You are on page 1of 43

GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Declaration

We declare that the work titled by Microcontroller Based Security System with Finger print
recognition for BiT entrance Gate which submitted to Bahir Dar institute of technology is an
authentic record of original work will do by Feleke Shetaye, Malefiya Simachew, Zemenu
Yohannes and Zinaw Demeke under the supervision of.

Authors sup … …………


Feleke Shetaye ……. Mr Tewodros .G

Malefiya Simachew ……. P.Manager

Zemenu Yohannes …………

Zinaw Demeke …………….. Mr. ………………

Date …………………….. Date……………………

It is approved that this project has been written in compliance with the formatting rules

laid down by the school of the university.

Examining community member signature Date

1……………………………… ….. …….. …… …………..

2………………………………… . …………….. …… ……………

3………………………………… ………………. ……… ……………

4…………………………………. . ……………….. …… ………………

i FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Acknowledgement
First of all we would like to thank our Almighty God for giving us strength to finish our project
and prepare our document from the beginning up to the end. Next we would like to express our
heartily gratitude to our supervisor Mr.Tewodros Gera who has always been our motivation for
carrying out the project. We would also thank our faculty who gives the chance to know a lot
about theoretical knowledge into practical knowledge by giving the project.

ii FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Contents
Declaration ....................................................................................................................................... i
Acknowledgement .......................................................................................................................... ii
Acronyms and Abbreviations ......................................................................................................... v
List of figures ................................................................................................................................. vi
List of tables .................................................................................................................................. vii
Abstract ........................................................................................................................................ viii
Chapter one ..................................................................................................................................... 1
1. Introduction ................................................................................................................................. 1
1.1 Background ........................................................................................................................... 1
1.2 Statement of the problem ...................................................................................................... 4
1.3 Objectives the project ........................................................................................................... 4
1.3.1 General Objectives ......................................................................................................... 4
1.3.2 Specific objective ........................................................................................................... 4
1.4 Methodology ......................................................................................................................... 4
1.5 Significant of the Project ...................................................................................................... 5
1.6 The Scope of this Project ...................................................................................................... 5
Chapter two ..................................................................................................................................... 6
Literature review ............................................................................................................................. 6
Chapter 3 ......................................................................................................................................... 7
3. System Design and Analysis ....................................................................................................... 7
3.1 System Description and Overall Operation .......................................................................... 7
3.1.1 Block diagram of the overall system ............................................................................. 7
3.2 System components and their description............................................................................. 8
3.2.1. Arduino ......................................................................................................................... 8
3.2.2 LCD.............................................................................................................................. 10
3.2.3 Buzzer .......................................................................................................................... 11
3.2.4 DC motor driver (using L293D) .................................................................................. 12
3.2.5 DC servo motor ............................................................................................................ 15
3.2.6 Relay ............................................................................................................................ 16

iii FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

3.2.7 Fingerprint sensor ........................................................................................................ 17


3.1.8 Keypad ......................................................................................................................... 17
3.3 Fingerprint Recognition ...................................................................................................... 17
Detection of fingerprints ........................................................................................................... 19
3.4 Overall operation of the system .......................................................................................... 23
3.5 system design ...................................................................................................................... 24
3.5.1 Software design ............................................................................................................ 24
3.5.2 Flow chart .................................................................................................................... 25
Chapter four .................................................................................................................................. 31
4. Result and Decision ................................................................................................................. 31
4.1 Simulation result for door opening and closing .................................................................. 31
4.2 Discussion for gate security system .................................................................................... 32
Chapter five ................................................................................................................................... 33
5. Conclusion and Recommendations for future work ................................................................. 33
5.1. Conclusion ............................................................................................................................. 33
5.2. Recommendations for Future work ................................................................................... 34
Reference ...................................................................................................................................... 35

iv FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Acronyms and Abbreviations

ATM……………………………… Automated teller machine

BiT………………………………….Bahirdar institute of technology

GND…………………………………Ground

LED …………………………………Light emitting diode

USB……………………….. ………..Universal serial bus

ID…………………………………….Identity document

LCD……………………………………Liquid crystal display

PIN………………………………….....Personal identification number

PWM………………………………......Pulse width modulation

PCB…………………………………....Printed circuit board

RFID……………………………………Radio frequency identification

SIFT………………………………...........scale invariant feature transform

v FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

List of figures

Figure 3.1Block diagram of the system .......................................................................................... 7


Figure 3. 2 photo arduino uno model .............................................................................................. 8
Figure 3.3 LCD display module.................................................................................................... 10
Figure 3. 4 H-bridge circut............................................................................................................ 12
Figure 3.5 pin diagram of L293D motor driver ............................................................................ 13
Figure 3. 6 connection of the driver and motor ............................................................................ 14
Figure 3.7 circute model of DC motor .......................................................................................... 15
Figure 3. 8 The noisy fingerprint image, output of the enhancement module and the final binary
image. ............................................................................................................................................ 22
Figure 3.9 Designed circuit for the system .................................................................................. 25
Figure 3.10 Flow chart for the arduino program........................................................................... 27
Figure 4.1 Proteus simulation result ............................................................................................. 31
Figure 4.2 Messages displayed on the LCD ................................................................................. 32

vi FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

List of tables

Table 3. 1 LCD pin and their description ..................................................................................... 11


Table 3.2 Truth table for motor rotation ....................................................................................... 14
Table 3.3 A complete Pin description of L293D .......................................................................... 14

vii FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Abstract
In this paper, design and implementation of arduino based gate security system with finger print
technology will be presented and analyzed. An arduino with other peripheral devices which
include Light Emitting Diode (LED), Liquid Crystal Display (LCD), Buzzer and figure print
module are responsible for reliable operation of the proposed security system. In addition, a
manual keypad is another way to lock or unlock the system. Biometrics studies commonly
include fingerprint, face, iris, voice, signature, and hand geometry recognition and verification.
Many other modalities are in various stages of development and assessment. Among these
available biometric traits finger Print proves to be one of the best traits providing good mismatch
ratio and also reliable. The present scenario to operate a security is with paper Id. This does not
provide good security to our institution. To provide perfect security to the institution and to make
the work easier, this project is taking help of two different technologies viz. Among the huge
requirements, the one and only one requirement which has a vital importance in our daily life is
“Security”. A Compiler arduino IDE is used to design a program that controls the system along
with maintaining all security functions. The designed program is applied in Proteus Software for
simulation. At last, the results of practical circuit will show the proper functions and also verify
the reliable security within reasonable cost.

