Professional Documents
Culture Documents
FINGERPRINT BASED CAR IGNITION SYSTEM 1 To 4
FINGERPRINT BASED CAR IGNITION SYSTEM 1 To 4
FINGERPRINT BASED CAR IGNITION SYSTEM 1 To 4
INTRODUCTION
Biometric technology is a method that requires the physical presence of the identified
person. It is a new state of art method for security systems. Fingerprint recognition is one of
the most widely used biometric system and also the oldest method. The use of fingerprint
ID goes back to ancient times, although the use of DNA evidence is considered more accurate
today. In ancient Babylonia and China, thumbprints and fingerprints were used on clay tablets
and seals as signatures. The idea that fingerprints might be unique to individual’s dates from the
fourteenth century. In 1686 the physiologist Marcello Malpighi examined fingerprints under a
microscope and noted a series of ridges and loops. In 1823, another physiologist, Jan Purkinje,
The pioneer in fingerprint identification was Sir Francis Galton, an anthropologist by training,
who was the first to show scientifically how fingerprints could be used to identify individuals.
Beginning in the 1880s, Galton (a cousin of Charles Darwin) studied fingerprints to seek out
hereditary traits. He determined through his studies not only that no two fingerprints are exactly
alike, but also that fingerprints remain constant throughout an individual's lifetime. Galton
published a book on his findings in 1892 in which he listed the three most common fingerprint
types: loop, whorl, and arch. These classifications are still used today.
The use of fingerprints as personal code was also in tradition method. Developing a
prototype with biometric system will serve a robust and embedded real time fingerprints-
based ignition systems in vehicle. This project focuses about developing a prototype of
1
vehicle ignition using fingerprint. This system has a potential to avoid the vehicle from being
stolen. This lock security is developed to control the ignition of the vehicle by using
RFID (Radio Frequency Identification and fingerprint. The existing lock at the vehicle is not
highly secured which consist of handle lock and standard switch lock. To overcome this,
there are variety of security lock system that can be added to the vehicle. By creating
this prototype, security level of the vehicle ignition is highly protected and could help to
decrease theft. The main idea of this project is to have RFID sensor to validate the license of
the user and a fingerprint scanner will detect the authorized or an unauthorized user. In the
current era, there is high demand for robust security systems in vehicles. So, the
A vehicle theft is becoming very common nowadays, which is one of the main issues
for a person having car or bike. The conventional method of ignition uses key which can
easily be manipulated and also there is some method that can be used to start a car without key
by cutting some wires in which this make the system not secure enough for owners of vehicle
because the vehicle can be access with or without a key. This system can prevent the vehicles
from being stolen. It is developed to control the ignition of the vehicle through the RFID
Vehicle ignition using fingerprint system is known as security system to prevent vehicle
theft. Vehicle security system depends on sensors that are way too costly and high
2
efficient. This system is developed to cut cost for the technology like only the premium
car makers are imposing this in the market. Thus, developing vehicle ignition using
fingerprint would be efficient and low cost for users who own vehicle to keep secure
their vehicle without any worries. Fingerprints biometric system is cheaper compared to
the rest of the biometrics and there is also high usage among users.
The aim of this project is to construct “Fingerprint Based Car Ignition System using Arduino and
RFID”.
1. To interface Arduino with RFID sensor to validate the license of the user using RFID tag
2. To interface Arduino with Fingerprint sensor to give access to authorize user and to
3. To display the information of the system for either authorize or unauthorized user using
This project focuses on the use of fingerprints for vehicle ignition, as opposed to the
conventional method of using keys. The prototype system could be divided into the
following modules: RFID system for validation, fingerprint analysis software module that
accepts fingerprints images; hardware interface module and the ignition system module.
The fingerprint recognition software enables fingerprints of valid users of the vehicle to
be enrolled in a database. Before any user can ignite the vehicle, his/her fingerprint
3
image is matched against the fingerprints in the database while users with no match in
the database are prevented from igniting the vehicle. Control for the ignition system of
the vehicle is achieved by sending appropriate signals to the parallel port of the computer
and subsequently to the interface control circuit. The developed prototype serves as an
impetus to drive future research, geared towards developing a more robust and embedded
1. The accuracy and working of the fingerprint sensor is affected by skin conditions of
people.
