Framework Of Fingerprint And Palm Vein On A Lock System

The integration of fingerprint and palm vein recognition in a lock system establishes a sophisticated and robust security framework. This innovative approach leverages biometric technology, utilizing the unique physiological features of an individual’s fingerprint and palm vein patterns to authenticate and authorize access. Fingerprint recognition, based on the distinct ridges and valleys on the fingertip, and palm vein recognition, relying on the intricate vascular patterns beneath the skin’s surface, collectively enhance the security of the lock system. By employing this cutting-edge biometric framework, the lock system ensures a high level of accuracy and reliability in identity verification, mitigating the risk of unauthorized access. This dual biometric authentication not only heightens security measures but also provides a seamless and user-friendly experience, making it a progressive solution for access control in various domains, such as residential, commercial, and institutional settings.

ABSTRACT

Biometric technology is an efficient personal authentication and identification technique. This study proposes a survey of fingerprint and vein recognition techniques. This biometric lock is a lock that uses fingerprint and palm vein to grant genuine user an access to a building, an office, or a libratory. This device solve major problem faced by the conventional lock or electronic combination lock, by adding electronic technology as well as biological technology together, user is the key to the lock. So users do not have to memorize combination as it is in the electronic combination lock, or carry the key along all the time. The aim of this work is to carry out a research on the framework of the biometric using fingerprint and palm vein

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWELDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • BACKGROUND OF THE PROJECT
  • PROBLEM STATEMENT
  • AIM/OBJECTIVE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • PROJECT WORK ORGANISATION

CHAPTER TWO

2.0      LITERATURE REVIEW
2.1      REVIEW OF THE STUDY
2.2     EVOLVEMENTS OF LOCK

2.3    TODAY’S LOCK

2.4 GENERAL OVERVIEW OF BIOMETRIC RECOGNITION SYSTEMS

2.6   REVIEW OF RELATED WORK

CHAPTER THREE

3.0       DESIGN METHODOLOGY

3.1      FRAMEWORK OF FINGERPRINT LOCK SYSTEM

3.2     PRINCIPLE AND GENERAL FRAMEWORK OF VEIN RECOGNITION

CHAPTER FOUR

4.0     RESULTS

4.1     PERFORMANCE EVALUATION OF FINGERPRINT LOCK SYSTEM

4.2   PERFORMANCE EVALUATION OF A VEIN RECOGNITION

4.3     APPLICATIONS

4.4       MERITS AND DEMERITS

CHAPTER FIVE

5.1     CONCLUSIONS

5.2     RECOMMENDATION

5.2     REFERENCES

CHAPTER ONE

1.0                  INTRODUCTION

1.1     BACKGROUND OF THE STUDY

Door lock is a very important device; especially in the world we living in today that has a very high crime rate. So locking your door is not enough to secure your safety. According to a study conducted by California crime technological research foundation, it was found that most burglars enter the door. The intruders were asked for the reason of using the door; different answers were obtained but all agreed that conventional lock is easy to get around; either by kicking or picking the lock. Good door lock is one step of making your home or office more secure, so it is a small price to pay to ensure your family and your properties safety. Commercial locks available in the market are valued by their security, reliability and price as well. So the most important factor is security where, it only allows valid users .this is very hard to achieve with the mechanical lock available in the market, where the keyway makes the lock vulnerable to breaking in. When choosing a lock one very important factor is security ,when using a normal lock which operates using a key ,that is not very secure ,first because the key can be easily duplicated secondly this key has a keyway which also makes it susceptible to picking. So lock that operates with a key is not that secure .with the advancements of engineering now it is possible to control anything using the electric circuit .so it possible to have the loc that operate electronically[Grayson Robinson, 2014].

With the industrial revolution that led to the discovery of electricity and a general improvement in technology in the 19th century (Landes, 2019), following various experiments coupled with the advent of computers, saw a huge breakthrough in home security. This was because CCTV (closed-circuit television) systems in conjunction with stationed long focal length cameras were powered on to view home intruders. Though, this made possible to view remote ends for any non-confrontational crimes to get the offenders identified but it equally suffers a lot of hiccups as the intruders could get away with the valuable property without immediate arrest.

Thereafter, most crimes of burglary till date, which are non-confrontational property crimes, occur when we are not at home. The most common threat to our home is burglary. So, protection of home and family from criminal hit should be high on our list of priorities.

In correlation to the aforementioned security consciousness, one can emphatically say that security of homes and properties has been in existence for a long time, but the methods of applying and achieving it have been changing from time to time. Modern security approaches greatly rely on the activities of the intruders which may reveal their presence to a computer-controlled system. First of all, the intruder must enter the building; a door or window is the most logical means of criminal entry point. Sensors are set to detect use of these entrances, an alarm can be triggered when intruder passes or interacts with sensor devices such as microwave detectors, photo-electric beams, glass break detectors, magnetic field detection, electrostatic- field detectors, microwave barriers systems, ultrasonic sensors, and even infrared sensors. Most of these techniques are still in use but instant arrest of the burglars is hardly sometimes possible. The intruder or impostor action is detected through wrong fingerprint and this could prompt a signal to get to the home owner which possibly calls for an instant arrest of the burglars. However, the switch is never closed in the presence of the house occupant or visitor who simply gains access to the door if only his thumb print matches with that stored in the biometric device.

