (1:500, the mean)

• Communication: UART

• UART baud rates: (9600 * N) bps where N = 1 ~ 12 (default value N = 6, ie 57600bps)

AS608 Optical Fingerprint Sensor Pinout This Module has 4 useful pins:

• V+: Module power supply – 3.3V

• GND: Ground

• TX: Serial Transmitter

• RX: Serial Receiver

3.1.5 RFID Reader and Tag

RFID or Radio Frequency Identification system consists of two main components, a

transponder/tag attached to an object to be identified, and a Transceiver also known as

interrogator/Reader.

A Reader consists of a Radio Frequency module and an antenna which generates high frequency

electromagnetic field. On the other hand, the tag is usually a passive device, meaning it doesn’t

contain a battery. Instead it contains a microchip that stores and processes information, and an

22
antenna to receive and transmit a signal. To read the information encoded on a tag, it is placed in

close proximity to the Reader (does not need to be within direct line-of-sight of the reader). A

Reader generates an electromagnetic field which causes electrons to move through the tag’s

antenna and subsequently power the chip.

The powered chip inside the tag then responds by sending its stored information back to the

reader in the form of another radio signal. This is called backscatter. The backscatter, or change

in the electromagnetic/RF wave, is detected and interpreted by the reader which then sends the

data out to a computer or microcontroller.

RFID TAG

Fig. 3.5: Image of RFID Reader and Tag

The RC522 RFID Reader module used in this project is designed to create a 13.56MHz

electromagnetic field that it uses to communicate with the RFID tags (ISO 14443A standard

tags). The reader can communicate with a microcontroller over a 4-pin Serial Peripheral

23
Interface (SPI) with a maximum data rate of 10Mbps. It also supports communication over I2C

and UART protocols.

The module comes with an interrupt pin. It is handy because instead of constantly asking the

RFID module “is there a card in view yet? “, the module will alert us when a tag comes into its

vicinity.

RC522 RFID Module Pinout

The RC522 module has total 8 pins that interface it to the outside world. The connections are as

follows:

VCC supplies power for the module. This can be anywhere from 2.5 to 3.3 volts. You can

connect it to 3.3V output from your Arduino. Remember connecting it to 5V pin will likely

destroy your module!

RST is an input for Reset and power-down. When this pin goes low, hard power-down is

enabled. This turns off all internal current sinks including the oscillator and the input pins are

disconnected from the outside world. On the rising edge, the module is reset.

GND is the Ground Pin and needs to be connected to GND pin on the Arduino.

IRQ is an interrupt pin that can alert the microcontroller when RFID tag comes into its vicinity.

24
MISO / SCL / Tx Pin acts as Master-In-Slave-Out when SPI interface is enabled, acts as serial

clock when I2C interface is enabled and acts as serial data output when UART interface is

enabled.

MOSI (Master out Slave In) is SPI input to the RC522 module.

SCK (Serial Clock) accepts clock pulses provided by the SPI bus Master i.e. Arduino.

SS / SDA / Rx Pin acts as Signal input when SPI interface is enabled, acts as serial data when

I2C interface is enabled and acts as serial data input when UART interface is enabled. This pin is

usually marked by encasing the pin in a square so it can be used as a reference for identifying the

other pins.

3.2 Algorithm of Fingerprint based car starting system

1. Start

2. Place a finger twice to register fingerprint.

3. If the fingerprint is not well captured go back to number 1

4. If the fingerprint is well captured saved it

5. Print Welcome

6. Place a finger

7. Swap the RFID tag when recognize start the engine

25
8. If the fingerprint not recognize but the RFID is recognize, go back to number 5

9. If the system recognize the RFID and Fingerprint start engine

10. Stop after successful drive

3.3 Flowchart of Fingerprint based car starting system

Fig. 3.6: Flow Chart of the System

26
3.4 Circuit Diagram

Fig. 3.7: Circuit Diagram of the System

3.5 Principle of Operation of the System

The system was powered up by a 7.4V battery which is converted to 5V using LM7805 regulator

so as to meet the supply voltage requirement of the system. When the system start up fingerprint

must first be registered by placing any finger twice on the fingerprint module in which after

successful recognition the fingerprint will be saved on the memory of the Arduino nano. After

then the system is ready for operation but without the use of the RFID tag the system will not

27
give an output which means immediately after the fingerprint the RFID tag must be swap in front

of the RFID reader for the system to gives an output to start the engine. The system must be ON

for a particular user to use his/ her fingerprint on the system because immediately after the

system goes off the fingerprint saved on the memory of the Arduino nano will be wiped and has

to be reconfigure when boot up, this enable multiple user for the system since it is a prototype

and was built for project purpose.