2. It is difficult to capture complete and accurate fingerprint image in some cases based on
3. In the case of RFID sensor a particular RFID tag is attached which if lost the system
cannot be access because the tag serve as validation before fingerprint for authorization.
4
CHAPTER TWO
LITERATURE REVIEW
2.1 Introduction
There is a present demand for robust security systems in vehicles. Therefore, the usefulness of
designing and implementing a biometric security system using fingerprint technology, to prevent
unauthorized vehicle ignition cannot be overemphasized. This chapter review past work
All humans have minute raised ridges of skin on the inside surfaces of their hands and fingers
and on the bottom surfaces of their feet and toes, known as 'friction ridge skin'. The friction
ridges provide a gripping surface in much the same way that the tread pattern of a car tyre does.
Friction ridge skin constitutes the only skin on the body without hairs. Fingerprints are patterns
of ridges and valleys on the surface of the finger. Like everything in the human body, these
ridges form through a combination of genetic and environmental factors. The genetic code in
DNA gives general orders on the way skin should form in a developing fetus, but the specific
way it forms is a result of random events. The exact position of the fetus in the womb at a
particular moment and the exact composition and density of surrounding amniotic fluid decides
how every individual ridge will form. This development process occurs in such a way that, in the
entire course of human history, there is virtually no possibility of the same exact pattern forming
twice. Consequently, fingerprints are a unique marker for every person, even identical twins. No
matter how similar two prints may look at a glance, a trained investigator or suitable software
can pick out clear, defined differences. This is the basic idea of fingerprint analysis, in both
crime investigation and security. The two fundamental principles underlying the use of
5
fingerprints as a means of identifying individuals are: immutability and individuality or
uniqueness.
Immutability: This refers to the permanent and unchanging character of the pattern on each
Finger. Several years accumulated fingerprint study and experience has demonstrated that
friction ridge patterns do not change naturally during the life of a person. This pattern starts
developing in the third month of pregnancy and is fully formed by the fourth month. During a
person's lifetime, the pattern remains the same, apart from changing in size or by accident,
mutilation or skin disease, until death. In fact, the friction ridge patterns will remain after death
Uniqueness: Individuality refers to the uniqueness of ridge details across individuals; the
probability that two fingerprints are alike is about 1 in 1.9x1015. Friction ridge detail forms in a
purely random manner during foetal development in the womb. There is sufficient variability in
the arrangement of minutiae to ensure that no two friction ridge patterns are identical, whether
they are on different fingers of the same person or on the fingers of different people. Although
this is difficult to prove empirically, no two fingerprints have ever been found to be identical in
over a century of the use of fingerprinting. Studies have further shown that while identical twins
share the same DNA profile markers, they can nevertheless be differentiated by their
fingerprints. The patterns of the fingerprints are classified as arch, tented arch, right loop, left
loop and the whorl. Arches are basic type of fingerprints formed by ridges. It enters at one side
and exits at another side. This is the same for the plain arch and also the tented arch. Whorls
contains at least one of the ridge that makes a whole circuit and loops are one or more ridges
entering from one side of the print, re-curving and existing at the same side of the print. After a
fingerprint picture is obtained by the fingerprint reader equipment, this fingerprint must be
6
interpreted. It must be prepared such that read-outs can be effectively thought about and
coordinated against each other. Two sorts of coordinating software exist, which is minutiae
A fingerprint sensor is a type of electronic security system that uses fingerprints for biometric
fingerprints are practically unique, which is why they’re successful at identifying individuals.
It’s not just law enforcement agencies that collect and maintain databases of fingerprints.
