Framework Of Fingerprint And Palm Vein On A Lock System

ABSTRACT

Biometric technology is an efficient personal authentication and identification technique. This study proposes a survey of fingerprint and vein recognition techniques. This biometric lock is a lock that uses fingerprint and palm vein to grant genuine user an access to a building, an office, or a libratory. This device solve major problem faced by the conventional lock or electronic combination lock, by adding electronic technology as well as biological technology together, user is the key to the lock. So users do not have to memorize combination as it is in the electronic combination lock, or carry the key along all the time. The aim of this work is to carry out a research on the framework of the biometric using fingerprint and palm vein

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • BACKGROUND OF THE PROJECT
  • PROBLEM STATEMENT
  • AIM/OBJECTIVE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • PROJECT WORK ORGANISATION

CHAPTER TWO

2.0      LITERATURE REVIEW
2.1      REVIEW OF THE STUDY
2.2     EVOLVEMENTS OF LOCK

2.3    TODAY’S LOCK

2.4 GENERAL OVERVIEW OF BIOMETRIC RECOGNITION SYSTEMS

2.6   REVIEW OF RELATED WORK

CHAPTER THREE

3.0       DESIGN METHODOLOGY

3.1      FRAMEWORK OF FINGERPRINT LOCK SYSTEM

3.2     PRINCIPLE AND GENERAL FRAMEWORK OF VEIN RECOGNITION

CHAPTER FOUR

4.0     RESULTS

4.1     PERFORMANCE EVALUATION OF FINGERPRINT LOCK SYSTEM

4.2   PERFORMANCE EVALUATION OF A VEIN RECOGNITION

4.3     APPLICATIONS

4.4       MERITS AND DEMERITS

CHAPTER FIVE

5.1     CONCLUSIONS

5.2     RECOMMENDATION

5.2     REFERENCES

CHAPTER ONE

1.0                  INTRODUCTION

1.1     BACKGROUND OF THE STUDY

Door lock is a very important device; especially in the world we living in today that has a very high crime rate. So locking your door is not enough to secure your safety. According to a study conducted by California crime technological research foundation, it was found that most burglars enter the door. The intruders were asked for the reason of using the door; different answers were obtained but all agreed that conventional lock is easy to get around; either by kicking or picking the lock. Good door lock is one step of making your home or office more secure, so it is a small price to pay to ensure your family and your properties safety. Commercial locks available in the market are valued by their security, reliability and price as well. So the most important factor is security where, it only allows valid users .this is very hard to achieve with the mechanical lock available in the market, where the keyway makes the lock vulnerable to breaking in. When choosing a lock one very important factor is security ,when using a normal lock which operates using a key ,that is not very secure ,first because the key can be easily duplicated secondly this key has a keyway which also makes it susceptible to picking. So lock that operates with a key is not that secure .with the advancements of engineering now it is possible to control anything using the electric circuit .so it possible to have the loc that operate electronically[Grayson Robinson, 2014].

With the industrial revolution that led to the discovery of electricity and a general improvement in technology in the 19th century (Landes, 2019), following various experiments coupled with the advent of computers, saw a huge breakthrough in home security. This was because CCTV (closed-circuit television) systems in conjunction with stationed long focal length cameras were powered on to view home intruders. Though, this made possible to view remote ends for any non-confrontational crimes to get the offenders identified but it equally suffers a lot of hiccups as the intruders could get away with the valuable property without immediate arrest.

Thereafter, most crimes of burglary till date, which are non-confrontational property crimes, occur when we are not at home. The most common threat to our home is burglary. So, protection of home and family from criminal hit should be high on our list of priorities.

In correlation to the aforementioned security consciousness, one can emphatically say that security of homes and properties has been in existence for a long time, but the methods of applying and achieving it have been changing from time to time. Modern security approaches greatly rely on the activities of the intruders which may reveal their presence to a computer-controlled system. First of all, the intruder must enter the building; a door or window is the most logical means of criminal entry point. Sensors are set to detect use of these entrances, an alarm can be triggered when intruder passes or interacts with sensor devices such as microwave detectors, photo-electric beams, glass break detectors, magnetic field detection, electrostatic- field detectors, microwave barriers systems, ultrasonic sensors, and even infrared sensors. Most of these techniques are still in use but instant arrest of the burglars is hardly sometimes possible. The intruder or impostor action is detected through wrong fingerprint and this could prompt a signal to get to the home owner which possibly calls for an instant arrest of the burglars. However, the switch is never closed in the presence of the house occupant or visitor who simply gains access to the door if only his thumb print matches with that stored in the biometric device.

