Professional Documents
Culture Documents
Declaration
We declare that the work titled by Microcontroller Based Security System with Finger print
recognition for BiT entrance Gate which submitted to Bahir Dar institute of technology is an
authentic record of original work will do by Feleke Shetaye, Malefiya Simachew, Zemenu
Yohannes and Zinaw Demeke under the supervision of.
It is approved that this project has been written in compliance with the formatting rules
Acknowledgement
First of all we would like to thank our Almighty God for giving us strength to finish our project
and prepare our document from the beginning up to the end. Next we would like to express our
heartily gratitude to our supervisor Mr.Tewodros Gera who has always been our motivation for
carrying out the project. We would also thank our faculty who gives the chance to know a lot
about theoretical knowledge into practical knowledge by giving the project.
Contents
Declaration ....................................................................................................................................... i
Acknowledgement .......................................................................................................................... ii
Acronyms and Abbreviations ......................................................................................................... v
List of figures ................................................................................................................................. vi
List of tables .................................................................................................................................. vii
Abstract ........................................................................................................................................ viii
Chapter one ..................................................................................................................................... 1
1. Introduction ................................................................................................................................. 1
1.1 Background ........................................................................................................................... 1
1.2 Statement of the problem ...................................................................................................... 4
1.3 Objectives the project ........................................................................................................... 4
1.3.1 General Objectives ......................................................................................................... 4
1.3.2 Specific objective ........................................................................................................... 4
1.4 Methodology ......................................................................................................................... 4
1.5 Significant of the Project ...................................................................................................... 5
1.6 The Scope of this Project ...................................................................................................... 5
Chapter two ..................................................................................................................................... 6
Literature review ............................................................................................................................. 6
Chapter 3 ......................................................................................................................................... 7
3. System Design and Analysis ....................................................................................................... 7
3.1 System Description and Overall Operation .......................................................................... 7
3.1.1 Block diagram of the overall system ............................................................................. 7
3.2 System components and their description............................................................................. 8
3.2.1. Arduino ......................................................................................................................... 8
3.2.2 LCD.............................................................................................................................. 10
3.2.3 Buzzer .......................................................................................................................... 11
3.2.4 DC motor driver (using L293D) .................................................................................. 12
3.2.5 DC servo motor ............................................................................................................ 15
3.2.6 Relay ............................................................................................................................ 16
GND…………………………………Ground
ID…………………………………….Identity document
List of figures
List of tables
Abstract
In this paper, design and implementation of arduino based gate security system with finger print
technology will be presented and analyzed. An arduino with other peripheral devices which
include Light Emitting Diode (LED), Liquid Crystal Display (LCD), Buzzer and figure print
module are responsible for reliable operation of the proposed security system. In addition, a
manual keypad is another way to lock or unlock the system. Biometrics studies commonly
include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification.
Many other modalities are in various stages of development and assessment. Among these
available biometric traits finger Print proves to be one of the best traits providing good mismatch
ratio and also reliable. The present scenario to operate a security is with paper Id. This does not
provide good security to our institution. To provide perfect security to the institution and to make
the work easier, this project is taking help of two different technologies viz. Among the huge
requirements, the one and only one requirement which has a vital importance in our daily life is
“Security”. A Compiler arduino IDE is used to design a program that controls the system along
with maintaining all security functions. The designed program is applied in Proteus Software for
simulation. At last, the results of practical circuit will show the proper functions and also verify
the reliable security within reasonable cost.
Chapter one
1. Introduction
1.1 Background
In the 1890s, an anthropologist named Alphonse Bertillon sought to fix the problem of
identifying convicted criminals and turned biometrics into a distinct field of study. He developed
'Bertillon age', a method of bodily measurement which got named after him. The problem with
identifying repeated offenders was that the criminals often gave different aliases each time they
were arrested. Notes about the ridges, loops, and spirals of fingerprints were first made in 1686
by Marcello Malpighi. However, it was not until 1880 that fingerprints were recognized as a
means of personal identification by Henry Faulds, who also identified a first ever fingerprint.
The first book about fingerprints was published in 1888 by Sir Francis Galton, and was titled
simply Fingerprint. Later, the Henry Classification System was developed in 1901 by Sir Edward
Henry, and today forms the basis for print recognition in most English speaking countries. This
system categorized the ridge patterns into three groups: loops, whorls, and arches. Fingerprinting
was soon introduced in prisons, army and widely used for identification by law enforcement.
