LockiFi Journal

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

LockiFi: Automated Locker Locking System With

Implementation of Fingerprint Sensor

Simon G. Anonuevo Ron Jacob C. Centeno Alejandro Z. Ruel


Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
Technological Institute of the Technological Institute of the Technological Institute of the
Philippines Philippines Philippines
Manila, Philippines Manila, Philippines Manila, Philippines
[email protected] [email protected] [email protected]

Dan Joseph M. Bascon Marc Jelo R. Dela Cruz Vincent John J. Medallo
Department of Computer Engineering Department of Computer Engineering Department of Computer Engineering
Technological Institute of the Technological Institute of the Technological Institute of the
Philippines Philippines Philippines
Manila, Philippines Manila, Philippines Manila, Philippines
[email protected] [email protected] [email protected]

Mon Arjay Malbog


Department of Computer Engineering
Technological Institute of the
Philippines
Manila, Philippines
[email protected]

Abstract—The purpose of this research is to make an


automated locker locking system alternative to a The researchers created a smart locker for the banking
conventional locker padlock that the majority of students sector. It records the date, time, and the number of access
usually pick up as a form of strengthening their security. users on the smart locker in the bank and that is the main
This automated locker locking system has features of having feature of this project. The smart lock system will analyze
a fingerprint module to provide security to make safe the your picture and fingerprint to the data stored in the
important things hidden by the user. The system will detect database. After verifying the user's identity, the
the fingerprint of the user in order to open a locker and it microcontroller is the Arduino that will send a signal to the
will go through to the database to find a match. The lock, allowing it to open. It also sends a notification when
developers meet the goals and objectives of the system and the number of authorized access turns rises during a certain
time period. According to the researcher, it compares
it operates successfully. It was built using the C++
aspects of the test picture with the data image using image
programming language by the developers.
processing techniques. The researcher also integrated a
fingerprint authentication hardware setup that works in
combination with an image processing application to make
Keywords—authentication, fingerprint, smart lock, biometric, this system more secure because it is associated with the
sensor. banking industry[1].

I. INTRODUCTION A Prototype of Automated Vault Locker Solution for


As the development of arduino and homemade tech Industrial Application proposed system will have a double
layer of protection consisting of an automated locking
continues to be developed, there are more and more ideas
system and an extra layer of physical security. The
that can be implemented into various scenarios., given that automated locking system will comprise of a combination of
they have the knowledge to do so. This project aims to a keypad, a fingerprint scanner, an RFID reader and an
provide one of these ideas, namely an automated locking automated door controlling system. The keypad will be used
system, primarily a means or an alternative to a for entering a PIN code for accessing the vault. The
fingerprint scanner will be used to verify the identity of the
conventional locker padlock that the majority of students user and the RFID reader will be used for making sure that
usually pick up as a form of strengthening their security. the user is authorized to open the vault. The extra layer of
This automated locking system will require the student's physical security will contain a motion detector for
fingerprint. It will be the gateway into unlocking the detecting any suspicious activity. If any suspicious activity
respective locker the fingerprint belongs to in the system. It is detected, an alarm will be triggered and the door of the
vault will automatically close. A camera will also be
also allows for a fair bit of modularity, allowing the user to installed to capture the image of the person trying to access
either add or subtract the amount of lockers used in the the vault. The captured image will be stored in a secured
system depending on whether they have the resources or server which can be accessed by authorized personnel only.
not. The proposed system will provide enhanced security and

XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE


will help to prevent unauthorized access to important a secure and efficient locker system for storing valuable
documents and goods. It will also help to monitor the items. The system consists of a central controller
activities of the users and will help to detect any suspicious responsible for managing the overall system and six
activity. The system will also help to reduce the risk of theft individual storage lockers, each with its own unique code
and will help to protect the confidential documents and and RFID tag. The system utilizes several sensors such as an
goods from any unauthorized access[2]. RFID scanner, fingerprint scanner, and proximity sensor to
provide an extra layer of security. The RFID scanner and
Fingerprint-based authentication solutions have fingerprint scanner are used to identify authorized users and
advanced quickly in recent years. Currently, biometric the proximity sensor is used to detect when the locker is
systems relying on fingerprints are vulnerable to serious opened and closed[6].
threats. According to Vivek, Shyam, Adithya, Sriram, and
Nihal(2021), "A DETAILED REVIEW ON FINGERPRINT Multiple advantages can be seen in different studies and
DOOR LOCK SYSTEM" Tokens and passwords are quite projects. In a project entitled Smart Bank Lockers Using
flimsy and are often lost or stolen. One of the most frequent Fingerprint Scanning and Image Processing, it utilizes
reasons for security and data breaches is a bad password. advanced biometric technology to provide a secure and
Even the most secure passwords might be the target of convenient way for customers to store their valuables. This
hacker assaults. The employee may lose productivity if the system uses an advanced fingerprint scanning device to
password reset process takes a lengthy time. The issue can quickly and accurately identify customers. The system also
be resolved via biometrics. It is a technique for identifying utilizes image processing technologies to ensure the safety
or verifying people based on physical or psychological traits of the stored items[7]. Using these technologies, customers
such as the iris, fingerprints, face patterns, DNA, speech can store their items securely and access them easily. The
patterns, and so forth. The study claims that biometrics is a system is designed to be user-friendly, allowing customers
huge upgrade in locking systems due to its uniqueness to quickly and easily set up their locker and store their
depending on who uses it.[3] items. The system also provides an extra layer of security by
requiring customers to enter a PIN code before they can
Security has always been a major concern for access their locker. This system is ideal for banks,
households and the workplace, and various approaches have businesses, and other organizations that require secure
been implemented to address the issue. According to J. storage of their valuable items.
Baidya, etal. (2017) Most major door lock security systems
have several loopholes that could be exploited to gain access A paper by Malathi R. and Jeberson Retna Raj R.(2016)
to the desired locations, raising concerns about a secure talks about how Physical biometric authentication systems
lifestyle and a proper working environment. Furthermore, are becoming increasingly popular in security management.
terrorism and unauthorized access to places have become An integrated approach combines several types of physical
major issues in recent years, necessitating the need for a biometrics such as fingerprints, facial recognition, iris
security system to prevent unauthorized access, particularly scanning, and hand geometry in order to authenticate an
in shared access environments[4]. With this in mind, this individual’s identity. These physical techniques are
paper presents a design and prototype of a biometric combined with sophisticated encryption techniques in order
fingerprint-based door lock system. Biometric systems, such to provide an efficient, secure and cost effective
as fingerprint scanning, provide tools for enforcing authentication solution. This approach allows users to
trustworthy logs of system transactions while also protecting authenticate their identity in an unobtrusive manner, while
an individual’s right to privacy. simultaneously providing added layers of security with the
capacity to authenticate multiple users. Additionally, the
Traditional locks require a physical key and are not as integrated approach allows for simultaneous authentication
secure or convenient. According to Deepak Gulgulia. (2020) of multiple physical biometric authenticators, meaning that
The concept of security has substantially upgraded because any combination of multiple physical attributes can be used
of technological advancements. We have seen a shift from to authenticate the user’s identity. This approach is ideal for
mechanical locks to electronic locks and door access control large organizations such as airports, government offices and
systems which are more relied upon nowadays for the military that require a secure and dependable
watertight security and safety. But, choosing the system that solution[8].
is the best for you requires understanding how both these Biometric fingerprint scanners provide a convenient
technologies work[5]. The number of benefits that modern and secure means of identity authentication. As a result,
access control systems offer is quite evident. They these scanners are becoming increasingly popular for use in
encompass all features of traditional as well as electronic access control for secure areas and for other applications
locks and amplify security to a significant level. Moreover, requiring robust authentication measures. In Mai
biometric access control raises the bar by eliminating the Chengsheng's (2020) paper, it is mentioned that the system
risks of key proximity cards getting stolen and enforcing works by analyzing minutiae points of a user’s fingerprint,
identity-based access so that only the one who is authorized such as the points of convergence and divergence and their
can enter. corresponding patterns, which is then compared to an
existing fingerprint record in a database. This method of
Different locking systems were proposed through authentication is unobtrusive and highly secure, making it
different projects. As an example, a study entitled The Six an ideal choice for a variety of applications[9].
Tier Multipurpose Security Locker System Based on
Arduino has a higher security due to its features. It is a Fingerprint Based Electro-Magnetic Door Lock System
secure and automated storage system that makes use of an proposes a design to provide enhanced security for restricted
Arduino microcontroller and a variety of sensors to provide access areas. The system consists of a fingerprint scanner,
an Arduino board, an electromagnet, an RFID reader, and an 2.2 Flowchart
LCD display. The system is designed to identify authorized
users by their fingerprint and grant them access to the
restricted area. The fingerprint scanner is used to detect and
identify the authorized user and the Arduino board is used to
process the fingerprint data. The electromagnet is used to
open and close the door lock, while the RFID reader is used
to detect the presence of any unauthorized users. The LCD
display is used to display the status of the door lock, i.e., if it
is open or closed. The system is designed to provide
increased security and convenience. The fingerprint based
system ensures that only authorized users can gain access to
the restricted area, while the RFID reader ensures that any
unauthorized users are denied access. The LCD display also
helps in alerting the users about the status of the lock[10].