The report covers home security using biometric fingerprinting lock, which is a type of biometric device. The term “biometrics” is derived from the Greek words bio and metric, meaning life and to measure, respectively. Biometrics can be defined as the science of identifying or verifying individuals based on unique physiological or behavioural characteristics. Examples of human traits used for biometric recognition include fingerprints, hand geometry, speech, face, retina, iris, and handwritten signature (Wittich,2013). Biometrics can also be defined as the use of a person’s unique physiological, behavioral and morphological characteristic to provide positive personal identification (Tripathi, 2011). There are two distinct functions for biometric devices:

  1. To prove you are who you say you
  2. To prove you are not who you say you are not. (San Jose State University, 2010). Biometric identification systems are essentially pattern recognition systems. They use acquisition devices such as cameras and scanning devices to capture images, recordings, or measurements of an individual’s characteristics and computer hardware and software to extract, encode, store, and compare these characteristics (Emuoyibofarhe, 2011). Identification systems answer the question, “Who am I?” and do not require that a user claim an identity before biometric comparisons take place. The user provides his or her biometric data, which is compared to data from a number of users in order to find a match. The answer returned by the system is an identity such as a name or ID number (Nanavata et al, 2012) They establish the genuineness of physiological (e.g. face, fingerprint, iris, retina, hand geometry) and behavioural (e.g. signature, gait) characteristics of a person. Biometric recognition is an upcoming and promising field with great commercial magnitude. It is an extremely reliable source identification system as it is based on what we are rather than what we Biometrics technology is without a doubt a more efficient way of authentication than the more common use of pass words, smart cards, or a combination of the two.

This study proposes a survey of fingerprint and vein recognition techniques used in locking system.

1.2                                PROBLEM STATEMENT

Problems with the convention lock are; they are easy to pick if intruders don not have a key. If intruders have the key then it is very easy to gain an access anytime which lead to the change of the lock .further more it is very easy to duplicate. Having a combination door lock is a better idea; using this type of lock will eliminate the need of having a key but create other issues, like forgetting People use human characteristics to identify each other such as face, voice and, gait for thousand years. Alphonse Bertillon, chief of criminal identification division of the police department in Paris, came up with the idea of using a number of body measurements to spot criminal in the mid-19 century .this idea started to gain popularity and it led the discovery of the human fingerprint. Fingerprint or palm is part of the science known today as biometrics. Biometrics is identification of a person based on the person’s distinctive physiological, anatomical and or behavioral characteristics. Biometrics was invented to enhance security and reduce financial fraud [Jain, 2014].

Security systems are vital for protection of information, property, and prevention from theft or crime. From data centers to banks; security systems have become a necessity. Home security systems are also or commercial security system. Lock protects the life and properties of everyone in today’s world. Where the rate of crime and theft are exponential increasing everyday everyone need to use the lock. Throughout history people used lock for the same reason people using it today, which is security. This work will discuss the framework of protection system using biometric – fingerprint and palm, which came to solve the problem seen in other means of locking system.

1.2                     AIM AND OBJECTIVE OF THE WORK

The objective of this paper is to develop a biometrics lock device, which is able to acquire the paper focuses on having a secure lock .where only users with valid fingerprint can gain access.

The objectives are:

  1. To increase the security level to prevent anØ unauthorized unlocking of the door
  2. To study the application and different types of biometric
  • To give user more secure yet cost-efficient way of door locking system

1.4                                  SCOPE OF THE STUDY

Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of finger print and vein recognition techniques. The basic principle, key techniques, performance evaluation metrics, application fields and future trends are extensively analyzed.

1.5                           SIGNIFICANCE OF THE STUDY

This study will throw light on the uniqueness of biometric system used in the lock system. This study will expose and demonstrate evolvement of the lock form a very simple piece of wood to an electronic lock and brief introduction to biometrics-fingerprint and palm vein. This study will enlighten the reader on how biometric technology can provide reliable user authentication, which plays an integral role in providing secure locking system.