Although the main use of prints remains in forensic science and law enforcement, new uses of
fingerprints have been developed. Fingerprinting was soon introduced in prisons, army and
widely used for identification by law enforcement. Although the main use of prints remains in
forensic science and law enforcement, new uses of fingerprints have been developed. Security is
the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable
asset, such as a person, dwelling, community, item, nation, or organization. Also it is
fundamental to reducing poverty, protecting human rights and creating an enabling environment
for development. The concept of security has been broadened beyond traditional notions of
territorial defense to include the safety and well-being of people and their freedom from fear.
The general trend of human nature is always longing for security physically, mentally and
socially. Fingerprint based security access control and time attendance systems are used for all
kinds of office and service sector operations in the day today environment. Fingerprint System
based access control is more secured as compared to the conventional swipe card or ID cards
because of the exclusive fingerprint for every entity. Fingerprint Security Systems have
fascinated people for centuries. They have been used as a method of personal identification since
ancient times. The two key aspects of most of the Fingerprint System biometric solutions are
Finger Print identification and authentication. The process of identification tells you who an
individual is, or in the negative sense tells you who they are not. Fingerprints Security is
examined using two different sets of criteria. One way of looking at Fingerprint Security System
is using their "Class Characteristics. Fingerprint System Authentication is a simpler process. It
involves affirming or rejecting a claimed identity by matching a live template with an existing
one. Most of these identification/ authentications are done by using Smart Card. The large
growth of ID - Card based Fingerprint system security is wildly used in Public service
applications. These cards are used for multiple purpose applications such as Digital parking
meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity,
Personal Identification Verification Number etc. Another kind of Fingerprint System is the
scanner using ultrasound. The process involves high frequency sound to identify a fingerprint.
An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt
on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature
differences used for a variety of security and data-collection purposes, from identifying prisoners
to allowing access to information or high-security areas. A security is a financial instrument that
represents an ownership position in a publicly-traded corporation (stock),a creditor relationship
with governmental body or a corporation (bond), or rights to ownership as represented by an
option. A security is a fungible, negotiable financial instrument that represents some type of
financial value. The company or entity that issues the security is known as the issuer. Insecurity
and crime constitute some of the major problems facing our immediate society today .People live
with fear of being attacked by burglars, vandals and thieves. Despite all the effort, resources and
time that has been devoted to the development of tools that will reduce crime rates and make the
world a safer place to live, these problems are still on the increase. These gave rise to the need
for an increasing development in the technology of alarm systems which utilizes various
principles such as infrared motion detection, light (photo) sensitive electronic devices and so on.
Even with the introduction of these finger print based security systems which have reduced
greatly the level of insecurity, there is still a problem of false ID card which needs to be
minimized. In order to effectively reduce the level of insecurity and avoid false ID cards which
can create unnecessary unrest, a touch activated and finger print based security system is
required. the most important application of accurate personal identification is securing limited
2 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016
access systems from malicious attacks. Among all the presently employed finger print
techniques, fingerprint identification systems have received the most attention due to the long
history of fingerprints and their extensive use in forensics. This paper deals with the issue of
selection of an optimal algorithm for fingerprint matching in order to design a system that
matches required specifications in performance and accuracy. A number of portable fingerprint
scanners were developed mainly by computer companies to provide a secure access for the users.
In 1998, Compaq was the first to have a print reader attached to the computer. Currently, there
are multiple systems for use with desktop and laptop computers in the form of PC cards and
biometric mice. A portable print reader used for computer security employs a tiny digital camera
to take a picture of a print and convert it into a map that is subsequently stored in the computer
and cannot be duplicated. Commercial fingerprint identification systems were introduced over 15
years ago. They are now used in security applications to gain access to a building or areas within
the building, or computers or network access. Some companies, police offices, and high-security
government buildings require fingerprint identification for access to the building or its selected
parts. Today, fingerprint analysis technology is the most wide-spread biometric method of
identification and authentication for forensic and security purposes. A Fingerprint, as the name
suggests is the print or the impression made by our finger because of the patterns formed on the
skin of our palms and fingers. It is fully formed at about seven months of fetus development and
finger ridge configurations do not change throughout the life of an individual. Each of our ten
fingerprints is different from one another and from those of every other person. Even identical
twins have unique finger-prints. That makes them ideal for personal identification. With age,
these marks get prominent but the pattern and the structures present in those fine lines do not
undergo any change. For their permanence and unique nature, they have been used for not only
in identification but also in the field of security as criminal and forensic investigation for a long
time. Every fingerprint consists ridges and furrows where the ridges are thick lines while the
furrows are space between two ridges. But we can‟t distinguish the fingerprints of two persons
on the basis of ridges and furrows because it has some similarities between the fingerprints of
different persons. Authentication plays a very critical role in security-related applications like e-
commerce. There are a number of methods and techniques for accomplishing this key process. In
this regard, fingerprint is gaining increasing attention these days. Security systems, having
realized the value of fingerprint, use fingerprints for two basic purposes: to verify or identify
3 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016
users. There is a number of fingerprints and different applications need different fingerprints.