Many types of occupations that require professional licensing or certification (e.g. financial
advisors, stockbrokers, real estate agents, teachers, doctors/nurses, security, contractors, etc.)
when having documents notarized. Advancements in technology have been able to incorporate
security feature for mobile devices. Fingerprint scanners are one of the latest in an ever-
growing list pin codes, pattern codes, passwords, face recognition, location detection, iris
scanning, voice recognition, trusted Bluetooth or NFC connection of ways to lock and unlock
7
smartphones. The reason why people use a fingerprint scanner is because many enjoy it for the
security, convenience, and futuristic feel. Fingerprint scanners work by capturing the pattern of
ridges and valleys on a finger. The information is then processed by the device’s pattern
successful match means that an identity has been verified, thereby granting access. The method
1. Capacitive sensor- This is a CMOS reader that uses capacitors and an image is formed
using electrical current. It is more expensive compared to optical readers. The advantage
of using capacitive sensor is that it requires a real fingerprint shape, not only a visual
image. This is the reason for CMOS to be harder to get tricked. It is embedded in a
Silicon chip composed of 2D array of micro capacitor. Between the finger surface and the
Silicon plates, electrical charges are created. Plate’s leads to pattern of distinguished
capacitances are respected with the distance of variation of ridges and valleys.
2. Optical sensor- This are the oldest to come by of capturing the fingerprints and then
then used to detect patterns on the finger’s surface to mark off any marks and ridges. This
8
is done by differentiating the dark and light areas of the captured image. The sensors are
designed to have a specific resolution. If the resolution is higher, the sensor can capture
finer details of your finger. They essentially capture a two-dimensional picture. The
Suprema Realscan G10 is a portable scanner that employs advanced optical technology to
The ignition system of an internal-combustion engine is an important part of the overall engine
system that provides for the timely burning of the fuel mixture within the engine. All
conventional petrol (gasoline) engines require an ignition system. The ignition system is usually
switched on/off through a lock switch, operated with a key or code patch. The ignition system
works in perfect concert with the rest of the engine of a vehicle. The goal is to ignite the fuel at
exactly the right time so that the expanding gases can do the maximum amount of work that in
line with the processes to make the vehicle move. If the ignition system fires at the wrong time,
power will fall and gas consumption and emissions can increase. The part of the ignition system
that first initiates the process of moving a vehicle is the key system in conjunction with the kick
starter. A wire from the battery in the vehicle connects to the kick starter and other wires connect
9
the kick starter to the key system. When the car key in the ignition system is turned once, two
wires coming from the kick starter to the key system are bridged. This causes the engine and
some other parts of the vehicle to be put in a READY or ON state. Turning the key again makes
a third wire to temporarily join the already bridged wires, causing voltage to flow from the
Bhojane and Thorat, briefly discussed about how the car provides ignition to the engine. Literally
this system replaces the key off a vehicle with specific user’s face. In this paper, a facial
recognition system by embedding face detection and face tracking system algorithm found in
MATLAB with the use of Raspberry Pi B is discussed. The purpose of this system to prohibit
vehicles getting steal from thieves. Owners of the vehicles face towards technology as an anti-
robbery system by developing this face recognition system. With the knowledge and applications
of large amount embedded techniques, car security program study and analyses are consistently
processing technique, communication technique thus, have been entire into car security systems.
At the same anticipate, the approach to the cars remains valuable. So, one efficient car security
program should be sensible, competent and reliable. So to prohibit vehicles stealing from thieves,
owners of the automobiles are facing towards technology as an anti-robbery system. In this
paper, use of Haar-like feature is been used to detect and recognize the face of the authenticated
user. This is to achieve the secure environment for ignition and accessing the car a typical
rectangular haar-like feature. Objective of this car ignition system is creating a secure
10
2.3.2 Fingerprint Based Lock System
Omidiora E.O. et al. mainly focuses on the replacement of keys with the biometric specially
fingerprint based lock systems in the vehicles because fingerprints are the oldest and most widely
used form of biometric identification and also provide a robust security mechanism for various
security domains. Their prototype consists of fingerprint software module used to store the
database of the valid users, a hardware unit for interfacing and the ignition system module to
ignite the vehicle. It is often used in computer controlled robots, Atmel/PIC programmers.