2.0 INTRODUCTION:

This chapter provides the background and context of the research problems, reviews the existing literature on the Framework Of Fingerprint And Palm Vein On A Lock System, and acknowledges the contributions of scholars who have previously conducted similar research [REV3017] …

Document Information

  • Format: DOC/PDF
  • Title: Framework Of Fingerprint And Palm Vein On A Lock System:

YOU MAY LOVE THESE (Recommended)

Posted under:

To start a project on Production of Alkali Using Local Raw Material (palm inforescence), follow these guidelines: The project aims to develop a flow process to obtain the optimum temperature and time necessary for the maximum recovery of alkali present in palm inflorescence. On this ground, a preliminary experiment was performed. During this process, both male and female palm inflorescence were compared for …

85 Pages 1 - 8 Chapters 8,424 Words DOC/PDF Format Instant Download UPN1167

To develop a project on Margarine Production Using Oil Blends From Palm Kernel, Coconut And Melon, follow these approaches: Palm kernel, coconut and melon oils were extracted and refined. Their physical and chemical characteristics were examined. The refined oils were blended to produce three samples of margarine: palm kernel oil margarine (PKO), palm kernel and coconut oils margarine were tested for free fatty acid a…

100 Pages 1 - 5 Chapters 12,650 Words DOC/PDF Format Instant Download UPN2088

To undertake a project on Isolation And Performance Evaluation Of Saccharomyces Cerevisiae From On Palm Wine Elaels Guinneensis At Different Temperature Of Proofing During Bread Making, follow these effective ways: Saccharomyces cerevisiae was isolated from the fermenting sap of flaeis guinneensis. The yeast isolate was used in dough proofing at different temperatures. The samples B, C, D, E, and F, (containing the same ingredients) were leavened at 200 c, 250 c, 300 c and 40 c respectively. Similarly, samp…

57 Pages 1 - 5 Chapters 7,490 Words DOC/PDF Format Instant Download UPN2086

How to structure the “Formulation And Production Of Alcohol From Palm Wine” Project

Posted under:

To write a project on Formulation And Production Of Alcohol From Palm Wine, follow these structure: This research work was arrived as the formulation and production of ethanol (ethyl alcohol) from the fermentation of palm wine. A fresh palm wine was ated which was obtained from Emene in Enugu State. The characteristics that was tested before and after fermentation were; specific gravity, refrac…

95 Pages 1 - 5 Chapters 11,787 Words DOC/PDF Format Instant Download UPN2326

Posted under:

To carry out a project on Evaluation Of Mechanical Properties Of Palm Oil Fuel Ash (Pofa) Blended – Granite – Gravel Concrete, follow these effective methods: Utilizing Palm Oil Fuel Ash (POFA) in concrete mix is a major way of turning waste to wealth. Gravel as an aggregate is cheaper than granite. Thus, obtaining an optimum combination of these materials in achieving a maximum compressive strength in concrete will go a long way in helping the constru…

71 Pages 1 - 5 Chapters 11,850 Words DOC/PDF Format Instant Download UPN2295

To start a project on Effect Of Temperature On The Viscosity Of Palm Kernel Oil, A-Z Oil, Red Oil And Water, follow these guidelines: A study was conducted to investigate the relationship between temperature (20 oC to 100 oC) on the viscosities palm kernel oil, a-z oil, red oil and water. The viscosities of this different vegetable oil and water were determined using Model 3500LS viscometer, at a shear rate of 30 rpm. The mean …

63 Pages 1 - 5 Chapters 6,310 Words DOC/PDF Format Instant Download UPN4062

Posted under:

To develop a project on Design And Implementation Of Radio Controlled Car Lock With 5min Ignition Deactivation, follow these approaches: The rate of car theft nowadays according to daily crime analysis is on the increase. Manual key locks have proven to be inefficient. This thesis aims at designing a radio-controlled car door locking system. The two main objectives are to unlock a set of vehicle doors when the owner approaches his…

74 Pages 1 - 5 Chapters 14,507 Words DOC/PDF Format Instant Download UPN2231

Posted under:

To undertake a project on Design And Implementation Of A Smart Door Lock System Using Finger Print, follow these effective ways: Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biomet…

42 Pages 1 - 5 Chapters 5,726 Words DOC/PDF Format Instant Download UPN2968

To write a project on Design And Construction Of Microcontroller Based Digital Combinational Lock System, follow these structure: Due to the advancement in science and technology all over the world, there is a significant increase in the rate of crime and sophistication in crimes; as a result, it is necessary to ensure the security of one’s self and one’s valuable belongings. The main goal of this paper is aimed at creating…

59 Pages 1 - 5 Chapters 7,147 Words DOC/PDF Format Instant Download UPN2914

Posted under:

To carry out a project on Comparative Study Of Compressive Strengths Of Palm Kernel Shell Concrete Using Different Curing Methods, follow these effective methods: This study considered comparative study of different methods of curing on compressive strength of concrete using palm kenel shell. Concrete cube specimens of mix 1:1:2 were prepared with water-cement ratio of 0.55. The cubes were cured using four methods (Ponding curing, Sprinkling curing, Wet-cu…

40 Pages 1 - 5 Chapters 4,102 Words DOC/PDF Format Instant Download UPN2269

Live Chat