Fingerprint is the most secure and convenient authentication tool. It cannot be borrowed, stolen,
or forgotten and forging one is practically impossible. Fingerprint measure individual's unique
physical or behavioral characteristics to recognize or authenticate their identity. Common
physical biometrics includes fingerprints, hand or palm geometry, retina, iris, and facial
characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern,
and gait.
1.2 Statement of the problem
In Bihar Dar institute of technology (BiT) there are three gates for entrance so it needs many
workers to keep security of the compound by hiring with a lot of capital. But everyone can enter
in to the campus by cheating the guard with showing similar ID cards. Consequently, many
laptops and other materials were stolen by these persons. In addition to this a student and worker
has no ID card, the guard prohibit these person to enter causes a conflict between them.
Especially, in exam week many students leave out the campus without ID and they made
controversy by putting their ID in the library.
1.3 Objectives the project
Chapter two
Literature review
An adaptive pore model for finger print pore extraction by Qi Jun Zhao et al[1]. This project
proposes sweat pores have been recently employed for automated fingerprint recognition, in
which the pores are usually extracted by using a computationally expensive skeletonization
method or a unitary scale isotropic pore model
Image extraction and accurate skin detection from web pages by Moheb R. et al.[4]. This paper
proposes a system to extract images from web pages and then detect the skin color regions of
these images.
Fingerprint verification system using minutiae extraction technique by Manvjeet Kaur et al. [5].
Most fingerprint recognition techniques are based on minutiae matching and have been well
studied. However, this technology still suffers from problems associated with the handling of
poor quality impressions. One problem besetting fingerprint matching is distortion. Distortion
changes both geometric position and orientation, and leads to difficulties in establishing a match
among multiple impressions acquired from the same fingertip. Marking all the minutiae
accurately as well as rejecting false minutiae is another issue still under research.
Online fingerprint identification with a fast and distortion tolerant hashing method by Hoi Le et
al. [6]. National ID card, electronic commerce, and access to computer networks are some
scenarios where reliable identification is a must. Existing authentication systems relying on
knowledge-based approaches like passwords or token-based such as magnetic cards and
passports contain serious security risks due to the vulnerability to engineering-social attacks
and the easiness of sharing or compromising passwords and PINs. Biometrics such as
fingerprint, face, eye retina, and voice offer a more reliable means for authentication.
However, due to large biometric database and complicated biometric measures, it is difficult to
design both an accurate and fast biometric recognition.
Edge detection algorithm for fingerprint images by Wei Cui et al[7]. This paper introduces some
edge detection operators and compares their characteristics and performances.
These and similar works inspire us and we try to develop and apply such system security for our
country in order to increase sedentary life.
Chapter 3
3. System Design and Analysis
3.1 System Description and Overall Operation
Finger print
sensor
LCD
Relay
Motor Driver
Arduino
Servo Motor
Buzzer/Siren
Computer Interface
Keypad
in the Arduino IDE), and the ability to have the Uno show up as a keyboard, mouse, joystick, etc.
The Uno R3 also adds SDA and SCL pins next to the AREF. In addition, there are two new pins
placed near the RESET pin. One is the IOREF that allow the shields to adapt to the voltage
provided from the board. The other is a not connected and is reserved for future purposes. The
Uno R3 works with all existing shields but can adapt to new shields which use these additional
pins. The Arduino Uno R3 requires the Arduino 1.0 drivers folder in order to install properly on
some computers. We have tested and confirmed that the R3 can be programmed in older versions
of the IDE. However, the first time using the R3 on a new computer, we will need to have
Arduino 1.0 installed on that machine.