viii FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Chapter one
1. Introduction
1.1 Background
In the 1890s, an anthropologist named Alphonse Bertillon sought to fix the problem of
identifying convicted criminals and turned biometrics into a distinct field of study. He developed
'Bertillon age', a method of bodily measurement which got named after him. The problem with
identifying repeated offenders was that the criminals often gave different aliases each time they
were arrested. Notes about the ridges, loops, and spirals of fingerprints were first made in 1686
by Marcello Malpighi. However, it was not until 1880 that fingerprints were recognized as a
means of personal identification by Henry Faulds, who also identified a first ever fingerprint.
The first book about fingerprints was published in 1888 by Sir Francis Galton, and was titled
simply Fingerprint. Later, the Henry Classification System was developed in 1901 by Sir Edward
Henry, and today forms the basis for print recognition in most English speaking countries. This
system categorized the ridge patterns into three groups: loops, whorls, and arches. Fingerprinting
was soon introduced in prisons, army and widely used for identification by law enforcement.
Although the main use of prints remains in forensic science and law enforcement, new uses of
fingerprints have been developed. Fingerprinting was soon introduced in prisons, army and
widely used for identification by law enforcement. Although the main use of prints remains in
forensic science and law enforcement, new uses of fingerprints have been developed. Security is
the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable
asset, such as a person, dwelling, community, item, nation, or organization. Also it is
fundamental to reducing poverty, protecting human rights and creating an enabling environment
for development. The concept of security has been broadened beyond traditional notions of
territorial defense to include the safety and well-being of people and their freedom from fear.
The general trend of human nature is always longing for security physically, mentally and
socially. Fingerprint based security access control and time attendance systems are used for all
kinds of office and service sector operations in the day today environment. Fingerprint System
based access control is more secured as compared to the conventional swipe card or ID cards
because of the exclusive fingerprint for every entity. Fingerprint Security Systems have
fascinated people for centuries. They have been used as a method of personal identification since

1 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

ancient times. The two key aspects of most of the Fingerprint System biometric solutions are
Finger Print identification and authentication. The process of identification tells you who an
individual is, or in the negative sense tells you who they are not. Fingerprints Security is
examined using two different sets of criteria. One way of looking at Fingerprint Security System
is using their "Class Characteristics. Fingerprint System Authentication is a simpler process. It
involves affirming or rejecting a claimed identity by matching a live template with an existing
one. Most of these identification/ authentications are done by using Smart Card. The large
growth of ID - Card based Fingerprint system security is wildly used in Public service
applications. These cards are used for multiple purpose applications such as Digital parking
meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity,
Personal Identification Verification Number etc. Another kind of Fingerprint System is the
scanner using ultrasound. The process involves high frequency sound to identify a fingerprint.
An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt
on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature
differences used for a variety of security and data-collection purposes, from identifying prisoners
to allowing access to information or high-security areas. A security is a financial instrument that
represents an ownership position in a publicly-traded corporation (stock),a creditor relationship
with governmental body or a corporation (bond), or rights to ownership as represented by an
option. A security is a fungible, negotiable financial instrument that represents some type of
financial value. The company or entity that issues the security is known as the issuer. Insecurity
and crime constitute some of the major problems facing our immediate society today .People live
with fear of being attacked by burglars, vandals and thieves. Despite all the effort, resources and
time that has been devoted to the development of tools that will reduce crime rates and make the
world a safer place to live, these problems are still on the increase. These gave rise to the need
for an increasing development in the technology of alarm systems which utilizes various
principles such as infrared motion detection, light (photo) sensitive electronic devices and so on.
Even with the introduction of these finger print based security systems which have reduced
greatly the level of insecurity, there is still a problem of false ID card which needs to be
minimized. In order to effectively reduce the level of insecurity and avoid false ID cards which
can create unnecessary unrest, a touch activated and finger print based security system is
required. the most important application of accurate personal identification is securing limited
2 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016

access systems from malicious attacks. Among all the presently employed finger print
techniques, fingerprint identification systems have received the most attention due to the long
history of fingerprints and their extensive use in forensics. This paper deals with the issue of
selection of an optimal algorithm for fingerprint matching in order to design a system that
matches required specifications in performance and accuracy. A number of portable fingerprint
scanners were developed mainly by computer companies to provide a secure access for the users.
In 1998, Compaq was the first to have a print reader attached to the computer. Currently, there
are multiple systems for use with desktop and laptop computers in the form of PC cards and
biometric mice. A portable print reader used for computer security employs a tiny digital camera
to take a picture of a print and convert it into a map that is subsequently stored in the computer
and cannot be duplicated. Commercial fingerprint identification systems were introduced over 15
years ago. They are now used in security applications to gain access to a building or areas within
the building, or computers or network access. Some companies, police offices, and high-security
government buildings require fingerprint identification for access to the building or its selected
parts. Today, fingerprint analysis technology is the most wide-spread biometric method of
identification and authentication for forensic and security purposes. A Fingerprint, as the name
suggests is the print or the impression made by our finger because of the patterns formed on the
skin of our palms and fingers. It is fully formed at about seven months of fetus development and
finger ridge configurations do not change throughout the life of an individual. Each of our ten
fingerprints is different from one another and from those of every other person. Even identical
twins have unique finger-prints. That makes them ideal for personal identification. With age,
these marks get prominent but the pattern and the structures present in those fine lines do not
undergo any change. For their permanence and unique nature, they have been used for not only
in identification but also in the field of security as criminal and forensic investigation for a long
time. Every fingerprint consists ridges and furrows where the ridges are thick lines while the
furrows are space between two ridges. But we can‟t distinguish the fingerprints of two persons
on the basis of ridges and furrows because it has some similarities between the fingerprints of
different persons. Authentication plays a very critical role in security-related applications like e-
commerce. There are a number of methods and techniques for accomplishing this key process. In
this regard, fingerprint is gaining increasing attention these days. Security systems, having
realized the value of fingerprint, use fingerprints for two basic purposes: to verify or identify
3 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016