II. METHODOLOGY
2.1 System Architecture

Figure 1 shows the system architecture of LockiFi:


Automated Locker Locking System With Implementation of
Fingerprint Sensor. This automated locker locking system
has features of having a fingerprint module to provide
security to save the important things hidden by the user. The
image above is the system architecture showing the user
needs to register first their fingerprint to the automated
locker locking system to be recognized by the system. After
the user registered their fingerprint, the user now has access
to unlock the automated locker locking system. Entering the
fingerprint of the user, the system analyzes and the result Fig 2. Flowchart
will be seen on LCD. The lock of the locker will unlock
when the fingerprints match on the registered fingerprint of Figure 2 shows how our system works. The system
starts with the process of detecting a finger user's credentials
the system.
or simply detecting an already existing user's fingerprint to
open its corresponding locker. It is done by the use of 2 push
buttons that correspond to what the user needs. If the user
presses the "Scan" button and then provides a fingerprint
input, then the system will go through its database to find a
match. The corresponding locker will then open for the user.
If the system detects no match for the given fingerprint
input, then it will simply show an error message on the
LCD.
The "Add fingerprint" pushbutton on the other hand
allows users to add a new fingerprint into the system's
database. Once the button has been pressed, the system will
require the presence of a master fingerprint in order to
securely allow the addition of a new fingerprint into the
system. After the master fingerprint has been scanned and
verified, the LCD will show a menu where you can choose
which of the doors/lockers you would assign your
fingerprint to. This process reuses the "Add fingerprint"
button to cycle between the locker options and the "Scan"
button to confirm. When the user has made their choice,
they can now scan their own fingerprint (and a 2nd time for
reconfirmation) to finally be assigned to their locker of
choice.
Fig 1. System Architecture
C. Fingerprint Sensor
2.3 Prototype Fingerprint Sensor used to be the key to each door.
It detects different fingers and matches the exact
fingerprint for each lock[13].
Figure 3 and Figure 4 shows the prototype of the
product using the platform SketchUp; the system consists of D. Servo Motor
a Servo motor, Latch lock, Arduino mega, LCD I2C,
Servo Motor will act as the lock for each door. The
Fingerprint module, Breadboard, LED, and Pushbutton;
motor will turn 0° up to 180° degrees in order to lock the
Shown below is the complete prototype of the product after door[14].
assembling the project. The decision made to design the
project is the concept of how the designers wanted it to E. Push buttons
function and how its appearance will look. Push button will act as the activation for each
function. Other buttons will close the door depending on
what door it was assigned and the 2 buttons will be the
scan to open a door and the other one is for changing and
adding new id’s[15].
2.5 Rule-Based
A rule-based algorithm is a type of algorithm that uses a
set of predetermined rules to determine the output or
solution to a problem. These rules are defined by the user
and act as a set of instructions for the algorithm to follow in
order to find a solution. Rule-based algorithms are used in
many areas such as artificial intelligence, language
processing and natural language understanding. To
determine what decision should be made here are some rules
used in the system:
Figure 3. Prototype model of LockiFi with the list of
components used 1. If (button for scan is pressed) then (system asks for a
finger to open specific door)
2. If (button for adding ID is pressed) then (system will
ask for the new fingerprint to add to the system)
3. If (Fingerprint sensor detects fingerprint with ID 1) then
(servo motor of door 1 will turn 180°)
4. If (Fingerprint sensor detects fingerprint with ID 2) then
(servo motor of door 2 will turn 180°)
5. If (Fingerprint sensor detects fingerprint with ID 3) then
(servo motor of door 3 will turn 180°)
6. If (button for door 1 is pressed) then (servo motor of
door 1 will turn 0°)
7. If (button for door 2 is pressed) then (servo motor of
door 2 will turn 0°)
8. If (button for door3 is pressed) then (servo motor of
door 3 will turn 0°)
Figure 4 Dimensions of the prototype for each sides III. RESULT AND FINDINGS
The testing was conducted by the researchers to measure
2.4 Materials and Components the needs of the whole project. The product is running while
To develop the LockiFi, an automated locking system the 3 researchers put their fingers 10 times to see how
for lockers through biometrics using a fingerprint sensor. accurate the fingerprint is, each three members has to test
The following materials are needed: the fingerprint module and see the percentage on how
A. Arduino Uno confident the system figures each finger. To measure the
accuracy, the test was run 30 times with 3 different fingers.
Arduino Mega is to allow the user to program and Accuracy is defined as:
control a variety of electronics projects such as robots,
lights, and other devices. The Arduino Mega is a 𝑁𝑜. 𝑜𝑓 𝑐𝑜𝑟𝑟𝑒𝑐𝑡 𝑠𝑐𝑎𝑛𝑠
Accuracy =
microcontroller that has much more pins than Arduino 𝑇𝑜𝑡𝑎𝑙 𝑁𝑜. 𝑜𝑓 𝑡𝑒𝑠𝑡𝑠
Mega and Nano. It acts as the controller for input and (equation 1)
output of the design[11].
A. Accuracy Testing
B. Liquid Crystal Display (LCD)
Table I. Accuracy Testing
Liquid Crystal Display (LCD) acts as the device to
display if the finger match is successful and how No. of Fingerprint Confidence Result Output
confident the sensor detects its fingerprint[12]. Test id level(%)
different percentage when it comes to the confidence level
1 1 315% Success Open
and majority of the test gives a success rate.
2 1 154% Success Open A. Testing Result