Specification
Microcontroller ATmega328P
Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limit) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM output)
PWM Digital I/O Pins 6
Analog Input Pins 6
DC Current per I/O Pin 20 mA
DC Current for 3.3V Pin 50 mA
32 KB (ATmega328P)
Flash Memory
of which 0.5 KB used by bootloader
SRAM 2 KB (ATmega328P)
EEPROM 1 KB (ATmega328P)
Clock Speed 16 MHz
Length 68.6 mm
Width 53.4Mm
3.2.2 LCD
An LCD (Liquid Crystal Display) basically works on the concept of Light Polarization of
a „Liquid Crystal‟ under the influence of an Electric Field. Every LCD contains a Back-
Light behind the Liquid Crystal array, which acts as a lig An LCD (Liquid Crystal Display)
basically works on the concept of Light Polarization of a ‘Liquid Crystal‟ under the influence of
an Electric Field. Every LCD contains a Back-Light behind the Liquid Crystal array, which acts
as a light source. When an Electric Field is applied across certain fluids, it changes the way
they allow light to pass through them, that is, it changes the orientation of the liquid
crystal molecules as a result they do not allow light to pass through them. Hence, by applying
suitable potential difference, we can control if light passes or doesn‟t pass through the LCD
pixels. LCD 16×2 can be interfaced in two different modes
4-bit mode
In 4-bit mode pins from 11 to 14 (total 4 pins) are connected to four I/O pins of microcontroller.
Hence for this interface we need only four I/O pins. The main reason to operate in 4-bit mode is
to save four I/O pins. There is one more way we can interface this LCD by using shift register,
which is normally called three wire interfaces. In future we are going to add that tutorial on
embedded site source. When an Electric Field is applied across certain fluids, it changes the way
they allow light to pass through them, that is, it changes the orientation of the liquid
crystal molecules as a result they do not allow light to pass through them. Hence, by applying
suitable potential difference, we can control if light passes or doesn‟t pass through the LCD
pixels. LCD 16×2 can be interfaced in two different modes: In 4-bit mode pins from 11 to 14
(total 4 pins) are connected to four I/O pins of microcontroller. Hence for this interface we need
only four I/O pins. The main reason to operate in 4-bit mode is to save four I/O pins. There is
one more way we can interface this LCD by using shift register, which is normally called three
wire interfaces. In future we are going to add that tutorial on embedded site.
Table 3. 1 LCD pin and their description
3.2.3 Buzzer
A buzzer or beeper is a signalling device, usually electronic, typically used in automobiles,
household appliances such as a microwave oven, or game shows. It most commonly consists of a
number of switches or sensors connected to a control unit that determines if and which button
was pushed or a preset time has lapsed, and usually illuminates a light on the appropriate button
or control panel, and sounds a warning in the form of a continuous or intermittent buzzing or
beeping sound. Initially this device was based on an electromechanical system which was
11 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016
identical to an electric bell without the metal gong (which makes the ringing noise). Often these
units were anchored to a wall or ceiling and used the ceiling or wall as a sounding board.
Another implementation with some AC-connected devices was to implement a circuit to make
the AC current into a noise loud enough to drive a loudspeaker and hook this circuit up to a
cheap 8-ohm speaker. Nowadays, it is more popular to use a ceramic-based piezoelectric sounder
like a Sonalert which makes a high-pitched tone. Usually these were hooked up to "driver"
circuits which varied the pitch of the sound or pulsed the sound on and off.
3.2.4 DC motor driver (using L293D)
In this article, i will tell about running motor with help of L293D IC. Before we start, let‟s have a
recall about H Bridge. An H bridge is an electronic circuit that enables a voltage to be applied
across a load in either direction. These circuits are often used in robotics and other applications
to allow DC motors to run forwards and backwards.
directions. The motor operations of two motors can be controlled by input logic at pins 2 & 7 and
10 & 15. We cannot connect motors to Controller as mostly motors runs on voltage higher than
+5V, and motors demands high current (depends). The solutions to these limitations are use of
an “H Bridge” It is a circuit which allows motor rotation in both directions. From four
terminals of H Bridge we can control a DC motor.
This L293D driver motor it will control four DC motors at one time but with fix direction of
motion. L293D has output current of 600mA and peak output current of 1.2A per channel.
Moreover for protection of circuit from back EMF output diode are included within the L293D.
The output supply hitch is external supply has a wide range from 4.5V to 36V which has made
L293D a best choice for DC motor driver. A simple schematic for interfacing a DC gear motor
using L293D driver motor is shown with truth table for this circuit.
Circuit of L293D on breadboard is usually made for testing the circuit, but it‟s not recommended
because L293D usually involves high current and bread board can have loose connections. This
leads to heat and sparks sometime. Here we can see that both PIC and L293D circuit are made on
bread board and both the channels are tested by LEDs too.