users. There is a number of fingerprints and different applications need different fingerprints.
Fingerprint is the most secure and convenient authentication tool. It cannot be borrowed, stolen,
or forgotten and forging one is practically impossible. Fingerprint measure individual's unique
physical or behavioral characteristics to recognize or authenticate their identity. Common
physical biometrics includes fingerprints, hand or palm geometry, retina, iris, and facial
characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern,
and gait.
1.2 Statement of the problem
In Bihar Dar institute of technology (BiT) there are three gates for entrance so it needs many
workers to keep security of the compound by hiring with a lot of capital. But everyone can enter
in to the campus by cheating the guard with showing similar ID cards. Consequently, many
laptops and other materials were stolen by these persons. In addition to this a student and worker
has no ID card, the guard prohibit these person to enter causes a conflict between them.
Especially, in exam week many students leave out the campus without ID and they made
controversy by putting their ID in the library.
1.3 Objectives the project

1.3.1 General Objectives


The main objective this project is design and implementing finger print based door security for
BiT to prevent other intruders and reduce conflict between students and watch men.
1.3.2 Specific objective
 To provide an intelligent solution for the security workers
 To decrease annual budget of the BiT for security worker
 To process finger print extraction
 To know working principle of arduino
 To know how to interface hardware and computer
1.4 Methodology
Our project follows the sequential method to implement this project successfully the process
should pass the following stages.
1. Literature review: reading journals, books, websites, and also reviewing some related
electrical projects

4 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

2. Collection of data: collecting rating of motor, type of sensor


3. Analyzing data: using the data that have been collected, we choose and determine the
most effective and workable mechanism to design the model. In the stage we also select
the most preferable materials that are need in the modeling the system
4. Analyzing the data collection will help in the cost estimation, standards and availability
of material that are used in the system
5. Selecting appropriate equipment
6. Implementation: when the whole model of the system is tested and if its performance is
accurate, than designed model are implemented practically.
7. Testing the model: after the implementation our project is testing by giving supply to
check the system is whether feasible or not.
8. Design and simulation
1.5 Significant of the Project
The project is still very necessary for our institution because to decrease annual budget of the
BiT for security worker, avoide cheater members, avoide conflict between school members and
security workers, Easy to use and requires no additional human power or equipment, Fingerprint
is unique for every person it cannot be imitated or fabricated It is not same in the case of twins
also, High accuracy in terms of security, No manual errors, No false intrusion so it is very
important.
1.6 The Scope of this Project
 design and simulate the project
 Provide an intelligent solution for the security workers
 To decrease annual budget of the BiT for security work

5 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Chapter two
Literature review

An adaptive pore model for finger print pore extraction by Qi Jun Zhao et al[1]. This project
proposes sweat pores have been recently employed for automated fingerprint recognition, in
which the pores are usually extracted by using a computationally expensive skeletonization
method or a unitary scale isotropic pore model
Image extraction and accurate skin detection from web pages by Moheb R. et al.[4]. This paper
proposes a system to extract images from web pages and then detect the skin color regions of
these images.
Fingerprint verification system using minutiae extraction technique by Manvjeet Kaur et al. [5].
Most fingerprint recognition techniques are based on minutiae matching and have been well
studied. However, this technology still suffers from problems associated with the handling of
poor quality impressions. One problem besetting fingerprint matching is distortion. Distortion
changes both geometric position and orientation, and leads to difficulties in establishing a match
among multiple impressions acquired from the same fingertip. Marking all the minutiae
accurately as well as rejecting false minutiae is another issue still under research.
Online fingerprint identification with a fast and distortion tolerant hashing method by Hoi Le et
al. [6]. National ID card, electronic commerce, and access to computer networks are some
scenarios where reliable identification is a must. Existing authentication systems relying on
knowledge-based approaches like passwords or token-based such as magnetic cards and
passports contain serious security risks due to the vulnerability to engineering-social attacks
and the easiness of sharing or compromising passwords and PINs. Biometrics such as
fingerprint, face, eye retina, and voice offer a more reliable means for authentication.
However, due to large biometric database and complicated biometric measures, it is difficult to
design both an accurate and fast biometric recognition.
Edge detection algorithm for fingerprint images by Wei Cui et al[7]. This paper introduces some
edge detection operators and compares their characteristics and performances.
These and similar works inspire us and we try to develop and apply such system security for our
country in order to increase sedentary life.

6 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Chapter 3
3. System Design and Analysis
3.1 System Description and Overall Operation

3.1.1 Block diagram of the overall system

Finger print
sensor
LCD

Relay
Motor Driver

Arduino

Servo Motor
Buzzer/Siren

Computer Interface
Keypad

Figure 3. 1 Block diagram of the system

7 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

3.2 System components and their description


3.2.1. Arduino

Figure 3. 2 photo arduino uno model


The Arduino Uno is a microcontroller board based on the ATmega328 (datasheet). It has 16
digital input/output pins (of which 6 can be used as PWM outputs), 6 analog inputs, a 16 MHz
crystal oscillator, a USB connection, a power jack, an ICSP header, and a reset button. It
contains everything needed to support the microcontroller; simply connect it to a computer with
a USB cable or power it with a AC-to-DC adapter or battery to get started.Arduino Uno R3 is an
open-source physical computing platform based on a simple i/o board and a development
environment that implements the Processing/Wiring language. Arduino can be used to develop
stand-alone interactive objects or can be connected to software on computer (e.g. Flash,
Processing, and MaxMSP). Arduino Uno R3 uses an ATmega16U2 instead of the 8U2 found on
the Uno (or the FTDI found on previous generations). This allows for faster transfer rates and
more memory. No drivers needed for Linux or Mac (in file for Windows is needed and included