Programming can be done with the help of Visual Basics, Visual C and Visual C++. The results
were successful and the controller was able to differentiate between the authentic user and the
false user. The recognition software was able to distinguish high, medium and low quality test
images on the basis of the minutiae extract ion. Logic 1 was transferred on the matched case and
2.3.3 Real Time Biometrics Vehicle Security System with GPS and GSM Technology
Kiruthiga et al. have been discussed about saving the vehicle from theft. This system is literally
to defend the vehicle from any illegal access, easy to use, fast usage; clear, consistently good in
performance and also reasonable fingerprint recognition technique. This development intimates
the position of the vehicle to the authorized user by Global System for Mobile (GSM)
unauthorized person tries to access a message will be sent to owner of the vehicle and the engine
will be immobilized. The GPS system is attached to know the position of the vehicle and its
current location. In any cases the vehicle got towed or theft detection the location will be
detected. If an engine is switched off, but the GPS changes significantly a message will send to
the authorized user to alert them. Besides that, PIC16F877a is used as the main platform of the
11
security system which monitors all the input and output of the system. Status of the system will
be displayed on LCD and SMS will be sent to notify the authorized user.
12
CHAPTER THREE
3.0 Methodology
The method used in the construction of this project comprises the use of serial communication
protocol, signal processing, programming the Arduino board with Arduino IDE. In other to
establish the aim of the project these method were combined from the design stage to the
construction and performance results of the system. Using carefully selected materials and
software implementation to drive the complete system as seen in the final construction.
This chapter entails the design procedure of the system detailing the theoretical analysis, choice
of components and values and construction and packaging materials. Indicating calculations,
The circuit consist of DC power supply, RFID Module, Fingerprint Module, Arduino Board,
LCD display and DC motor. Below is the block diagram of the system and explanation of each
of the module.
13
Fig. 3.1 System block diagram
The power supply employed in this project is DC which is obtain from a battery.
A battery is a device that stores electric power in the form of chemical energy. When necessary,
the energy is again released as electric power for DC consumers such as lighting and starter
motors.
Arduino board are able to read inputs - light on a sensor, a finger on a button, or a Twitter
message - and turn it into an output - activating a motor, turning on an LED, publishing
something online. We can tell the board what to do by sending a set of instructions to the
microcontroller on the board. To do so you use the Arduino programming language (based on
14
Wiring), and the Arduino Software (IDE), based on Processing. Arduino was born at the Ivrea
Interaction Design Institute as an easy tool for fast prototyping, aimed at students without a
Arduino board started changing to adapt to new needs and challenges, differentiating its offer
from simple 8-bit boards to products for IoT applications, wearable, 3D printing, and embedded
environments.
based on ATmega328p developed by Arduino.cc in Italy in 2008 and contains 30 male I/O
• Arduino Nano Pinout contains 14 digital pins, 8 analog Pins, 2 Reset Pins & 6 Power
Pins.
• It is programmed using Arduino IDE, which can be downloaded from Arduino Official
site.
• Arduino Nano is simply a smaller version of Arduino UNO, thus both have almost the
same functionalities.
• It comes with an operating voltage of 5V, and the input voltage can vary from 7 to 12V.
15
• Arduino Nano’s maximum current rating is 40mA, so the load attached to its pins
• Each of these Digital & Analog Pins is assigned with multiple functions but their main
• Arduino Pins are acted as Input Pins when they are interfaced with sensors, but if you are
• Functions like pinMode() and digitalWrite() are used to control the operations of digital
• The analog pins come with a total resolution of 10-bits which measures the value from 0
to 5V.
• Arduino Nano comes with a crystal oscillator of frequency 16 MHz. It is used to produce
• There is one limitation of using Arduino Nano i.e. it doesn’t come with a DC power jack,
which means you cannot supply an external power source through a battery.
• This board doesn’t use standard USB for connection with a computer, instead, it comes
16
• The tiny size and breadboard-friendly nature make this device an ideal choice for most
• Flash memory is 16KB or 32KB that all depends on the Atmega board i.e. Atmega168
comes with 16KB of flash memory while Atmega328 comes with a flash memory of
32KB. Flash memory is used for storing code. The 2KB of memory out of total flash
• No prior arrangements are required to run the board. All you need is a board, mini USB
• USB cable is used to transfer the program from the computer to the board.
• No separate burner is required to compile and burn the program as this board comes with
a built-in boot-loader.