3.2.5 DC servo motor
The device that converts electrical energy into mechanical energy is called a motor. The motor
that utilizes a DC supply to produce mechanical output is DC Motor. The advantages of using
these types of motors over conventionally used AC motors are that, DC motors have
higher controller efficiency, DC motors have typical 98% efficiency, DC motors have better
overload and peak voltage characteristics and also the main advantage of using these DC motors
is that the speed torque characteristics can be varied to almost any useful form. As a result of all
these advantages these motors have a wide range of applications in places where constant speed
is to be maintained at varying loads. Conveyor belts, elevators, cranes, ski lifts, extruders,
mixers, sewing machines are few such applications where DC motors are used
Servo motors do not rotate freely like a standard DC motor. Instead the angle of rotation is
limited to 180 Degrees (or so) back and forth. Servo motors receive a control signal that
represents an output position and applies power to the DC motor until the shaft turns to the
correct position, determined by the position sensor. PWM is used for the control signal of servo
motors. However, unlike DC motors it‟s the duration of the positive pulse that determines the
position, rather than speed, of the servo shaft. A neutral pulse value dependent on the servo
(usually around 1.5ms) keeps the servo shaft in the center position. Increasing that pulse value
will make the servo turn clockwise, and a shorter pulse will turn the shaft anticlockwise. The
servo control pulse is usually repeated every 20 milliseconds, essentially telling the servo where
to go, even if that means remaining in the same position. When a servo is commanded to move,
it will move to the position and hold that position, even if external force pushes against it. The
servo will resist from moving out of that position, with the maximum amount of resistive force
the servo can exert being the torque rating of that servo.
3.2.6 Relay
A relay is an electrically operated switch. Many relays use an electromagnet to mechanically
operate a switch, but other operating principles are also used, such as solid-state relays. Relays
are used where it is necessary to control a circuit by a low-power signal (with complete electrical
isolation between control and controlled circuits), or where several circuits must be controlled by
one signal. The first relays were used in long distance telegraph circuits as amplifiers: they
repeated the signal coming in from one circuit and re-transmitted it on another circuit. Relays
were used extensively in telephone exchanges and early computers to perform logical operations.
A type of relay that can handle the high power required to directly control an electric motor or
other loads is called a contactor. Solid-state relays control power circuits with no moving parts,
instead using a semiconductor device to perform switching. Relays with calibrated operating
characteristics and sometimes multiple operating coils are used to protect electrical circuits from
overload or faults; in modern electric power systems these functions are performed by digital
instruments still called "protective relays"
Application of relays
Relays are used wherever it is necessary to control a high power or high voltage circuit with a
low power circuit, especially when galvanic isolation is desirable. The first application of relays
was in long telegraph lines, where the weak signal received at an intermediate station could
control a contact, regenerating the signal for further transmission. High-voltage or high-current
devices can be controlled with small, low voltage wiring and pilots switches. Operators can be
isolated from the high voltage circuit. Low power devices such as microprocessors can drive
relays to control electrical loads beyond their direct drive capability. In an automobile, a starter
relay allows the high current of the cranking motor to be controlled with small wiring and
contacts in the ignition key.
3.2.7 Fingerprint sensor
We will use R305 Finger Print Sensor. It has an Optical biometric fingerprint reader. It also has
inbuilt flash memory. It performs the function of image processing and gives out data on its
output pin.
3.1.8 Keypad
Keypad is a widely used input device with lots of application in our everyday life. From a simple
telephone to keyboard of a computer, ATM, electronic lock, etc., keypad is used to take input
from the user for further processing. In this article we are interfacing keypad with the
displaying the corresponding number on LCD. This module can be further used in a number of
systems to interfaced keypad with arduino and other processors to get desired output. The
program to interface keypad with controller is written in language which is very easy to
understand.
User will enter various commands using the keypad. Various keys of keypad are as following
Add fingerprint entry
Search fingerprint
Empty the database of fingerprint module
3.3 Fingerprint Recognition
The Fingerprint Recognition is a process of determining whether two sets of fingerprint
ridge detail are from the same person. There are multiple approaches that are used in many
different ways for fingerprint recognition which are minutiae, correlation, ridge pattern. These
types of approaches can be broadly categorized as minutiae based or texture based. The main
modules of a fingerprint verification system are:
Fingerprint matching remains as a challenging pattern recognition problem due to the difficulty
in matching fingerprints affected by one or several of the mentioned factors. Conventional
security systems used either knowledge based methods (passwords or PIN), and token-based
methods (passport, driver license, ID card) and were prone to fraud because PIN numbers could
be forgotten or hacked and the tokens could be lost, duplicated or stolen. To address the need for
robust, reliable, and foolproof personal identification, authentication systems will necessarily
require a biometric component.
