Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board

Download Complete Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board Research Materials (PDF/DOC)

Overview

ABSTRACT

Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There is a number of biometrics and different applications need different biometrics. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. This work is on fingerprint door unlock project using arduino which can be very useful for door security, forensics, crime investigation, personal identification, attendance system and much more.

The whole system works under a simple algorithm called matching algorithm, which is used to compare previously-stored templates of fingerprints against users’ fingerprints for authentication purposes.

The main aim of this work is to build a fingerprint smart door lock system using arduino, fingerprint sensor and servo motor.

TABLE OF CONTENTS

TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

INTRODUCTION

  • BACKGROUND OF THE STUDY
  • PROBLEM STATEMENT
  • AIM/ OBJECTIVE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT

CHAPTER TWO

LITERATURE REVIEW

2.0      LITERATURE REVIEW

2.1      REVIEW OF THE STUDY

2.2     EVOLVEMENTS OF LOCK

2.3     GENERAL OVERVIEW OF BIOMETRIC RECOGNITION SYSTEMS

2.4     REVIEW OF FINGER PRINT

2.5     THE HISTORICAL BACKGROUND OF FINGERPRINTS

2.6     PATTERNS OF FINGERPRINT

CHAPTER THREE

DESIGN METHODOLOGY

3.0      METHODOLOGY

3.1      FRAMEWORK OF FINGERPRINT LOCK SYSTEM

3.2    HARDWARE DESCRIPTION

3.3    SOFTWEAR DESCRIPTION

3.4    BLOCK DIAGRAM

3.5    CIRCUIT DIAGRAM

3.6    OPERATION

3.7   PROGRAM CODE

CHAPTER FOUR               

4.0     RESULT ANALYSIS

4.1       CONSTRUCTION PROCEDURE

4.2      CASING AND PACKAGING

4.3       ASSEMBLING OF SECTIONS

4.4      TESTING OF SYSTEM OPERATION

4.5     INSTALLATION OF THE COMPLETED DESIGN

4.6     PRECAUSIONS

4.7     ADVANTAGES & LIMITATIONS

4.8     APPLICATIONS

CHAPTER FIVE

  • CONCLUSION, RECOMMENDATION AND REFERENCES
  • CONCLUSION
  • RECOMMENDATION
  • FUTURE IMPROVEMENT

REFERENCES

CHAPTER ONE

1.0                  INTRODUCTION

1.1     BACKGROUND OF THE STUDY

Door lock is a very important device; especially in the world we living in today that has a very high crime rate. So locking your door is not enough to secure your safety. According to a study conducted by California crime technological research foundation, it was found that most burglars enter the door. The intruders were asked for the reason of using the door; different answers were obtained but all agreed that conventional lock is easy to get around; either by kicking or picking the lock. Good door lock is one step of making your home or office more secure, so it is a small price to pay to ensure your family and your properties safety. Commercial locks available in the market are valued by their security, reliability and price as well. So the most important factor is security where, it only allows valid users .this is very hard to achieve with the mechanical lock available in the market, where the keyway makes the lock vulnerable to breaking in. When choosing a lock one very important factor is security ,when using a normal lock which operates using a key ,that is not very secure ,first because the key can be easily duplicated secondly this key has a keyway which also makes it susceptible to picking. So lock that operates with a key is not that secure .with the advancements of engineering now it is possible to control anything using the electric circuit .so it possible to have the loc that operate electronically[Grayson 2014].

With the industrial revolution that led to the discovery of electricity and a general improvement in technology in the 19th century (Landes, 2019), following various experiments coupled with the advent of computers, saw a huge breakthrough in home security. This was because CCTV (closed-circuit television) systems in conjunction with stationed long focal length cameras were powered on to view home intruders. Though, this made possible to view remote ends for any non-confrontational crimes to get the offenders identified but it equally suffers a lot of hiccups as the intruders could get away with the valuable property without immediate arrest.

Thereafter, most crimes of burglary till date, which are non-confrontational property crimes, occur when we are not at home. The most common threat to our home is burglary. So, protection of home and family from criminal hit should be high on our list of priorities.

In correlation to the aforementioned security consciousness, one can emphatically say that security of homes and properties has been in existence for a long time, but the methods of applying and achieving it have been changing from time to time. Modern security approaches greatly rely on the activities of the intruders which may reveal their presence to a computer-controlled system. First of all, the intruder must enter the building; a door or window is the most logical means of criminal entry point. Sensors are set to detect use of these entrances, an alarm can be triggered when intruder passes or interacts with sensor devices such as microwave detectors, photo-electric beams, glass break detectors, magnetic field detection, electrostatic- field detectors, microwave barriers systems, ultrasonic sensors, and even infrared sensors. Most of these techniques are still in use but instant arrest of the burglars is hardly sometimes possible. The intruder or impostor action is detected through wrong fingerprint and this could prompt a signal to get to the home owner which possibly calls for an instant arrest of the burglars. However, the switch is never closed in the presence of the house occupant or visitor who simply gains access to the door if only his thumb print matches with that stored in the biometric device.