28
CHAPTER FOUR

RESULTS AND DISCUSSION

4.0 Introduction

This chapter gives the actual outcome of the whole project work, starting from how the

construction was done, the testing of the circuit to know if it works, and the result being obtained

from the circuit if it correspond to the actual expectation based on the principle of operation. The

circuit component was firstly placed on a bread board to know the state of the circuit if it will

work as expected, this is done to ensure the working credibility of the design.

The component were carefully selected, laid and arranged on the vero board and then soldered in

place, excess component terminal were cut off with the use of a side cutter, connecting wires

were used as a jumper to link one point to another in the circuit, also the wire were used to link

the switch, variable resistor, dc to dc converter and the battery to the circuit. Finally all the

external component of the circuit were gum to the casing with the use of a 4minute tcm gum.

4.1 Component Listing

Table 1 below depict the list of the component used for the construction of the fingerprint based

car ignition system.

Table 1: List of Component

S/N DESCRIPTION QUANTITY

1. Fingerprint Module 1pcs

2. RFID Module 1pcs

3. 16*2 LCD display 1pcs

4. Arduino nano 1pcs

5. Variable Resistor (5K) 1pcs

29
6. LM 7805 Voltage Regulator 1pcs

7. Switch 1pcs

8. Capacitor 10uF 25V 2pcs

9. USB Female Port 1pcs

10. Li-ion Battery (3.7V) 2pcs

11. DC Motor 1pcs

4.2 Programming the Arduino Nano

The programming of the project was done using arduino IDE (Integrated Development

Environment) which require series of code, set of instruction needed to be writing and burn to

the arduino nano board for the perfect operation of the system as specify

4.2.1 Interfacing AS608 Optical Fingerprint Sensor with Arduino

Step 1: Circuit

The following circuit show how you should connect Arduino to AS608 sensor. Connect wires

accordingly.

30
Step 2: Library

Go to Library manager and search for Fingerprint, install the following library.

Step 3: Enrolling Fingerprint

First, upload the following code to Arduino.

31
The above program is for enrolling fingerprints. With this program you can enroll 127 different

fingerprints. Run the program and open the Serial Monitor. The general process for enrolling a

fingerprint is as follows:

1- Enter Fingerprint ID

Before enrolling any fingerprint, you must first enter its ID. You are allowed to choose the

number 1 to 127. For example, in the image below, we have selected number 3.

2- Place finger on sensor

32
This code is for testing and matching fingerprints. First run the program and then open the

Serial Monitor. At this point, the program waits for a finger to be placed on the sensor for

identification. After placing the finger on the sensor, the phrase “Match” is displayed if the

fingerprint is already stored, and phrase “Not Match” is displayed if fingerprint is not

detected.

4.2.2 Interfacing RFID module with Arduino

Step 1: Circuit

The following circuit show how you should connect Arduino to RFID module. Connect wires

accordingly.

For interfacing the RC522 RFID module with the Arduino, we will be using the SPI

interface.

The VCC and GND pins of the module are connected to the 3.3V and GND pins of Arduino

respectively. The Reset pin is connected to the D9 and SS, MOSI, MISO, and SCK pins are

connected to the D10, D11, D12, and D13 pins of the Arduino respectively. The SS and RST

pins are configurable and can be connected to any other digital pins on the Arduino.

33
Step 2: Library

Go to Library manager and search for RC522 RFID module library and install it.

Once the library is installed, we can test our setup with an example code. For that, open

the DumpInfo example from the MFRC522 library. Here is the example code.