Finger print analysis
Fingerprints are the patterns on the inside and the tips of fingers. The ridges of skin, also known
as friction ridges, together with the valleys between them form unique patterns on the fingers.
Fingerprint analysis is a biometric technique comparing scanned image of prints with a database
of fingerprints. Uniqueness of prints, and the fact that they do not change during a person's life,
form the basis for fingerprint analysis. The uniqueness of the prints is determined by the minute
.changes in local environment during fetal development; therefore, the identical twins
undistinguishable by genes analysis can be differentiated with fingerprint analysis. Although the
fingerprint pattern remains the same, growth accounts for an enlargement of the patterns. We are
going to represent an example of this fingerprint based security system for the security like
university entrance gate security of a BiT an authorized person to enter into the dormitory
because an un authorized person may enter by easily manipulating the security guard or any
other manual security system. For entering, a person can scan their finger on the fingerprint
sensor module at the important entry place of the entrance gate in perfect manner. If their
fingerprint matched with the fingerprints of the database which has made for entrance gate
authorized person, then the person can enter otherwise they will be denied. The matching process
of the fingerprint of a person to the database is done automatically using biometric architecture.
Detection of fingerprints
Presence of pores on the surface of the ridges of the fingers results in the accumulation of
perspiration on the fingertips. This moisture remains on the surface of the object a person
touches, leaving prints. Depending on the surface touched, prints can be visible to the naked eye
(e.g. metal, glass or plastic) or invisible (paper, cardboard or timber). Prints left on non-porous
surfaces such as metal can be visualized with powders and lifted with tape. In contrast, the prints
on porous objects require special lighting, such as lasers or x rays. There are two major methods
of the identification of fingerprints-comparison of lifted prints and live scanning. The first
method is mainly used in forensics, while the second is used for authentication purposes (in
security applications) and is also slowly becoming a method for identification at some police
stations.
Analysis and classification of fingerprints
Ridges present on the fingers are classified based on the patterns they form. The most important
features are ridge endings and bifurcations (separation of a ridge into two). These features are
called minutiae and form the basis for further classification and identification. Based on the
forms created by the minutiae (loops, whorls, etc.) fingerprints are further sub-classified into
many more distinct patterns. Modern fingerprint analysis uses computer algorithms to determine
the similarity between a print and images stored in a database. Analysis is usually performed on
multiple levels. First, the algorithms are compared to the prints on the coarse level to identify a
type of a print, and then subsequently to identify more and more details until a match is found.
The computer analysis of prints compares ridges, bifurcations and their relative location.
Fingerprint analysis software and scanners identify a set number of similarity points, this number
being determined by the software used, typically up to 90 points are compared. After
identification of a set number of features, a template of the scanned print is formed and this is
subsequently compared to the templates stored in the computer to determine if the print has a
match. Although limiting the characteristics to be compared speeds up the matching process, it
can also affect the accuracy if inadequate numbers are compared. Accuracy also depends on the
application for which the fingerprint analysis is used. Scanners have comparison algorithms and
a number of recognizable characteristics programmed in, together with the prints of the users
(enrolment) to provide the templates for comparison. The FBI fingerprint system is over 98%
accurate, while the authentication systems accept only 97% of authorized users. Among some of
the reasons for the rejection are: scars, calluses, cracks, dirt, or excess fingernail length.
Fingerprint analysis tools
Two types of fingerprint scanners are normally used optical scanners and capacitance scanners.
Optical scanners identify the print using light; depending on the brightness of the reflected light,
optical scanners depict ridges as dark and valleys as light. Capacitance scanners determine the
print by using an electrical current. Valleys and ridges on the fingers produce different voltage
output, allowing for discrimination between them.
As sophisticated they are, the existing scanners are not totally immune to fraud. Optical scanners
can be fooled by a picture, whereas the capacitance scanners can be fooled by a mold of a finger.
Some scanners also have temperature and pulse sensors, but they are still vulnerable to molds
placed over real fingers.A number of portable fingerprint scanners were developed mainly by
computer companies to provide a secure access for the users. In 1998, Compaq was the first to
have a print reader attached to the computer. Currently, there are multiple systems for use with
desktop and laptop computers in the form of PC cards and biometric mice. A portable print
reader used for computer security employs a tiny digital camera to take a picture of a print and
convert it into a map that is subsequently stored in the computer and cannot be duplicated.