17
Fig. 3.2 Arduino Nano Pinout
The term LCD stands for liquid crystal display. It is one kind of electronic display module used
in an extensive range of applications like various circuits & devices like mobile phones,
calculators, computers, TV sets, etc. These displays are mainly preferred for multi-segment light-
emitting diodes and seven segments. The main benefits of using this module are inexpensive;
simply programmable, animations, and there are no limitations for displaying custom characters,
18
Fig. 3.3 16×2 LCD Display Pin Diagram
• Pin1 (Ground/Source Pin): This is a GND pin of display, used to connect the GND
• Pin2 (VCC/Source Pin): This is the voltage supply pin of the display, used to connect
• Pin3 (V0/VEE/Control Pin): This pin regulates the difference of the display, used to
19
• Pin4 (Register Select/Control Pin): This pin toggles among command or data register,
used to connect a microcontroller unit pin and obtains either 0 or 1(0 = data mode, and 1
= command mode).
• Pin5 (Read/Write/Control Pin): This pin toggles the display among the read or writes
• Pin 6 (Enable/Control Pin): This pin should be held high to execute Read/Write
process, and it is connected to the microcontroller unit & constantly held high.
• Pins 7-14 (Data Pins): These pins are used to send data to the display. These pins are
connected in two-wire modes like 4-wire mode and 8-wire mode. In 4-wire mode, only
four pins are connected to the microcontroller unit like 0 to 3, whereas in 8-wire mode,
The optical fingerprint scanner takes images of fingerprints and converts them into unique
identifiers. The fingerprint scanner stores up to 128 different fingerprints and is able to store
them and scan to find the correct fingerprint match, all of which is done through the scanner and
Arduino board.
20
Fig. 3.4 AS608 Fingerprint Module Image
Module Characteristics:
• Safety level: 5
21
• Search time: <1.0 seconds (1:500, the mean)
• Communication: UART
AS608 Optical Fingerprint Sensor Pinout This Module has 4 useful pins:
• GND: Ground
interrogator/Reader.
A Reader consists of a Radio Frequency module and an antenna which generates high frequency
electromagnetic field. On the other hand, the tag is usually a passive device, meaning it doesn’t
contain a battery. Instead it contains a microchip that stores and processes information, and an
22
antenna to receive and transmit a signal. To read the information encoded on a tag, it is placed in
close proximity to the Reader (does not need to be within direct line-of-sight of the reader). A
Reader generates an electromagnetic field which causes electrons to move through the tag’s
The powered chip inside the tag then responds by sending its stored information back to the
reader in the form of another radio signal. This is called backscatter. The backscatter, or change
in the electromagnetic/RF wave, is detected and interpreted by the reader which then sends the
RFID TAG
The RC522 RFID Reader module used in this project is designed to create a 13.56MHz
electromagnetic field that it uses to communicate with the RFID tags (ISO 14443A standard
tags). The reader can communicate with a microcontroller over a 4-pin Serial Peripheral
23
Interface (SPI) with a maximum data rate of 10Mbps. It also supports communication over I2C
The module comes with an interrupt pin. It is handy because instead of constantly asking the
RFID module “is there a card in view yet? “, the module will alert us when a tag comes into its
vicinity.
The RC522 module has total 8 pins that interface it to the outside world. The connections are as
follows:
VCC supplies power for the module. This can be anywhere from 2.5 to 3.3 volts. You can
connect it to 3.3V output from your Arduino. Remember connecting it to 5V pin will likely
RST is an input for Reset and power-down. When this pin goes low, hard power-down is
enabled. This turns off all internal current sinks including the oscillator and the input pins are
disconnected from the outside world. On the rising edge, the module is reset.
GND is the Ground Pin and needs to be connected to GND pin on the Arduino.
IRQ is an interrupt pin that can alert the microcontroller when RFID tag comes into its vicinity.
24
MISO / SCL / Tx Pin acts as Master-In-Slave-Out when SPI interface is enabled, acts as serial
clock when I2C interface is enabled and acts as serial data output when UART interface is
enabled.
MOSI (Master out Slave In) is SPI input to the RC522 module.
