Professional Documents
Culture Documents
Development and Implementation of A Biometric Security Lock System New
Development and Implementation of A Biometric Security Lock System New
net/publication/270272469
CITATION READS
1 8,399
3 authors, including:
Some of the authors of this publication are also working on these related projects:
Efficient Topology Discovery Protocol for Software Defined Wireless Sensor Network View project
All content following this page was uploaded by Ebenezer Esenogho on 31 December 2014.
Abstract-In these days of rapid industrial growth the population statistic has it that crime and
social vice are steadily on the increase and it is really regretful. This paper considers and
centres on the development and implementation of a biometric security lock system. The lock
system is controlled by the computer equipped with a finger print reader. The computer
controls the door by accessing the fingerprint of the user if it was formerly registered into its
database. The system on start-up registers all necessary fingerprints and then locks up
controls and thereafter accesses them for identification and opens the door whenever the
fingerprint entered by the user is on the database of registered users. The system consists of
the fingerprint reader to access the user fingerprint connected to the computer.
The computer has a program written with visual basic 6.0 software for accessing the reader
and controlling the door. The computer is connected to the control circuit board consisting of
the microcontroller and transistor-relay switches for controlling power to the motor actuator
to move the door open and close whenever the fingerprint reader reads a registered print. The
door mechanism is controlled by the microcontroller when the controller receives access
signal from the PC.
When the system detects a registered fingerprint it would send signal to the hardware
controller to open the door and if it is not a registered user it would not grant access. The
system on completion of design, construction and tests carried out show the system worked
satisfactorily as fingerprint could be registered and the system could identify registered prints
and open the door and display “WELCOME” to the identified user.
(Keywords: Fingerprint reader, microcontroller, visual basic software version 6.0, PC, motor
actuator)
1. INTRODUCTION
With the industrial revolution that led to the discovery of electricity and a general
improvement in technology in the 19th century (Landes, 1969), following various experiments
coupled with the advent of computers, saw a huge breakthrough in home security. This was
because CCTV (closed-circuit television) systems in conjunction with stationed long focal
length cameras were powered on to view home intruders. Though, this made possible to view
remote ends for any non-confrontational crimes to get the offenders identified but it equally
1
suffers a lot of hiccups as the intruders could get away with the valuable property without
immediate arrest.
Thereafter, most crimes of burglary till date, which are non-confrontational property
crimes, occur when we are not at home. The most common threat to our home is burglary.
So, protection of home and family from criminal hit should be high on our list of priorities.
In correlation to the aforementioned security consciousness, one can emphatically say
that security of homes and properties has been in existence for a long time, but the methods
of applying and achieving it have been changing from time to time. Modern security
approaches greatly rely on the activities of the intruders which may reveal their presence to a
computer-controlled system. First of all, the intruder must enter the building; a door or
window is the most logical means of criminal entry point. Sensors are set to detect use of
these entrances, an alarm can be triggered when intruder passes or interacts with sensor
devices such as microwave detectors, photo-electric beams, glass break detectors, magnetic
field detection, electrostatic- field detectors, microwave barriers systems, ultrasonic sensors,
and even infrared sensors. Most of these techniques are still in use but instant arrest of the
burglars is hardly sometimes possible. The intruder or impostor action is detected through
wrong fingerprint and this could prompt a signal to get to the home owner which possibly
calls for an instant arrest of the burglars. However, the switch is never closed in the presence
of the house occupant or visitor who simply gains access to the door if only his thumb print
matches with that stored in the biometric device.
Before an in-depth discussion on the subject matter, we need to acquaint ourselves with a
brief analysis of the system under review. The report covers home security using biometric
fingerprinting lock, which is a type of biometric device. The term "biometrics" is derived
from the Greek words bio and metric, meaning life and to measure, respectively. Biometrics
can be defined as the science of identifying or verifying individuals based on unique
physiological or behavioural characteristics. Examples of human traits used for biometric
recognition include fingerprints, hand geometry, speech, face, retina, iris, and handwritten
signature (Wittich,2003). Biometrics can also be defined as the use of a person’s unique
physiological, behavioral and morphological characteristic to provide positive personal
identification (Tripathi, 2011). There are two distinct functions for biometric devices:
1. To prove you are who you say you are.
2. To prove you are not who you say you are not. (San Jose State University, 2000).
Biometric identification systems are essentially pattern recognition systems. They use
acquisition devices such as cameras and scanning devices to capture images, recordings, or
measurements of an individual’s characteristics and computer hardware and software to
extract, encode, store, and compare these characteristics (Emuoyibofarhe, 2011).