#include <SPI.h>

#include <MFRC522.h>

#define RST_PIN 9 // Configurable, see typical pin layout above

#define SS_PIN 10 // Configurable, see typical pin layout above

MFRC522 mfrc522(SS_PIN, RST_PIN); // Create MFRC522 instance

void setup() {

Serial.begin(115200); // Initialize serial communications with the PC

while (!Serial); // Do nothing if no serial port is opened (added for Arduinos based

on ATMEGA32U4)

SPI.begin(); // Init SPI bus

mfrc522.PCD_Init(); // Init MFRC522

delay(4); // Optional delay. Some board do need more time aft

er init to be ready, see Readme

mfrc522.PCD_DumpVersionToSerial(); // Show details of PCD - MFRC522 Card Rea

der details

34
Serial.println(F("Scan PICC to see UID, SAK, type, and data blocks..."));

void loop() {

// Reset the loop if no new card present on the sensor/reader. This saves the entire process

when idle.

if ( ! mfrc522.PICC_IsNewCardPresent()) {

return;

// Select one of the cards

if ( ! mfrc522.PICC_ReadCardSerial()) {

return;

// Dump debug info about the card; PICC_HaltA() is automatically called

mfrc522.PICC_DumpToSerial(&(mfrc522.uid));

Once it’s compiled and uploaded to the Arduino, open the serial monitor and show any tag near

the RC522 module. When the tag is in the vicinity, the reader will read all the data from the tag

and will dump it into the serial monitor as shown below.

35
The data dump will contain all the details like Card UID, Card SAK, PICC type, and all the

memory maps. The UID or Unique ID is Unique for each tag as the name suggests. If you get

any communication failed error, that’s because our serial baud rate is too slow. Increase the baud

rate to 115200 in the code and it will resolve the issue. Here in the data dump, we can see that

the PICC type is MIFARE 1KB. That means the tag contains a MIFARE chip with a memory of

1KB.

Writing data to the RFID tag

Now that we have dumped the factory data from the tag, let’s see how we can write some data to

the card. For that use the following code.

36
#include <SPI.h> //include the SPI library

#include <MFRC522.h> //include the MFRC522 RFID reader library

#define RST_PIN 9 //reset pin, which can be changed to another digital pin if needed.

#define SS_PIN 10 //SS or the slave select pin, which can be changed to another digital pin if ne

eded.

MFRC522 mfrc522(SS_PIN, RST_PIN); // create a MFRC522 instant.

MFRC522::MIFARE_Key key; //create a MIFARE_Key struct named 'key' to hold the car

d information

byte data1[14] = {"Circuit-Digest"}; //The first data that needs to be written to the tag.

byte data2[12] = {"Jobit-Joseph"}; //The second data that needs to be written to the tag.

byte readbackblock[18]; //Array for reading out a block.

void setup()

Serial.begin(115200); // Initialize serial communications with the PC

SPI.begin(); // Init SPI bus

mfrc522.PCD_Init(); // Init MFRC522 card (in case you wonder what PCD means: proximi

ty coupling device)

Serial.println("Scan a MIFARE Classic card");

for (byte i = 0; i < 6; i++)

37
{

key.keyByte[i] = 0xFF; // Prepare the security key for the read and write operations.

void loop()

// Look for new cards if not found rerun the loop function

if ( ! mfrc522.PICC_IsNewCardPresent()) {

return;

// read from the card if not found rerun the loop function

if ( ! mfrc522.PICC_ReadCardSerial())

return;

Serial.println("card detected. Writing data");

writeBlock(1, data1); //write data1 to the block 1 of the tag

writeBlock(2, data2); //write data2 to the block 2 of the tag

38
Serial.println("reading data from the tag");

readBlock(1, readbackblock); //read block 1

//print data

Serial.print("read block 1: ");

for (int j = 0 ; j < 14 ; j++)

Serial.write (readbackblock[j]);

Serial.println("");

readBlock(2, readbackblock); //read block 2

//print data

Serial.print("read block 2: ");

for (int j = 0 ; j < 12 ; j++)

Serial.write (readbackblock[j]);

Serial.println("");

//mfrc522.PICC_DumpToSerial(&(mfrc522.uid));//uncomment below line if want to see the ent

ire memory dump.

39
}

//Write specific block

int writeBlock(int blockNumber, byte arrayAddress[])

//check if the block number corresponds to data block or triler block, rtuen with error if it's trail

er block.

int largestModulo4Number = blockNumber / 4 * 4;

int trailerBlock = largestModulo4Number + 3; //determine trailer block for the sector

if (blockNumber > 2 && (blockNumber + 1) % 4 == 0) {

Serial.print(blockNumber);

Serial.println(" is a trailer block: Error");

return 2;

//authentication

byte status = mfrc522.PCD_Authenticate(MFRC522::PICC_CMD_MF_AUTH_KEY_A, traile

rBlock, &key, &(mfrc522.uid));

if (status != MFRC522::STATUS_OK) {

Serial.print("Authentication failed: ");