SCK (Serial Clock) accepts clock pulses provided by the SPI bus Master i.e. Arduino.
SS / SDA / Rx Pin acts as Signal input when SPI interface is enabled, acts as serial data when
I2C interface is enabled and acts as serial data input when UART interface is enabled. This pin is
usually marked by encasing the pin in a square so it can be used as a reference for identifying the
other pins.
1. Start
5. Print Welcome
6. Place a finger
25
8. If the fingerprint not recognize but the RFID is recognize, go back to number 5
26
3.4 Circuit Diagram
The system was powered up by a 7.4V battery which is converted to 5V using LM7805 regulator
so as to meet the supply voltage requirement of the system. When the system start up fingerprint
must first be registered by placing any finger twice on the fingerprint module in which after
successful recognition the fingerprint will be saved on the memory of the Arduino nano. After
then the system is ready for operation but without the use of the RFID tag the system will not
27
give an output which means immediately after the fingerprint the RFID tag must be swap in front
of the RFID reader for the system to gives an output to start the engine. The system must be ON
for a particular user to use his/ her fingerprint on the system because immediately after the
system goes off the fingerprint saved on the memory of the Arduino nano will be wiped and has
to be reconfigure when boot up, this enable multiple user for the system since it is a prototype
28
CHAPTER FOUR
4.0 Introduction
This chapter gives the actual outcome of the whole project work, starting from how the
construction was done, the testing of the circuit to know if it works, and the result being obtained
from the circuit if it correspond to the actual expectation based on the principle of operation. The
circuit component was firstly placed on a bread board to know the state of the circuit if it will
work as expected, this is done to ensure the working credibility of the design.
The component were carefully selected, laid and arranged on the vero board and then soldered in
place, excess component terminal were cut off with the use of a side cutter, connecting wires
were used as a jumper to link one point to another in the circuit, also the wire were used to link
the switch, variable resistor, dc to dc converter and the battery to the circuit. Finally all the
external component of the circuit were gum to the casing with the use of a 4minute tcm gum.
Table 1 below depict the list of the component used for the construction of the fingerprint based
29
6. LM 7805 Voltage Regulator 1pcs
7. Switch 1pcs
The programming of the project was done using arduino IDE (Integrated Development
Environment) which require series of code, set of instruction needed to be writing and burn to
the arduino nano board for the perfect operation of the system as specify
Step 1: Circuit
The following circuit show how you should connect Arduino to AS608 sensor. Connect wires
accordingly.
30
Step 2: Library
Go to Library manager and search for Fingerprint, install the following library.
31
The above program is for enrolling fingerprints. With this program you can enroll 127 different
fingerprints. Run the program and open the Serial Monitor. The general process for enrolling a
fingerprint is as follows:
1- Enter Fingerprint ID
Before enrolling any fingerprint, you must first enter its ID. You are allowed to choose the
number 1 to 127. For example, in the image below, we have selected number 3.
32
This code is for testing and matching fingerprints. First run the program and then open the
Serial Monitor. At this point, the program waits for a finger to be placed on the sensor for
identification. After placing the finger on the sensor, the phrase “Match” is displayed if the
fingerprint is already stored, and phrase “Not Match” is displayed if fingerprint is not
detected.
Step 1: Circuit
The following circuit show how you should connect Arduino to RFID module. Connect wires
accordingly.
For interfacing the RC522 RFID module with the Arduino, we will be using the SPI
interface.
The VCC and GND pins of the module are connected to the 3.3V and GND pins of Arduino
respectively. The Reset pin is connected to the D9 and SS, MOSI, MISO, and SCK pins are
connected to the D10, D11, D12, and D13 pins of the Arduino respectively. The SS and RST
pins are configurable and can be connected to any other digital pins on the Arduino.
33
Step 2: Library
Go to Library manager and search for RC522 RFID module library and install it.
Once the library is installed, we can test our setup with an example code. For that, open
the DumpInfo example from the MFRC522 library. Here is the example code.