8 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

in the Arduino IDE), and the ability to have the Uno show up as a keyboard, mouse, joystick, etc.
The Uno R3 also adds SDA and SCL pins next to the AREF. In addition, there are two new pins
placed near the RESET pin. One is the IOREF that allow the shields to adapt to the voltage
provided from the board. The other is a not connected and is reserved for future purposes. The
Uno R3 works with all existing shields but can adapt to new shields which use these additional
pins. The Arduino Uno R3 requires the Arduino 1.0 drivers folder in order to install properly on
some computers. We have tested and confirmed that the R3 can be programmed in older versions
of the IDE. However, the first time using the R3 on a new computer, we will need to have
Arduino 1.0 installed on that machine.
Specification

Microcontroller ATmega328P

Operating Voltage 5V
Input Voltage (recommended) 7-12V
Input Voltage (limit) 6-20V
Digital I/O Pins 14 (of which 6 provide PWM output)
PWM Digital I/O Pins 6
Analog Input Pins 6
DC Current per I/O Pin 20 mA
DC Current for 3.3V Pin 50 mA
32 KB (ATmega328P)
Flash Memory
of which 0.5 KB used by bootloader
SRAM 2 KB (ATmega328P)
EEPROM 1 KB (ATmega328P)
Clock Speed 16 MHz
Length 68.6 mm
Width 53.4Mm

9 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

3.2.2 LCD

Figure 3. 3 LCD display module

An LCD (Liquid Crystal Display) basically works on the concept of Light Polarization of
a „Liquid Crystal‟ under the influence of an Electric Field. Every LCD contains a Back-
Light behind the Liquid Crystal array, which acts as a lig An LCD (Liquid Crystal Display)
basically works on the concept of Light Polarization of a ‘Liquid Crystal‟ under the influence of
an Electric Field. Every LCD contains a Back-Light behind the Liquid Crystal array, which acts
as a light source. When an Electric Field is applied across certain fluids, it changes the way
they allow light to pass through them, that is, it changes the orientation of the liquid
crystal molecules as a result they do not allow light to pass through them. Hence, by applying
suitable potential difference, we can control if light passes or doesn‟t pass through the LCD
pixels. LCD 16×2 can be interfaced in two different modes
4-bit mode
In 4-bit mode pins from 11 to 14 (total 4 pins) are connected to four I/O pins of microcontroller.
Hence for this interface we need only four I/O pins. The main reason to operate in 4-bit mode is
to save four I/O pins. There is one more way we can interface this LCD by using shift register,
which is normally called three wire interfaces. In future we are going to add that tutorial on
embedded site source. When an Electric Field is applied across certain fluids, it changes the way
they allow light to pass through them, that is, it changes the orientation of the liquid
crystal molecules as a result they do not allow light to pass through them. Hence, by applying
suitable potential difference, we can control if light passes or doesn‟t pass through the LCD
pixels. LCD 16×2 can be interfaced in two different modes: In 4-bit mode pins from 11 to 14
(total 4 pins) are connected to four I/O pins of microcontroller. Hence for this interface we need
only four I/O pins. The main reason to operate in 4-bit mode is to save four I/O pins. There is

10 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

one more way we can interface this LCD by using shift register, which is normally called three
wire interfaces. In future we are going to add that tutorial on embedded site.
Table 3. 1 LCD pin and their description

LCD pin symbol Function External connection


1 Vss Signal Ground(GND) External ground(power section)
2 Vdd VCC for LCD Power supply for logic(+5v)
3 Vo Contrast Adjust Externally connect potentiometer
4 Rs Register Select Signal To Arduino control pins
5 R/W Read/Write Select To Arduino control pins
Signal
6 E Enable signal To Arduino control pins
7 DB0 Four low order bi- To Arduino DATA pins
8 DB1 dirctional three-state To Arduino DATA pins
9 DB2 data bus lines.These To Arduino DATA pins
10 DB3 four are not used if 4- To Arduino DATA pins
bit interface used
11 DB4 Four high order bi- To Arduino DATA pins
12 DB5 dirctional three-state To Arduino DATA pins
13 DB6 data bus lines.These To Arduino DATA pins
14 DB7 pins used when 4-bit To Arduino DATA pins
interface is used
15 1 LED(K) Back light LED cathode terminal
16 15 LED(A) Back light LED cathode terminal

3.2.3 Buzzer
A buzzer or beeper is a signalling device, usually electronic, typically used in automobiles,
household appliances such as a microwave oven, or game shows. It most commonly consists of a
number of switches or sensors connected to a control unit that determines if and which button
was pushed or a preset time has lapsed, and usually illuminates a light on the appropriate button
or control panel, and sounds a warning in the form of a continuous or intermittent buzzing or
beeping sound. Initially this device was based on an electromechanical system which was
11 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING
GATE SECURITY SYSTEM WITH FINGER PRINT 2016

identical to an electric bell without the metal gong (which makes the ringing noise). Often these
units were anchored to a wall or ceiling and used the ceiling or wall as a sounding board.
Another implementation with some AC-connected devices was to implement a circuit to make
the AC current into a noise loud enough to drive a loudspeaker and hook this circuit up to a
cheap 8-ohm speaker. Nowadays, it is more popular to use a ceramic-based piezoelectric sounder
like a Sonalert which makes a high-pitched tone. Usually these were hooked up to "driver"
circuits which varied the pitch of the sound or pulsed the sound on and off.
3.2.4 DC motor driver (using L293D)
In this article, i will tell about running motor with help of L293D IC. Before we start, let‟s have a
recall about H Bridge. An H bridge is an electronic circuit that enables a voltage to be applied
across a load in either direction. These circuits are often used in robotics and other applications
to allow DC motors to run forwards and backwards.

Figure 3. 4 H-bridge circut


The H-bridge arrangement is generally used to reverse the polarity of the motor, but can also be
used to 'brake' the motor, where the motor comes to a sudden stop, as the motor's terminals are
shorted, or to let the motor 'free run' to a stop, as the motor is effectively disconnected from the
circuit. L293D also works in similar way. It has a proper packaging of the H bridge system. It
offers two H-bridge functionality, That is, we can control 2 motors individually in both

12 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

directions. The motor operations of two motors can be controlled by input logic at pins 2 & 7 and
10 & 15. We cannot connect motors to Controller as mostly motors runs on voltage higher than
+5V, and motors demands high current (depends). The solutions to these limitations are use of
an “H Bridge” It is a circuit which allows motor rotation in both directions. From four
terminals of H Bridge we can control a DC motor.