Identification systems answer the question, “Who am I?” and do not require that a user claim
an identity before biometric comparisons take place. The user provides his or her biometric
data, which is compared to data from a number of users in order to find a match. The answer
returned by the system is an identity such as a name or ID number (Nanavata et al, 2002)
They establish the genuineness of physiological (e.g. face, fingerprint, iris, retina, hand
geometry) and behavioural (e.g. signature, gait) characteristics of a person. Biometric
recognition is an upcoming and promising field with great commercial magnitude. It is an
extremely reliable source identification system as it is based on what we are rather than what
2
we possess. Biometrics technology is without a doubt a more efficient way of authentication
than the more common use of pass words, smart cards, or a combination of the two.
Potentially, the user would not have to remember a password or a series of passwords to
access information. Passwords also have expiration dates that require new assignment of
passwords and more work for technical support staff (Zimmerman, 2003).
2. METHODOLOGY
The methodology employed in this paper work involves
The development of a power circuitry to power the entire system.
Deployment of an intelligent control circuitry which employs the use of a
microcontroller.
Development of a program using visual basic software version 6.0 to respond to the
finger print device for registration, confirmation, identification and verification
procedures to help with the interactive requirements between the user and the
fingerprint machine.
Installation of the software and the drivers for the fingerprint reader used on the
computer.
Connection of the fingerprint reader to the PC.
Tests and expected results.
3. DESIGN ANALYSIS
The block diagram of the biometric security lock system is shown below
Power supply
The design of the biometric lock system would involve the calculation of component
values and their specifications, stage by stage presentation of all individual modules and their
operational principles. The design consists of the following stages/units;
3
• Power supply
• Microcontroller unit
• Actuator/motor drive unit
• Serial port interface unit
𝐶1 = 0.002 F
𝐶1 = 2000µF
Therefore, a capacitor of at least 2000µf and working voltage of 32.5V is needed for
this security device. The one chosen for the design is 35V, 2,200µF.
The capacitor C2 is an optional capacitor but put in place to remove any residual ac
ripples from the supply and the chosen value is 25V, 10µF. This value is comparatively small
because the main residual ac ripple will be removed by the first capacitor C1.
4
To obtain the regulated +5V, an LM7805 voltage regulator is used in the design. The
specification is as shown.
For Battery voltage Vcc = 12V
Regulator voltage = 5V
Load current Ia = 1.48A (www.datasheetcatalog.com)
(𝑉 − 𝑉𝑟𝑒𝑔 )
𝑅1 = 𝑐𝑐 ⁄ = (12 − 5)⁄
𝐼𝑎 1.48 = 4.7Ω
5
The microcontroller uses a crystal oscillator of 4MHz for clocking.
Let the start-up delay time Ts = 0.7R1C1
For a time Ts = 40µs and Cl = l0nF, then;
𝑇 −6
𝑅1 = 𝑠⁄0.7𝐶 = 40 × 10 ⁄0.7 × 10−9
1
R1 = 5.6kΩ.
(𝑉𝑐𝑐 − 𝑉𝑏𝑒 ) (5
Base resistor 𝑅𝐵 = ⁄𝐼 = − 0.7)⁄
𝐵 30 × 10−3 = 14333Ω.
A value of l5kΩ was chosen as the closest standard value.
6
Figure 3: DC Motor-Actuator Drive Circuit
7
Figure 4: Complete Diagram of the Biometric Fingerprint Access System
8
3.5 OPERATIONAL PRLNCIPLE OF THE BIOMETRIC LOCK SYSTEM
The complete circuit diagram of the biometric lock system is presented in figure 4
while figure 5 shows the flowchart of the system. The biometric lock system consists of a
fingerprint reader for capturing the user fingerprint, a computer (PC) for data analysis and
also equipped with the Visual basic software developed for processing the data from the
reader and the microcontroller interface circuit (16F628A) whose function is to communicate
with the PC and to control the door to open or close, based on the instruction from the
computer.