Serial.println(mfrc522.GetStatusCodeName(status));

40
return 3;//return "3" as error message

//writing data to the block

status = mfrc522.MIFARE_Write(blockNumber, arrayAddress, 16);

//status = mfrc522.MIFARE_Write(9, value1Block, 16);

if (status != MFRC522::STATUS_OK) {

Serial.print("Data write failed: ");

Serial.println(mfrc522.GetStatusCodeName(status));

return 4;//return "4" as error message

Serial.print("Data written to block ");

Serial.println(blockNumber);

//Read specific block

int readBlock(int blockNumber, byte arrayAddress[])

int largestModulo4Number = blockNumber / 4 * 4;

int trailerBlock = largestModulo4Number + 3; //determine trailer block for the sector

41
//authentication of the desired block for access

byte status = mfrc522.PCD_Authenticate(MFRC522::PICC_CMD_MF_AUTH_KEY_A, traile

rBlock, &key, &(mfrc522.uid));

if (status != MFRC522::STATUS_OK) {

Serial.print("Authentication failed : ");

Serial.println(mfrc522.GetStatusCodeName(status));

return 3;//return "3" as error message

//reading data from the block

byte buffersize = 18;

status = mfrc522.MIFARE_Read(blockNumber, arrayAddress, &buffersize);//&buffersize is a

pointer to the buffersize variable; MIFARE_Read requires a pointer instead of just a number

if (status != MFRC522::STATUS_OK) {

Serial.print("Data read failed: ");

Serial.println(mfrc522.GetStatusCodeName(status));

return 4;//return "4" as error message

Serial.println("Data read successfully");

42
Once the code is compiled and uploaded, open the serial monitor. Then scan a tag with the

module. The module will write two data to the tag and will read back once it’s written. This data

will be then printed to the serial monitor. See the screenshot below.

4.3 Soldering

This is done by using a 60W soldering iron with smooth, clean and well-timed bit. The circuit on

vero board holds trance relative to the component. The reference are on top of the board, after

soldering the vero board, circuit were scrutinize to ensure that no splashes of solder remain on

the conductor or between the adjacent conductor. The precaution taken during the soldering is as

follows:

43
1. Excess heat was avoided doing soldering because if some components are exposed to

excess heat, it may damage.

2. Care was taken during the soldering to avoid bridging the strip line of the vero board.

3. Magnifying glass was used to confirm if the strip line and component are not lying on

each other and if it is, razor blade must be used to separate the connectivity.

4. It was ensured that excess solder was not applied during soldering to make sure that the

soldering work is neat.

5. It was ensured that connectivity of component were right before finally applying

soldering lead.

4.4 Casing and Packaging

This is one of the essential part of the project which provide a protection for the circuit and it

served as a method of housing the designed circuit for easy movement from one place to another.

The case is made from plastic rubber box which is in form of rectangle. Some component were

arranged to fill the box and some to be on the body, the arduino uno, variable resistor was placed

inside the box while the switch, fingerprint module, RFID module, LCD display and DC to DC

converter were placed on the body of the box.

44
Fig. 4.1: Casing of the Fingerprint based car ignition system.

4.4 Testing of the System

The project works in stages, the first thing that has to be done is to register a fingerprint in the

memory of the arduino, and this is done two times before it can finally registered. The project

works with two authentication, the fingerprint and the RFID. The RFID tag has a unique code

number that has been added to the program burnt on the arduino nano memory which make it

recognize a particular tag for authentication. When the system is powered ON it will request for

fingerprint registration, which will be done two times and after that the system is ready for

operation. The RFID tag is swap first after then the registered finger is placed on the fingerprint

module, and after the recognition of the two authentication the dc motor used to represent the car

engine start running.

The project was designed in a way that fingerprint has to be registered whenever it want to begin

operation so as to enable multiple user for testing sake but if the system is ON and a particular

fingerprint is registered it will not accept third party finger except the registered one.