3 1 147% Success Open Table II. Test Result


Table Column Head
4 1 2% Failed Close Total
Fingerprint Avg.
Number of Success
ID Used Tests confidence
Rate (%)
5 1 221% Success Open level (%)
1 10 169.8% 90%
6 1 207% Success Open
2 10 283.8% 100%
7 1 211% Success Open 3 10 299% 100%

8 1 119% Success Open


The result for table II shows the average percentage on
9 1 136% Success Open each test that has been conducted. I was shown that all of
the success rate between the 3 fingerprint ID are high except
10 1 186% Success Open for the ID 1 with a success rate of 90%, one of the result
shows that the fingerprint was not detected and it doesn’t
11 2 347% Success Open
read the finger that has been used the confidence level was
12 2 263% Success Open
also the lowest compare to the other two ID’s with only
169.8% average confidence level, while for ID 2 its
13 2 272% Success Open confidence level was 283.8% and its success rate is 100%.
Lastly the ID 3 with the highest confidence level averaging
14 2 244% Success Open 299% and its success rate was also 100%

15 2 347% Success Open


To test the product, it was displayed through LCD,
16 2 308% Success Open
where the percentage of the matched fingerprint was shown

17 2 287% Success Open

18 2 223% Success Open

19 2 131% Success Open

20 2 416% Success Open

21 3 287% Success Open

22 3 558% Success Open

23 3 89% Success Open

24 3 326% Success Open

25 3 404% Success Open

26 3 251% Success Open

27 3 433% Success Open

28 3 384% Success Open


Figure 5 Fingerprint testing
29 3 187% Success Open
Figure 5 shows how to simulate the fingerprint and
30 3 71% Success Open show its result through LCD. It can identify if it was
matched to the specified fingers by measuring how
confident the module was to the finger that has been put.
Table I shows the manual testing that was made to test IV. CONCLUSION AND RECOMMENDATION
if the fingerprint is accurate enough to handle locking
systems. It was tested for 30 times and each result shows a
The researchers have come to the conclusion that all of
the project's goals and objectives had been met. The
developers have been able to create an automated locking Engineering and Robotics Technology (ICASERT), 2019, pp. 1-5,
system that implements a fingerprint sensor, all the while doi: 10.1109/ICASERT.2019.8934615.
[7] A. Chikara, P. Choudekar, Ruchira and D. Asija, "Smart Bank Locker
considering the constraints of the project’s accuracy, speed Using Fingerprint Scanning and Image Processing," 2020 6th
and constant. The summary of the findings seen above International Conference on Advanced Computing and
prove that the system in question is able to operate Communication Systems (ICACCS), 2020, pp. 725-728, doi:
efficiently and with little to no problems. The system’s 10.1109/ICACCS48705.2020.9074482.
servo motors work well in being able to act as a locking [8] Malathi R., Jeberson Retna Raj R., An Integrated Approach of
Physical Biometric Authentication System, Procedia Computer
mechanism and the fingerprint scanning system works Science, Volume 85, 2016, Pages 820-826, ISSN 1877-0509,
securely and as intended, being able to store fingerprint data https://doi.org/10.1016/j.procs.2016.05.271.
and call upon it when needed to be used. This way, the [9] Mai, Chengsheng. "Brief Introduction to Biometrics Fingerprint
locking mechanism and the fingerprint system it comes Scanners." Access, 2020,
with, can be utilized in a wide array of containers, https://www.accesscontrol.cn/news/biometrics-fingerprint-scanners.ht