Commercial fingerprint identification systems were introduced over 15 years ago. They are now
used in security applications to gain access to a building or areas within the building, or
computers or network access. Some companies, police offices, and high-security government
buildings require fingerprint identification for access to the building or its selected parts. Today,
fingerprint analysis technology is the most wide-spread biometric method of identification and
authentication for forensic and security purposes.
Fingerprint identification
Fingerprints are made of a series of ridges and furrows on the surface of the finger and have a
core around which patterns like swirls, loops, or arches are curved to ensure that each print is
unique. An arch is a pattern where the ridges enter from one side of the finger, rise in the center
forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges
enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In
the whorl pattern, ridges form circularly around a central point on the finger. The ridges and
furrows are characterized by irregularities known as minutiae, the distinctive feature upon which
finger scanning technologies are based. Minutiae points are local ridge characteristics that occur
at either a ridge bifurcation or a ridge ending. The ridge ending is the point at which a ridge
terminates. Bifurcations are points at which a single ridge splits into two ridges. Minutiae and
patterns are very important in the analysis of fingerprints since no two fingers have been shown
to be identical.
2. Image Processing
4. Template Creation
5. Template Matching
A sensor takes a mathematical snapshot of the user's unique pattern, which is then saved in a
fingerprint database. A fingerprint enhancement algorithm (that uses Gabor filters as band-pass
filters to remove the noise and preserve true ridge/valley structures) is included in the minutiae
extraction module to ensure that the performance of the system is not affected by variations in
quality of fingerprint images.
Figure 3.8 The noisy fingerprint image, output of the enhancement module and the final
binary image.
Optimal positioning of finger
In order to ensure proper functioning of the fingerprint reader, the finger must be correctly laid
on during both teaching-in and subsequent operation. It is important that the finger area with the
greatest fingerprint movement (middle of fingertip) is registered by the fingerprint
Fingerprint reader
The fingerprint reader provides fingerprint based on the biometric features of the human finger.
Using high frequency technology, it evaluates the structures of the deepest layers of skin on the
finger. The sensor can detect signs of life in the human finger. The fingerprint reader can be used
as a stand-alone function, e.g. at individual doors or gates. The fingers are constantly checked in
the fingerprint reader and are saved as necessary references again. This is especially important
for the fingers of children, which change over time and so must be continually updated in
memory .Different fingers can be assigned to the two integrated zero-voltage two-way switch
relays. This makes it possible to carry out different switching processes, e.g. index fingers for
door opening and thumbs for switching the outside light. The fingers can be taught-in via direct
configuration at the device without a PC and without programming software.
3.4 Overall operation of the system
The block diagram consists of various blocks as shown in Figure 3.1. When fingerprint module
is interfaced to the microcontroller, it will be in user mode. In this mode, stored images will be
verified with the scanned images. When coming to our application the images of the person‟s
fingerprint that are authorized to open the locker door will be stored in the module with a unique
id. To prove that the persons are authorized to open the locker door they need to scan their
fingerprint images. The scanner is interfaced to arduino Uno, this controller will be controlling
the scanning process. After the scanning has been completed, user has to enter the password to
open the door with the help of a keypad. Immediately the door will be opened. After the work
has been completed if key is pressed again with help of keypad the door will be closed again. If
an unauthorized person tries to scan his fingerprint image then an indication will be given by a
buzzer which is interfaced to the controller and also if wrong password is entered by the user
again indication will be given by the buzzer. The current user instead of him/her can make a new
person as the user of the same locker by new registration process and the old user‟s fingerprint
image will be deleted. Option for changing the password is also available.
Connections for arduino based door opener circuit are shown in the above diagram. Here a PIR
sensor is used for sensing human motion which has three terminals Vcc, GND and Dout. Dout is
directly connected to pin number 14 (A0) of arduino uno. A 16x2 LCD is used for displaying the
status. RS, EN pins of LCD connected to 13 and 12 of arduino and data pins D0-D7 are
connected to arduino digital pin numbers 11, 10, 9, 8. RW is directly connected to ground.
L293D motor driver is connected to arduino pin 0 and 1 for opening and closing the gate. Here in
circuit we have used a motor for gate.
The system is designed with the analysis of the material components characteristics, working
principle and their specification.