The report covers home security using biometric fingerprinting lock, which is a type of biometric device. The term “biometrics” is derived from the Greek words bio and metric, meaning life and to measure, respectively. Biometrics can be defined as the science of identifying or verifying individuals based on unique physiological or behavioural characteristics. Examples of human traits used for biometric recognition include fingerprints, hand geometry, speech, face, retina, iris, and handwritten signature (Wittich,2013). Biometrics can also be defined as the use of a person’s unique physiological, behavioral and morphological characteristic to provide positive personal identification (Tripathi, 2011). There are two distinct functions for biometric devices:

  1. To prove you are who you say you
  2. To prove you are not who you say you are not. (San Jose State University, 2010). Biometric identification systems are essentially pattern recognition systems. They use acquisition devices such as cameras and scanning devices to capture images, recordings, or measurements of an individual’s characteristics and computer hardware and software to extract, encode, store, and compare these characteristics (Emuoyibofarhe, 2011). Identification systems answer the question, “Who am I?” and do not require that a user claim an identity before biometric comparisons take place. The user provides his or her biometric data, which is compared to data from a number of users in order to find a match. The answer returned by the system is an identity such as a name or ID number (Nanavata et al, 2012) They establish the genuineness of physiological (e.g. face, fingerprint, iris, retina, hand geometry) and behavioural (e.g. signature, gait) characteristics of a person. Biometric recognition is an upcoming and promising field with great commercial magnitude. It is an extremely reliable source identification system as it is based on what we are rather than what we Biometrics technology is without a doubt a more efficient way of authentication than the more common use of pass words, smart cards, or a combination of the two.

This study proposes a survey of fingerprint and vein recognition techniques used in locking system.

1.2                                PROBLEM STATEMENT

Problems with the convention lock are; they are easy to pick if intruders don not have a key. If intruders have the key then it is very easy to gain an access anytime which lead to the change of the lock .further more it is very easy to duplicate. Having a combination door lock is a better idea; using this type of lock will eliminate the need of having a key but create other issues, like forgetting People use human characteristics to identify each other such as face, voice and, gait for thousand years. Alphonse Bertillon, chief of criminal identification division of the police department in Paris, came up with the idea of using a number of body measurements to spot criminal in the mid-19 century .this idea started to gain popularity and it led the discovery of the human fingerprint. Fingerprint or palm is part of the science known today as biometrics. Biometrics is identification of a person based on the person’s distinctive physiological, anatomical and or behavioral characteristics. Biometrics was invented to enhance security and reduce financial fraud [Jain, 2014].

Security systems are vital for protection of information, property, and prevention from theft or crime. From data centers to banks; security systems have become a necessity. Home security systems are also or commercial security system. Lock protects the life and properties of everyone in today’s world. Where the rate of crime and theft are exponential increasing everyday everyone need to use the lock. Throughout history people used lock for the same reason people using it today, which is security. This work will discuss the framework of protection system using biometric – fingerprint and palm, which came to solve the problem seen in other means of locking system.

1.2                     AIM AND OBJECTIVE OF THE WORK

The objective of this paper is to develop a biometrics lock device, which is able to acquire the paper focuses on having a secure lock .where only users with valid fingerprint can gain access.

The objectives are:

  1. To increase the security level to prevent anØ unauthorized unlocking of the door
  2. To study the application and different types of biometric
  • To give user more secure yet cost-efficient way of door locking system

1.4                                  SCOPE OF THE STUDY

Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of finger print and vein recognition techniques. The basic principle, key techniques, performance evaluation metrics, application fields and future trends are extensively analyzed.

1.5                           SIGNIFICANCE OF THE STUDY

This study will throw light on the uniqueness of biometric system used in the lock system. This study will expose and demonstrate evolvement of the lock form a very simple piece of wood to an electronic lock and brief introduction to biometrics-fingerprint and palm vein. This study will enlighten the reader on how biometric technology can provide reliable user authentication, which plays an integral role in providing secure locking system.

Save/Share This On Social Media:
More About Framework Of Fingerprint And Palm Vein On A Lock System Material

Author: See the writer of ‘Framework Of Fingerprint And Palm Vein On A Lock System’ name on the first page of the downloaded file.

Acknowledgement: You must acknowledge and reference the writer of Framework Of Fingerprint And Palm Vein On A Lock System on your acknowledgement and reference pages respectively.

Upload Similar: You can upload any content similar to Framework Of Fingerprint And Palm Vein On A Lock System and get paid when someone downloaded the material.

Download: Click on “Donate & Download” under this Framework Of Fingerprint And Palm Vein On A Lock System Title and you will be redirected to download page after the donation or chat with Us for alternative methods.

Content Size: Framework Of Fingerprint And Palm Vein On A Lock System contains , and .