At the first installation of the circuit, the necessary fingerprints are registered by the
user from the PC and the fingerprint reader. After registration, the user is asked to verify the
entry and at the end of registration the system is fully ready for identification. When a user
enters a fingerprint by placing his/her finger on the reader, the computer would immediately
capture the print and compares it to those in its database. If it detects it as one in its database,
it will display ‘welcome’ and grant access to the user.
The access granted is shown by the PC sending a signal to the microcontroller through
the USB to serial converter. The microcontroller then receives the message and opens the
door for every identified user and after 2 seconds, closes the door. The controller opens the
door by sending a control pulse to the transistor Tr1 and Relay RLY1 and sends signal to Tr2
and RLY2 to close the door.
Transformer T1 is a step-down transformer of 220V to 12V dc. Diodes D1 -D4 is for
rectification of a.c. to d.c. voltage and C1 is the filter capacitor. 7805 is a 5V voltage regulator
for supplying a regulated 5V to power the control circuit. Tr1 and Tr2 are transistors for
switching the relays to control power to the door mechanism motor actuator. Tr1 controls
power for opening while Tr2 is for closing of the door.
9
Figure5: Flowchart of the Biometric Security lock System
10
Figure 6: Diagram of the Full Biometric Lock System
4.1 TESTING
The testing was done by connecting the fingerprint reader machine to the PC and
entries were done with sample fingerprint of individuals who volunteered for the tests. They
were all registered and verified.
After verification process the system was tested again by asking all the persons that
were initially registered to touch the fingerprint machine for identification. The results were
noted accordingly.
11
4.3 BILL OF ENGINEERING MEASUREMENT AND EVALUATION
The components and their relative cost are as shown in the table below. The total
would give an estimated total cost of the project work.
5. CONCLUSION
The paper presents the development and implementation of a biometric security lock system
and the usefulness cannot be overemphasized putting into consideration, the fact that it took a
step further to incorporate image processing technology (biometrics). The system was
designed to function as a protection system that can be used at home, offices, cars from
burglars who would want to break in.
12
REFERENCES
1. Emuoyibofarhe O.J., Fajuyigbe O., Emuoyibofarhe O.N, Alamu F.O.; “ A
Framework for the Integration of Biometric Into Nigerian Banking ATM System”.
International Journal of Computer Applications (0975 – 8887) Volume 34– No.4,
November 2011
2. Landes, D. S.; “The Unbound Prometheus: Technological Change and Industrial
Development in Western Europe from 1750 to the Present”. Cambridge, New York:
Press Syndicate of the University of Cambridge, 1969. ISBN 0-521-09418-6.
3. Nanavati, S., Thieme M., Nanavati R.; “Biometrics: Identity Verification in a
Networked World”. New York: John Wiley and Sons, 2002. ISBN 0471-09945-7.
4. San Jose State University; “Biometrics Publication: The functions of Biometric
Identification Devices”; February 2000. Available at
www.engr.sjsu.edu/biometrics/publications_tech.html, visited on 17/04/2013
5. Tripathi K.P.; “A Comparative Study of Biometric Technologies with Reference to
Human Interface”. International Journal of Computer Applications (0975 – 8887)
volume 14– No.5, January 2011
6. Wittich, P.; “Biometrics: Are you the key to security?” SANS Institute InfoSec
Reading Room, October 2003. Available at
http://www.sans.org/reading_room/whitepapers/authentication/biometrics-key-
security_850, visited on 17/04/2013.
7. www.datasheetcatalog.com, visited on 17/04/2013.
8. Zimmerman M.; “Biometrics & User Authentication.” SANS Institute InfoSec
Reading Room, October 2003. Available at
http://www.sans.org/reading_room/whitepapers/authentication/biometrics-user-
authentication_122, visited on 17/04/2013.
13