Figure 3. 5 pin diagram of L293D motor driver

This L293D driver motor it will control four DC motors at one time but with fix direction of
motion. L293D has output current of 600mA and peak output current of 1.2A per channel.
Moreover for protection of circuit from back EMF output diode are included within the L293D.
The output supply hitch is external supply has a wide range from 4.5V to 36V which has made
L293D a best choice for DC motor driver. A simple schematic for interfacing a DC gear motor
using L293D driver motor is shown with truth table for this circuit.

13 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Figure 3. 6 connection of the driver and motor


Table 3. 2 Truth table for motor rotation

Table 3. 3 A complete Pin description of L293D

Circuit of L293D on breadboard is usually made for testing the circuit, but it‟s not recommended
because L293D usually involves high current and bread board can have loose connections. This

14 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

leads to heat and sparks sometime. Here we can see that both PIC and L293D circuit are made on
bread board and both the channels are tested by LEDs too.
3.2.5 DC servo motor
The device that converts electrical energy into mechanical energy is called a motor. The motor
that utilizes a DC supply to produce mechanical output is DC Motor. The advantages of using
these types of motors over conventionally used AC motors are that, DC motors have
higher controller efficiency, DC motors have typical 98% efficiency, DC motors have better
overload and peak voltage characteristics and also the main advantage of using these DC motors
is that the speed torque characteristics can be varied to almost any useful form. As a result of all
these advantages these motors have a wide range of applications in places where constant speed
is to be maintained at varying loads. Conveyor belts, elevators, cranes, ski lifts, extruders,
mixers, sewing machines are few such applications where DC motors are used

Figure 3. 7 circute model of DC motor


Advantage of using servo motor is used at an angle for the purpose of limited opening of door.
Servo motors are generally an assembly of four things: a DC motor, a gearing set, a control
circuit and a position-sensor (usually a potentiometer).The position of servo motors can be
controlled more precisely than those of standard DC motors, and they usually have three wires
(power, ground & control). Power to servo motors is constantly applied, with the servo control
circuit regulating the draw to drive the motor. Servo motors are designed for more specific tasks
where position needs to be defined accurately such as controlling the rudder on a boat or moving
a robotic arm or robot leg within a certain range.

15 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Servo motors do not rotate freely like a standard DC motor. Instead the angle of rotation is
limited to 180 Degrees (or so) back and forth. Servo motors receive a control signal that
represents an output position and applies power to the DC motor until the shaft turns to the
correct position, determined by the position sensor. PWM is used for the control signal of servo
motors. However, unlike DC motors it‟s the duration of the positive pulse that determines the
position, rather than speed, of the servo shaft. A neutral pulse value dependent on the servo
(usually around 1.5ms) keeps the servo shaft in the center position. Increasing that pulse value
will make the servo turn clockwise, and a shorter pulse will turn the shaft anticlockwise. The
servo control pulse is usually repeated every 20 milliseconds, essentially telling the servo where
to go, even if that means remaining in the same position. When a servo is commanded to move,
it will move to the position and hold that position, even if external force pushes against it. The
servo will resist from moving out of that position, with the maximum amount of resistive force
the servo can exert being the torque rating of that servo.
3.2.6 Relay
A relay is an electrically operated switch. Many relays use an electromagnet to mechanically
operate a switch, but other operating principles are also used, such as solid-state relays. Relays
are used where it is necessary to control a circuit by a low-power signal (with complete electrical
isolation between control and controlled circuits), or where several circuits must be controlled by
one signal. The first relays were used in long distance telegraph circuits as amplifiers: they
repeated the signal coming in from one circuit and re-transmitted it on another circuit. Relays
were used extensively in telephone exchanges and early computers to perform logical operations.
A type of relay that can handle the high power required to directly control an electric motor or
other loads is called a contactor. Solid-state relays control power circuits with no moving parts,
instead using a semiconductor device to perform switching. Relays with calibrated operating
characteristics and sometimes multiple operating coils are used to protect electrical circuits from
overload or faults; in modern electric power systems these functions are performed by digital
instruments still called "protective relays"
Application of relays
Relays are used wherever it is necessary to control a high power or high voltage circuit with a
low power circuit, especially when galvanic isolation is desirable. The first application of relays

16 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

was in long telegraph lines, where the weak signal received at an intermediate station could
control a contact, regenerating the signal for further transmission. High-voltage or high-current
devices can be controlled with small, low voltage wiring and pilots switches. Operators can be
isolated from the high voltage circuit. Low power devices such as microprocessors can drive
relays to control electrical loads beyond their direct drive capability. In an automobile, a starter
relay allows the high current of the cranking motor to be controlled with small wiring and
contacts in the ignition key.
3.2.7 Fingerprint sensor
We will use R305 Finger Print Sensor. It has an Optical biometric fingerprint reader. It also has
inbuilt flash memory. It performs the function of image processing and gives out data on its
output pin.

3.1.8 Keypad
Keypad is a widely used input device with lots of application in our everyday life. From a simple
telephone to keyboard of a computer, ATM, electronic lock, etc., keypad is used to take input
from the user for further processing. In this article we are interfacing keypad with the
displaying the corresponding number on LCD. This module can be further used in a number of
systems to interfaced keypad with arduino and other processors to get desired output. The
program to interface keypad with controller is written in language which is very easy to
understand.
User will enter various commands using the keypad. Various keys of keypad are as following
 Add fingerprint entry
 Search fingerprint
 Empty the database of fingerprint module
3.3 Fingerprint Recognition
The Fingerprint Recognition is a process of determining whether two sets of fingerprint
ridge detail are from the same person. There are multiple approaches that are used in many
different ways for fingerprint recognition which are minutiae, correlation, ridge pattern. These
types of approaches can be broadly categorized as minutiae based or texture based. The main
modules of a fingerprint verification system are:

17 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

i. fingerprint sensing: in which the fingerprint of an individual is acquired by a fingerprint


scanner to produce a raw digital representation;
ii. preprocessing: in which the input fingerprint is enhanced and adapted to simplify the
task of feature extraction;
iii. feature extraction: in which the fingerprint is further processed to generate
discriminative properties, also called feature vectors; and
iv. Matching: in which the feature vector of the input fingerprint is compared against one or
more existing templates.
Fingerprint Sensing
The acquisition of fingerprint images has been historically carried out by spreading the finger
with ink and pressing it against a paper card. The paper card is then scanned, resulting in a digital
representation. This process is known as off-line acquisition and is still used in law enforcement
applications. Currently, it is possible fingerprint sensor. This process is known as online
acquisition.
Fingerprint Matching
In the matching step, features extracted from the input fingerprint are compared against those in
a template, which represents a single user (retrieved from the system database based on the
claimed identity).The result of such a procedure is either a degree of similarity (also called
matching score) or an acceptance/rejection decision. There are fingerprint matching techniques
that directly compare gray scale images (or sub images) using correlation-based methods, so that
the fingerprint template coincides with the gray scale image. However, most of the fingerprint
matching algorithms use features that are extracted from the gray scale image .One of the biggest
challenges of fingerprint recognition is the high variability commonly found between different
impressions of the same finger. This variability is known as interclass variability and is caused
by several factors, including:
 displacement or rotation between different acquisitions partial overlap, especially in
sensors of small area
 Skin conditions, due to permanent or temporary factors (cuts, dirt, humidity, etc.) noise
in the sensor (for example, residues from previous acquisitions) and
 Nonlinear distortion due to skin plasticity and differences in pressure against the sensor.

18 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Fingerprint matching remains as a challenging pattern recognition problem due to the difficulty
in matching fingerprints affected by one or several of the mentioned factors. Conventional
security systems used either knowledge based methods (passwords or PIN), and token-based
methods (passport, driver license, ID card) and were prone to fraud because PIN numbers could
be forgotten or hacked and the tokens could be lost, duplicated or stolen. To address the need for
robust, reliable, and foolproof personal identification, authentication systems will necessarily
require a biometric component.
Finger print analysis
Fingerprints are the patterns on the inside and the tips of fingers. The ridges of skin, also known
as friction ridges, together with the valleys between them form unique patterns on the fingers.
Fingerprint analysis is a biometric technique comparing scanned image of prints with a database
of fingerprints. Uniqueness of prints, and the fact that they do not change during a person's life,
form the basis for fingerprint analysis. The uniqueness of the prints is determined by the minute
.changes in local environment during fetal development; therefore, the identical twins
undistinguishable by genes analysis can be differentiated with fingerprint analysis. Although the
fingerprint pattern remains the same, growth accounts for an enlargement of the patterns. We are
going to represent an example of this fingerprint based security system for the security like
university entrance gate security of a BiT an authorized person to enter into the dormitory
because an un authorized person may enter by easily manipulating the security guard or any
other manual security system. For entering, a person can scan their finger on the fingerprint
sensor module at the important entry place of the entrance gate in perfect manner. If their
fingerprint matched with the fingerprints of the database which has made for entrance gate
authorized person, then the person can enter otherwise they will be denied. The matching process
of the fingerprint of a person to the database is done automatically using biometric architecture.
Detection of fingerprints
Presence of pores on the surface of the ridges of the fingers results in the accumulation of
perspiration on the fingertips. This moisture remains on the surface of the object a person
touches, leaving prints. Depending on the surface touched, prints can be visible to the naked eye
(e.g. metal, glass or plastic) or invisible (paper, cardboard or timber). Prints left on non-porous
surfaces such as metal can be visualized with powders and lifted with tape. In contrast, the prints

19 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

on porous objects require special lighting, such as lasers or x rays. There are two major methods
of the identification of fingerprints-comparison of lifted prints and live scanning. The first
method is mainly used in forensics, while the second is used for authentication purposes (in
security applications) and is also slowly becoming a method for identification at some police
stations.
Analysis and classification of fingerprints
Ridges present on the fingers are classified based on the patterns they form. The most important
features are ridge endings and bifurcations (separation of a ridge into two). These features are
called minutiae and form the basis for further classification and identification. Based on the
forms created by the minutiae (loops, whorls, etc.) fingerprints are further sub-classified into
many more distinct patterns. Modern fingerprint analysis uses computer algorithms to determine
the similarity between a print and images stored in a database. Analysis is usually performed on
multiple levels. First, the algorithms are compared to the prints on the coarse level to identify a
type of a print, and then subsequently to identify more and more details until a match is found.
The computer analysis of prints compares ridges, bifurcations and their relative location.
Fingerprint analysis software and scanners identify a set number of similarity points, this number
being determined by the software used, typically up to 90 points are compared. After
identification of a set number of features, a template of the scanned print is formed and this is
subsequently compared to the templates stored in the computer to determine if the print has a
match. Although limiting the characteristics to be compared speeds up the matching process, it
can also affect the accuracy if inadequate numbers are compared. Accuracy also depends on the
application for which the fingerprint analysis is used. Scanners have comparison algorithms and
a number of recognizable characteristics programmed in, together with the prints of the users
(enrolment) to provide the templates for comparison. The FBI fingerprint system is over 98%
accurate, while the authentication systems accept only 97% of authorized users. Among some of
the reasons for the rejection are: scars, calluses, cracks, dirt, or excess fingernail length.
Fingerprint analysis tools
Two types of fingerprint scanners are normally used optical scanners and capacitance scanners.
Optical scanners identify the print using light; depending on the brightness of the reflected light,
optical scanners depict ridges as dark and valleys as light. Capacitance scanners determine the

20 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

print by using an electrical current. Valleys and ridges on the fingers produce different voltage
output, allowing for discrimination between them.
As sophisticated they are, the existing scanners are not totally immune to fraud. Optical scanners
can be fooled by a picture, whereas the capacitance scanners can be fooled by a mold of a finger.
Some scanners also have temperature and pulse sensors, but they are still vulnerable to molds
placed over real fingers.A number of portable fingerprint scanners were developed mainly by
computer companies to provide a secure access for the users. In 1998, Compaq was the first to
have a print reader attached to the computer. Currently, there are multiple systems for use with
desktop and laptop computers in the form of PC cards and biometric mice. A portable print
reader used for computer security employs a tiny digital camera to take a picture of a print and
convert it into a map that is subsequently stored in the computer and cannot be duplicated.
Commercial fingerprint identification systems were introduced over 15 years ago. They are now
used in security applications to gain access to a building or areas within the building, or
computers or network access. Some companies, police offices, and high-security government
buildings require fingerprint identification for access to the building or its selected parts. Today,
fingerprint analysis technology is the most wide-spread biometric method of identification and
authentication for forensic and security purposes.