#include <SPI.h>
#include <MFRC522.h>
void setup() {
while (!Serial); // Do nothing if no serial port is opened (added for Arduinos based
on ATMEGA32U4)
der details
34
Serial.println(F("Scan PICC to see UID, SAK, type, and data blocks..."));
void loop() {
// Reset the loop if no new card present on the sensor/reader. This saves the entire process
when idle.
if ( ! mfrc522.PICC_IsNewCardPresent()) {
return;
if ( ! mfrc522.PICC_ReadCardSerial()) {
return;
mfrc522.PICC_DumpToSerial(&(mfrc522.uid));
Once it’s compiled and uploaded to the Arduino, open the serial monitor and show any tag near
the RC522 module. When the tag is in the vicinity, the reader will read all the data from the tag
35
The data dump will contain all the details like Card UID, Card SAK, PICC type, and all the
memory maps. The UID or Unique ID is Unique for each tag as the name suggests. If you get
any communication failed error, that’s because our serial baud rate is too slow. Increase the baud
rate to 115200 in the code and it will resolve the issue. Here in the data dump, we can see that
the PICC type is MIFARE 1KB. That means the tag contains a MIFARE chip with a memory of
1KB.
Now that we have dumped the factory data from the tag, let’s see how we can write some data to
36
#include <SPI.h> //include the SPI library
#define RST_PIN 9 //reset pin, which can be changed to another digital pin if needed.
#define SS_PIN 10 //SS or the slave select pin, which can be changed to another digital pin if ne
eded.
MFRC522::MIFARE_Key key; //create a MIFARE_Key struct named 'key' to hold the car
d information
byte data1[14] = {"Circuit-Digest"}; //The first data that needs to be written to the tag.
byte data2[12] = {"Jobit-Joseph"}; //The second data that needs to be written to the tag.
void setup()
mfrc522.PCD_Init(); // Init MFRC522 card (in case you wonder what PCD means: proximi
ty coupling device)
37
{
key.keyByte[i] = 0xFF; // Prepare the security key for the read and write operations.
void loop()
// Look for new cards if not found rerun the loop function
if ( ! mfrc522.PICC_IsNewCardPresent()) {
return;
// read from the card if not found rerun the loop function
if ( ! mfrc522.PICC_ReadCardSerial())
return;
38
Serial.println("reading data from the tag");
//print data
Serial.write (readbackblock[j]);
Serial.println("");
//print data
Serial.write (readbackblock[j]);
Serial.println("");
39
}
//check if the block number corresponds to data block or triler block, rtuen with error if it's trail
er block.
Serial.print(blockNumber);
return 2;
//authentication
if (status != MFRC522::STATUS_OK) {
Serial.println(mfrc522.GetStatusCodeName(status));
40
return 3;//return "3" as error message
if (status != MFRC522::STATUS_OK) {
Serial.println(mfrc522.GetStatusCodeName(status));
Serial.println(blockNumber);
41
//authentication of the desired block for access
if (status != MFRC522::STATUS_OK) {
Serial.println(mfrc522.GetStatusCodeName(status));
pointer to the buffersize variable; MIFARE_Read requires a pointer instead of just a number
if (status != MFRC522::STATUS_OK) {
Serial.println(mfrc522.GetStatusCodeName(status));
42
Once the code is compiled and uploaded, open the serial monitor. Then scan a tag with the
module. The module will write two data to the tag and will read back once it’s written. This data
will be then printed to the serial monitor. See the screenshot below.
4.3 Soldering
This is done by using a 60W soldering iron with smooth, clean and well-timed bit. The circuit on
vero board holds trance relative to the component. The reference are on top of the board, after
soldering the vero board, circuit were scrutinize to ensure that no splashes of solder remain on
the conductor or between the adjacent conductor. The precaution taken during the soldering is as
follows:
43
1. Excess heat was avoided doing soldering because if some components are exposed to
2. Care was taken during the soldering to avoid bridging the strip line of the vero board.
3. Magnifying glass was used to confirm if the strip line and component are not lying on
each other and if it is, razor blade must be used to separate the connectivity.
4. It was ensured that excess solder was not applied during soldering to make sure that the
5. It was ensured that connectivity of component were right before finally applying
soldering lead.
This is one of the essential part of the project which provide a protection for the circuit and it
served as a method of housing the designed circuit for easy movement from one place to another.