4.5 Results

The results obtained from the circuit are showed in a tabular form below:

Table 2: Testing Result

Stages System Information

Stage 1 ON Fingerprint base car security using Arduino

and RFID

Stage 2 Fingerprint sensor found Enter desire fingerprint

Stage 3 Placed desire finger Image of the fingerprint taken

Stage 4 Re-put finger Image of the fingerprint taken

45
Stage 5 Done Print match

Stage 6 The RFID tag swap and System DC motor start rotating

registered finger placed on the

fingerprint module

4.6 Project Plate

Plate I: Front side view of project packaging

46
Plate II: Back side view of project packaging

Plate III: Inner view of project packaging

47
CHAPTER FIVE

CONCLUSION AND RECOMMENDATIONS

48
Reverences

https://www.teachmemicro.com/arduino-nano-pinout-diagram/

https://www.theengineeringprojects.com/2018/06/introduction-to-arduino-nano.html

https://www.elprocus.com/lcd-16x2-pin-configuration-and-its-working/

https://electropeak.com/learn/interfacing-fpm10a-as608-optical-fingerprint-reader-sensor-

module-with-arduino/

https://makersportal.com/shop/optical-fingerprint-sensor-as608

https://lastminuteengineers.com/how-rfid-works-rc522-arduino-tutorial/

file:///C:/Users/USER/Downloads/Interfacing%20AS608%20Optical%20Fingerprint%20Sensor

%20Module%20with%20Arduino.pdf

49
(http://auto.howstuffworks.com/ignitionsystem.htm).

(http://www.crimtrac.gov.au/fingerprintanalysis.htm)

(http://www.computer.howstuffworks.com/fingerprintscanner.htm)

(http://www.crimtrac.gov.au/fingerprintanalysis.htm)

(http://www.computer- .howstuffworks.com/fingerprintscanner.htm)

(http://webfealb.fea.aub.edu.lb/dsa/labs/projectv1.1.pdf)

(http://www.crimtrac.gov.au/fingerprintanalysis.htm)

https://www.lifewire.com/understanding-finger-scanners-4150464

http://www.ece.uah.edu/biometric/fingerprint_recognition.htm

[1] Julian Ashbourn, "Biometrics: Advanced Identity Verification, The Complete Guide,"

Springer, London, 2000.

[2] A. Jain, R. Bolle, S. Pankanti, editors, "BIOMETRICS Personal Identification in Networked

Society," Kluwer Academic Press, Boston, 1999.

50
[3] D. Zhang, "AUTOMATED BIOMETRICS Technologies and Systems," Kluwer Academic

Publishers, Boston, 2000.

[4] L. Jain, et al, editors, "Intelligent Biometric Techniques in Fingerprint and Face

Recognition," CRC Press, Boca Raton, 1999.

[5] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "Filterbank-based Fingerprint Matching,"

IEEE Transactions on Image Processing, Vol. 9, No.5, pp. 846-859, May 2000,

http://biometrics.cse.msu.edu/publications.html. Last accessed: 31 July 2001.

[6] A. K. Jain, S. Prabhakar, L. Hong, and S. Pankanti, "FingerCode: A Filterbank for

Fingerprint Representation and Matching", Proc. IEEE Conference on CVPR, Colorado, Vol. 2,

pp. 187-193, June 23-25, 1999, http://biometrics.cse.msu.edu/publications.html. Last accessed:

31 July 2001.

[7] A. Saleh, R. Adhami, "Curvature-based matching approach for automatic fingerprint

identification," Proceedings of the 33rd Southeastern Symposium on System Theory, pp. 171-

175, March 18-20, 2001.

ARPN Journal of Engineering and Applied Sciences, VOL. 14, NO. 23, DECEMBER 2019,

http://www.arpnjournals.org/jeas/research_papers/rp_2019/jeas_1219_8024.pdf.

APA References

Amir Mohammad S. (2019). Interfacing AS608 Optical Fingerprint Sensor Module with

Arduino. ElectroPeak Inc, 2019.

51
https://electropeak.com/learn/interfacing-fpm10a-as608-optical-fingerprint-reader-

sensor- module-with- arduino.

Elprocus article. (2013). An Overview of Arduino Nano Board. Elprocus.

https://www.elprocus.com/an-overview-of-arduino-nano-board/.

Journal of the University of Alabama, Huntsville. (2022). Fingerprint Recognition. UAH.

http://www.ece.uah.edu/biometric/fingerprint_recognition.htm.

I Bamigbade Joshua the M.D of Bright Light Electrical Standard Services wish to apply for a

DSTV Branded Store for my office. All necessary document needed for my application has been

attached to this application letter.

I will be delighted if my request is granted.

52

You might also like