Fingerprint identification
Fingerprints are made of a series of ridges and furrows on the surface of the finger and have a
core around which patterns like swirls, loops, or arches are curved to ensure that each print is
unique. An arch is a pattern where the ridges enter from one side of the finger, rise in the center
forming an arc, and then exit the other side of the finger. The loop is a pattern where the ridges
enter from one side of a finger, form a curve, and tend to exit from the same side they enter. In
the whorl pattern, ridges form circularly around a central point on the finger. The ridges and
furrows are characterized by irregularities known as minutiae, the distinctive feature upon which
finger scanning technologies are based. Minutiae points are local ridge characteristics that occur
at either a ridge bifurcation or a ridge ending. The ridge ending is the point at which a ridge
terminates. Bifurcations are points at which a single ridge splits into two ridges. Minutiae and
patterns are very important in the analysis of fingerprints since no two fingers have been shown
to be identical.

21 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

There are five stages involved in finger-scan verification and identification:


1. Fingerprint Image Acquisition

2. Image Processing

3. Locating Distinctive Characteristics

4. Template Creation

5. Template Matching

A sensor takes a mathematical snapshot of the user's unique pattern, which is then saved in a
fingerprint database. A fingerprint enhancement algorithm (that uses Gabor filters as band-pass
filters to remove the noise and preserve true ridge/valley structures) is included in the minutiae
extraction module to ensure that the performance of the system is not affected by variations in
quality of fingerprint images.

Figure 3.8 The noisy fingerprint image, output of the enhancement module and the final
binary image.
Optimal positioning of finger
In order to ensure proper functioning of the fingerprint reader, the finger must be correctly laid
on during both teaching-in and subsequent operation. It is important that the finger area with the
greatest fingerprint movement (middle of fingertip) is registered by the fingerprint
Fingerprint reader
The fingerprint reader provides fingerprint based on the biometric features of the human finger.
Using high frequency technology, it evaluates the structures of the deepest layers of skin on the

22 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

finger. The sensor can detect signs of life in the human finger. The fingerprint reader can be used
as a stand-alone function, e.g. at individual doors or gates. The fingers are constantly checked in
the fingerprint reader and are saved as necessary references again. This is especially important
for the fingers of children, which change over time and so must be continually updated in
memory .Different fingers can be assigned to the two integrated zero-voltage two-way switch
relays. This makes it possible to carry out different switching processes, e.g. index fingers for
door opening and thumbs for switching the outside light. The fingers can be taught-in via direct
configuration at the device without a PC and without programming software.
3.4 Overall operation of the system
The block diagram consists of various blocks as shown in Figure 3.1. When fingerprint module
is interfaced to the microcontroller, it will be in user mode. In this mode, stored images will be
verified with the scanned images. When coming to our application the images of the person‟s
fingerprint that are authorized to open the locker door will be stored in the module with a unique
id. To prove that the persons are authorized to open the locker door they need to scan their
fingerprint images. The scanner is interfaced to arduino Uno, this controller will be controlling
the scanning process. After the scanning has been completed, user has to enter the password to
open the door with the help of a keypad. Immediately the door will be opened. After the work
has been completed if key is pressed again with help of keypad the door will be closed again. If
an unauthorized person tries to scan his fingerprint image then an indication will be given by a
buzzer which is interfaced to the controller and also if wrong password is entered by the user
again indication will be given by the buzzer. The current user instead of him/her can make a new
person as the user of the same locker by new registration process and the old user‟s fingerprint
image will be deleted. Option for changing the password is also available.
Connections for arduino based door opener circuit are shown in the above diagram. Here a PIR
sensor is used for sensing human motion which has three terminals Vcc, GND and Dout. Dout is
directly connected to pin number 14 (A0) of arduino uno. A 16x2 LCD is used for displaying the
status. RS, EN pins of LCD connected to 13 and 12 of arduino and data pins D0-D7 are
connected to arduino digital pin numbers 11, 10, 9, 8. RW is directly connected to ground.
L293D motor driver is connected to arduino pin 0 and 1 for opening and closing the gate. Here in
circuit we have used a motor for gate.

23 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

3.5 system design

The system is designed with the analysis of the material components characteristics, working
principle and their specification.

3.5.1 Software design


It is good to simulate before implementing the hardware. Therefore, the system designed in
arduino IDE compiler and applied to protues 8.1 professional for simulation.
Material requirement

1. Arduino uno
2. 16x2 LCD
3. L293D motor driver
4. Servo motor
5. 1k resistor
6. Push button
7. Connecting wire
8. Power supply
Software requirement
1. Arduino IDE 1.0 compiler
2. Protues 8.1 professional

24 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Figure 3. 9 Designed circuit for the system

3.5.2 Flow chart


The Flowchart is shown in the Figure 2.3. It shows how the working of the project goes
according to the program. First when system is switched on, welcome note will be displayed on
LCD. User scans his finger, if his/her finger does not match with stored database it is indicated
by the buzzer. If finger matches then two options will be displayed on LCD like, first one is
open door option, and next is modify user option, if user selects option 1 it asks for the 4
digit password if it matches with previously stored password then locker door opens
otherwise buzzer will be ON. After using the locker user should press key 3 through key
pad to close the door. Else if option 2 is selected again it asks password and if password is
wrong buzzer will be ON if password is correct again four options will be displayed on
LCD. Like, first is new registration option for registration of new user, second is delete option