The report covers home security using biometric fingerprinting lock, which is a type of biometric device. The term “biometrics” is derived from the Greek words bio and metric, meaning life and to measure, respectively. Biometrics can be defined as the science of identifying or verifying individuals based on unique physiological or behavioural characteristics. Examples of human traits used for biometric recognition include fingerprints, hand geometry, speech, face, retina, iris, and handwritten signature (Wittich,2013). Biometrics can also be defined as the use of a person’s unique physiological, behavioral and morphological characteristic to provide positive personal identification (Tripathi, 2011). There are two distinct functions for biometric devices:

  1. To prove you are who you say you
  2. To prove you are not who you say you are not. (San Jose State University, 2010). Biometric identification systems are essentially pattern recognition systems. They use acquisition devices such as cameras and scanning devices to capture images, recordings, or measurements of an individual’s characteristics and computer hardware and software to extract, encode, store, and compare these characteristics (Emuoyibofarhe, 2011). Identification systems answer the question, “Who am I?” and do not require that a user claim an identity before biometric comparisons take place. The user provides his or her biometric data, which is compared to data from a number of users in order to find a match. The answer returned by the system is an identity such as a name or ID number (Nanavata et al, 2012) They establish the genuineness of physiological (e.g. face, fingerprint, iris, retina, hand geometry) and behavioural (e.g. signature, gait) characteristics of a person. Biometric recognition is an upcoming and promising field with great commercial magnitude. It is an extremely reliable source identification system as it is based on what we are rather than what we Biometrics technology is without a doubt a more efficient way of authentication than the more common use of pass words, smart cards, or a combination of the two.

Biometric systems have overtime served as robust security mechanisms in various domains. Fingerprints are the oldest and most widely used form of biometric identification. The use of fingerprint for identification has been employed in law enforcement for about a century. A much broader application of fingerprint is for personal authentication, for instance to access a computer, a network, an ATM machine, a car or a home.

Electronic lock using fingerprint recognition system is a process of verifying the fingerprint image to open the electronic lock. This project highlights the development of fingerprint verification. Verification is completed by comparing the data of authorized fingerprint image with incoming fingerprint image. Then the information of incoming fingerprint image will undergo the comparison process to compare with authorized fingerprint image.

Fingerprint door lock incorporates the proven technology. Fingerprint reader scanning is the most mature and tested type of biometric technology. Recent studies on biometrics have shown that compared to the hand method, fingerprint is more accurate and cost-effective. The duplication of biometric fingerprint technology is virtually impossible, only one in one billionth of a chance. Biometric security guarantees a positive method of user identification with something that cannot be lost, replicated or stolen.

This study proposes a fingerprint door locking system using arduino.

1.2                                PROBLEM STATEMENT

Problems with the convention lock are; they are easy to pick if intruders don not have a key. If intruders have the key then it is very easy to gain an access anytime which lead to the change of the lock .further more it is very easy to duplicate. Having a combination door lock is a better idea; using this type of lock will eliminate the need of having a key but create other issues, like forgetting People use human characteristics to identify each other such as face, voice and, gait for thousand years. Alphonse Bertillon, chief of criminal identification division of the police department in Paris, came up with the idea of using a number of body measurements to spot criminal in the mid-19 century .this idea started to gain popularity and it led the discovery of the human fingerprint. Fingerprint or palm is part of the science known today as biometrics. Biometrics is identification of a person based on the person’s distinctive physiological, anatomical and or behavioral characteristics. Biometrics was invented to enhance security and reduce financial fraud [Jain, 2014].

Security systems are vital for protection of information, property, and prevention from theft or crime. From data centers to banks; security systems have become a necessity. Home security systems are also or commercial security system. Lock protects the life and properties of everyone in today’s world. Where the rate of crime and theft are exponential increasing everyday everyone need to use the lock. Throughout history people used lock for the same reason people using it today, which is security. This work will discuss the framework of protection system using biometric – fingerprint, which came to solve the problem seen in other means of locking system.

1.2                     AIM AND OBJECTIVE OF THE WORK

The main aim of this paper is to develop a biometrics lock device, which is able to acquire the paper focuses on having a secure lock .where only users with valid fingerprint can gain access.

The objectives are:

  1. To increase the security level to prevent anØ unauthorized unlocking of the door
  2. To study the application and different types of biometric
  • To give user more secure yet cost-efficient way of door locking system

1.4                                  SCOPE OF THE STUDY

Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of finger print door lock system.

1.5                           SIGNIFICANCE OF THE STUDY

This study will throw light on the uniqueness of biometric system used in the lock system. This study will expose and demonstrate evolvement of the lock form a very simple piece of wood to an electronic lock and brief introduction to biometrics-fingerprint. This study will enlighten the reader on how biometric technology can provide reliable user authentication, which plays an integral role in providing secure locking system.

Click the button below to INSTANTLY subscribe and download the COMPLETE MATERIAL (PDF/DOC)!

Related Field(s):

Not What You Are Searching For?
Search another topic here

Keywords:
Arduino, Fingerprint
Research Guidelines

Abstract should provide a concise summary of the Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board, including the issue statement, methodology, findings, and conclusion.

Introduction should introduce the Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board by offering background information, stating the problem, aims, research questions or hypotheses, and the significance of the research.

Literature review should present a review of related literature that supports the current research on the Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board, systematically identifying documents with relevant analyzed information to help the researcher understand existing knowledge, identify gaps, and outline research strategies, procedures, instruments, and their outcomes.

References section should list out all the sources cited throughout the Design And Construction Of A Finger Print Door Lock Using Arduino Uno Board, formatted according to a specific citation style.

Others are table of contents, methodology, results, discussion, conclusion, etc…

View complete guideline 👉 {https://uniprojects.net/research-guide}