The case is made from plastic rubber box which is in form of rectangle. Some component were
arranged to fill the box and some to be on the body, the arduino uno, variable resistor was placed
inside the box while the switch, fingerprint module, RFID module, LCD display and DC to DC
44
Fig. 4.1: Casing of the Fingerprint based car ignition system.
The project works in stages, the first thing that has to be done is to register a fingerprint in the
memory of the arduino, and this is done two times before it can finally registered. The project
works with two authentication, the fingerprint and the RFID. The RFID tag has a unique code
number that has been added to the program burnt on the arduino nano memory which make it
recognize a particular tag for authentication. When the system is powered ON it will request for
fingerprint registration, which will be done two times and after that the system is ready for
operation. The RFID tag is swap first after then the registered finger is placed on the fingerprint
module, and after the recognition of the two authentication the dc motor used to represent the car
The project was designed in a way that fingerprint has to be registered whenever it want to begin
operation so as to enable multiple user for testing sake but if the system is ON and a particular
fingerprint is registered it will not accept third party finger except the registered one.
4.5 Results
The results obtained from the circuit are showed in a tabular form below:
and RFID
45
Stage 5 Done Print match
Stage 6 The RFID tag swap and System DC motor start rotating
fingerprint module
46
Plate II: Back side view of project packaging
47
CHAPTER FIVE
48
Reverences
https://www.teachmemicro.com/arduino-nano-pinout-diagram/
https://www.theengineeringprojects.com/2018/06/introduction-to-arduino-nano.html
https://www.elprocus.com/lcd-16x2-pin-configuration-and-its-working/
https://electropeak.com/learn/interfacing-fpm10a-as608-optical-fingerprint-reader-sensor-
module-with-arduino/
https://makersportal.com/shop/optical-fingerprint-sensor-as608
https://lastminuteengineers.com/how-rfid-works-rc522-arduino-tutorial/
file:///C:/Users/USER/Downloads/Interfacing%20AS608%20Optical%20Fingerprint%20Sensor
%20Module%20with%20Arduino.pdf
49
(http://auto.howstuffworks.com/ignitionsystem.htm).
(http://www.crimtrac.gov.au/fingerprintanalysis.htm)
(http://www.computer.howstuffworks.com/fingerprintscanner.htm)
(http://www.crimtrac.gov.au/fingerprintanalysis.htm)
(http://www.computer- .howstuffworks.com/fingerprintscanner.htm)
(http://webfealb.fea.aub.edu.lb/dsa/labs/projectv1.1.pdf)
(http://www.crimtrac.gov.au/fingerprintanalysis.htm)
https://www.lifewire.com/understanding-finger-scanners-4150464
http://www.ece.uah.edu/biometric/fingerprint_recognition.htm
[1] Julian Ashbourn, "Biometrics: Advanced Identity Verification, The Complete Guide,"
50
[3] D. Zhang, "AUTOMATED BIOMETRICS Technologies and Systems," Kluwer Academic
[4] L. Jain, et al, editors, "Intelligent Biometric Techniques in Fingerprint and Face
IEEE Transactions on Image Processing, Vol. 9, No.5, pp. 846-859, May 2000,
Fingerprint Representation and Matching", Proc. IEEE Conference on CVPR, Colorado, Vol. 2,
31 July 2001.
identification," Proceedings of the 33rd Southeastern Symposium on System Theory, pp. 171-
ARPN Journal of Engineering and Applied Sciences, VOL. 14, NO. 23, DECEMBER 2019,
http://www.arpnjournals.org/jeas/research_papers/rp_2019/jeas_1219_8024.pdf.
APA References
Amir Mohammad S. (2019). Interfacing AS608 Optical Fingerprint Sensor Module with
51
https://electropeak.com/learn/interfacing-fpm10a-as608-optical-fingerprint-reader-
https://www.elprocus.com/an-overview-of-arduino-nano-board/.
http://www.ece.uah.edu/biometric/fingerprint_recognition.htm.
I Bamigbade Joshua the M.D of Bright Light Electrical Standard Services wish to apply for a
DSTV Branded Store for my office. All necessary document needed for my application has been
52