25 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

to delete the old user's fingerprint image, third is change password option to change the
current password, and fourth one is the cancel option to get back to main note. If option one is
selected it scans new finger and stores it and goes back to main note, else if option two is
selected it asks the id to be deleted after deletion is successful it goes back to the main note,
else if option three is selected it asks for old password then for new password after
entering passwords it goes back to main note, else last option is cancel if it is selected it
directly goes to main note

26 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Start

Welcome note
Scan your finger

no
If fingerprint
matches Buzzer

Yes
1. Open door
2.modify user

No
If Password2 Door opening

No
Press any key
No Else if2

Yes Close door

Password7

Options
1. new
2.delet
3.change password
4.cancel
No

If 1 Yes Scan new finger

Else if Enter ID to delete


No 2 yes

Yes
Else if Old password new passwod
passw
No
Else 4 Cancel
Yes
Stop
Figure 3.10 Flow chart for the arduino program

27 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Source code

#include <Liquid Crystal.h>

LiquidCrystal lcd(13, 12, 11, 10, 9, 8);

#define Push_button 14

#define m11 0

#define m12 1

void setup()

lcd.begin(16, 2);

pinMode(m11, OUTPUT);

pinMode(m12, OUTPUT);

pinMode(Push_button, INPUT);

lcd.print(" Finger print Automatic ");

lcd.setCursor(0,1);

lcd.print(" Door Opener ");

delay(3000);

lcd.clear();

void loop()

if(digitalRead(Push_button))

28 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

lcd.setCursor(0,0);

lcd.print("Finger print Read ");

lcd.setCursor(0,1);

lcd.print("Finger print Accepted ");

delay(2000);

lcd.clear();

lcd.setCursor(0,1);

lcd.print(" Gate Opened ");

digitalWrite(m11, HIGH); // gate opening

digitalWrite(m12, LOW);

delay(1000);

digitalWrite(m11, LOW); // gate stop for a while

digitalWrite(m12, LOW);

delay(1000);

lcd.clear();

lcd.print(" Gate Closed ");

digitalWrite(m11, LOW); // gate closing

digitalWrite(m12, HIGH);

delay (1000);

digital Write(m11, LOW); // gate closed

29 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

digital Write(m12, LOW);

delay(1000);

else

lcd.setCursor(0,0);

lcd.print(" No finger print ");

lcd.setCursor(0,1);

lcd.print(" Gate Closed ");

digitalWrite(m11, LOW);

digitalWrite(m12, LOW);

30 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Chapter four
4. Result and Decision
4.1 Simulation result for door opening and closing

As shown in the figure below the result of the simulation is displayed by writing messages on the
LCD such as finger print read, fingerprint accepted, gate opened and gate closed. Also when we
look the motor rotates in one direction to open the gate and the other direction to close the door
automatically.

Figure 4. 11 Proteus simulation result


The result shown is by simulating the reduced design part because the whole system cannot
run at this time. But some part of the system shows the result by indicating finger print read,
accepted, door opened, closed on the LCD display

31 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Figure 4.12 Messages displayed on the LCD

4.2 Discussion for gate security system

There is a proteus simulation of gate security system with finger print. The control
instructions and signals are generated by Arduino program. Proteus is really good simulation
software for beginners and Arduino is the most basic among all microcontrollers so this can
be a very good project of gate control. The Arduino use analog input from the finger print
module and keypad (push button) and convert it in to digital one. The expected result is
obtained in this simulation so implementation of the project will be effective

32 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Chapter five
5. Conclusion and Recommendations for future work
5.1. Conclusion
We conclude that the designing of gate security system with finger print is the best effective and
suitable way of controlling the door. We develop arduino program for controlling and
functioning of the system. As we have seen in the result of simulation the gate is controlled by a
rotating servo motor. It rotates back and forth to open and close the door. The back and forth
movement is controlled by a half bridge of the driver. The accessible messages are displayed in
the LCD to show the whether the person is authorized or not. Such messages fingerprint read,
fingerprint accepted, gate opened and gate closed. As we tried to show the overall cost analysis,
the cost of our project is much less than the currently used method in the institution. It is
advantageous to any secured area. A step by step approach in designing the microcontroller
based system for securing the entrance of the user and providing the security for the door
system and even more for the PASSPORT verification using a finger print scanner has
been followed. The system has successfully overcome some of the aspects existing with the
present technologies, by the use of finger print Biometric as the authentication Technology

33 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

5.2. Recommendations for Future work


First of all we recommend us to do finger print extraction algorism to use as a desired input
which is limitation of our project. Using this will increase the development of one country to be
more productive and living peacefully so it needs to be implemented since it uses available
material. Different from our desired the system should include a mechanism which allows the
entrance of one person at a time. We also recommend secured institutions to use this technology

34 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING


GATE SECURITY SYSTEM WITH FINGER PRINT 2016

Reference
[1].Qi Jun Zhao, Lei Zhang, David Zhang, Nan Luo, “Adaptive Pore Model for Fingerprint Pore
Extraction.” Proc IEEE, 978-1-4244-2175-6/08, 2008.
[2]. http://www.security system.com
[3] http://www.electronic circute.com
[4].Moheb R. Girgis, Tarek M. Mahmoud, and Tarek Abd-ElHafeez, “An Approach to Image
Extraction and Accurate Skin Detection from Web Pages.” World academy of Science
Engineering and Technology, page no. 27, 2007.
[5].Manvjeet Kaur, Mukhwinder Singh, Akshay Girdhar, and Parvinder S. Sandhu, “Fingerprint
Verification System using Minutiae Extraction Technique.” World academy of Science,
Engineering and Technology, page no.46,2008.
[6].Hoi Le, The Duy Bui, “Online fingerprint identification with a fast and distortion tolerant
hashing.” Journal of Information Assurance and Security 4 page no.117-123,2009.
[7].Wei Cui, Guoliang Wu, Rongjin Hua, and Hao Yang,The Research of Edge Detection
Algorithm for Fingerprint Images.” IEEE‟2008.

35 FACULITY ELECTRICAL AND COMPUTER ENGINEEERING

You might also like