1. Arduino uno
2. 16x2 LCD
3. L293D motor driver
4. Servo motor
5. 1k resistor
6. Push button
7. Connecting wire
8. Power supply
Software requirement
1. Arduino IDE 1.0 compiler
2. Protues 8.1 professional
to delete the old user's fingerprint image, third is change password option to change the
current password, and fourth one is the cancel option to get back to main note. If option one is
selected it scans new finger and stores it and goes back to main note, else if option two is
selected it asks the id to be deleted after deletion is successful it goes back to the main note,
else if option three is selected it asks for old password then for new password after
entering passwords it goes back to main note, else last option is cancel if it is selected it
directly goes to main note
Start
Welcome note
Scan your finger
no
If fingerprint
matches Buzzer
Yes
1. Open door
2.modify user
No
If Password2 Door opening
No
Press any key
No Else if2
Password7
Options
1. new
2.delet
3.change password
4.cancel
No
Yes
Else if Old password new passwod
passw
No
Else 4 Cancel
Yes
Stop
Figure 3.10 Flow chart for the arduino program
Source code
#define Push_button 14
#define m11 0
#define m12 1
void setup()
lcd.begin(16, 2);
pinMode(m11, OUTPUT);
pinMode(m12, OUTPUT);
pinMode(Push_button, INPUT);
lcd.setCursor(0,1);
delay(3000);
lcd.clear();
void loop()
if(digitalRead(Push_button))
lcd.setCursor(0,0);
lcd.setCursor(0,1);
delay(2000);
lcd.clear();
lcd.setCursor(0,1);
digitalWrite(m12, LOW);
delay(1000);
digitalWrite(m12, LOW);
delay(1000);
lcd.clear();
digitalWrite(m12, HIGH);
delay (1000);
delay(1000);
else
lcd.setCursor(0,0);
lcd.setCursor(0,1);
digitalWrite(m11, LOW);
digitalWrite(m12, LOW);
Chapter four
4. Result and Decision
4.1 Simulation result for door opening and closing
As shown in the figure below the result of the simulation is displayed by writing messages on the
LCD such as finger print read, fingerprint accepted, gate opened and gate closed. Also when we
look the motor rotates in one direction to open the gate and the other direction to close the door
automatically.
There is a proteus simulation of gate security system with finger print. The control
instructions and signals are generated by Arduino program. Proteus is really good simulation
software for beginners and Arduino is the most basic among all microcontrollers so this can
be a very good project of gate control. The Arduino use analog input from the finger print
module and keypad (push button) and convert it in to digital one. The expected result is
obtained in this simulation so implementation of the project will be effective
Chapter five
5. Conclusion and Recommendations for future work
5.1. Conclusion
We conclude that the designing of gate security system with finger print is the best effective and
suitable way of controlling the door. We develop arduino program for controlling and
functioning of the system. As we have seen in the result of simulation the gate is controlled by a
rotating servo motor. It rotates back and forth to open and close the door. The back and forth
movement is controlled by a half bridge of the driver. The accessible messages are displayed in
the LCD to show the whether the person is authorized or not. Such messages fingerprint read,
fingerprint accepted, gate opened and gate closed. As we tried to show the overall cost analysis,
the cost of our project is much less than the currently used method in the institution. It is
advantageous to any secured area. A step by step approach in designing the microcontroller
based system for securing the entrance of the user and providing the security for the door
system and even more for the PASSPORT verification using a finger print scanner has
been followed. The system has successfully overcome some of the aspects existing with the
present technologies, by the use of finger print Biometric as the authentication Technology
Reference
[1].Qi Jun Zhao, Lei Zhang, David Zhang, Nan Luo, “Adaptive Pore Model for Fingerprint Pore
Extraction.” Proc IEEE, 978-1-4244-2175-6/08, 2008.
[2]. http://www.security system.com
[3] http://www.electronic circute.com
[4].Moheb R. Girgis, Tarek M. Mahmoud, and Tarek Abd-ElHafeez, “An Approach to Image
Extraction and Accurate Skin Detection from Web Pages.” World academy of Science
Engineering and Technology, page no. 27, 2007.
[5].Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu, “Fingerprint
Verification System using Minutiae Extraction Technique.” World academy of Science,
Engineering and Technology, page no.46,2008.
[6].Hoi Le, The Duy Bui, “Online fingerprint identification with a fast and distortion tolerant
hashing.” Journal of Information Assurance and Security 4 page no.117-123,2009.
[7].Wei Cui, Guoliang Wu, Rongjin Hua, and Hao Yang,The Research of Edge Detection
Algorithm for Fingerprint Images.” IEEE‟2008.