particularly that of lockers used for either schools or other ml.
[10] M. N. Hossain, A. U. Khan Supto, M. M. Faruk and S. K. Biswas,
public places that come into mind. Testing shows that the "Design & Development of Fingerprint Based Electro-Magnetic Door
fingerprint sensor has a high success rate. Three fingerprint Lock System," 2021 12th International Conference on Computing
IDs were utilized for the testing, each being tested a total of Communication and Networking Technologies (ICCCNT), 2021, pp.
10 times with a success rate of 90% for the 1st fingerprint 1-5, doi: 10.1109/ICCCNT51525.2021.9580064.
ID, 100% for the 2nd fingerprint ID and another 100% for [11] Alfiansyah, Indrian & Wardhani, Rini. (2018). Implementation of
Secure Hash Algorithm – 3 for Biometric Fingerprint Access Control
the last fingerprint ID. Based on Arduino Mega 2560. 31-35. 10.1109/ICAITI.2018.8686734.
[12] Sitompul, Dahlan & Sihombing, Poltak. (2022). The LCD Interfacing
An extra set of features can be implemented in the and Programming. 10.5772/intechopen.102408.
future such as the use of a keypad for an extra means of [13] Alazam, Sharaf & Sarea, Hammed & Suhaimi, Muhammad. (2021).
manipulating the lock, making the process of setting each BIOMETRIC AUTHENTICATION USING FINGERPRINT AND
KEYPAD FOR DOOR LOCK SECURTIY SYSTEM. 151-157.
fingerprint and its assignment to a locker be more [14] Wong, Wai & Sia, Boon & Soe, Min. (2022). Storage Locker
ergonomic and easy. Another possibility is the use of an Featuring Voice Activation for Visually Impaired. International
RFID signature to scan with, this can be implemented into Journal of Robotics and Automation Technology. 9. 33-43.
ID cards of which the users may hold onto for another 10.31875/2409-9694.2022.09.05.
means of security and verification. [15] Edwards, Steven. (2013). Illuminated pushbutton switch with
configurable electronic latching features.

ACKNOWLEDGMENT

The researchers would like to show our gratitude to


Engr. Mon Arjay Malbog for guiding and teaching them
how to properly use some components in tinkercad and the
code they need to use for the functions of the components in
the project. He also shared some ideas that could help the
project like the three lockers with one controller. Also, the
researchers would like to thank the Lord for guiding them to
finish the project despite the distance with each other.

REFERENCES

[1] A. Chikara, P. Choudekar, Ruchira and D. Asija, "Smart Bank Locker


Using Fingerprint Scanning and Image Processing," 2020 6th
International Conference on Advanced Computing and
Communication Systems (ICACCS), 2020, pp. 725-728, doi:
10.1109/ICACCS48705.2020.9074482.
[2] S. Hossain, M. I. Ahmed and M. Niaz Mostakim, "A Prototype of
Automated Vault Locker Solution for Industrial Application," 2019
1st International Conference on Advances in Science, Engineering
and Robotics Technology (ICASERT), 2019, pp. 1-6, doi:
10.1109/ICASERT.2019.8934754.
[3] R, Vivek & D, Gokul & R, Jai & Sriram, Mukilan & V, Nihal. (2021).
A DETAILED REVIEW ON FINGERPRINT DOOR LOCK
SYSTEM. International Journal of Engineering Applied Sciences and
Technology. 6. 10.33564/IJERT.2021.v06i04.041.
[4] J. Baidya, T. Saha, R. Moyashir and R. Palit, "Design and
implementation of a fingerprint based lock system for shared access,"
2017 IEEE 7th Annual Computing and Communication Workshop
and Conference (CCWC), 2017, pp. 1-6, doi:
10.1109/CCWC.2017.7868448.
[5] Gulgulia, D. G. (n.d.). Access Control Vs. Traditional Locks: Which
Is Better & How? Security Informed.
https://www.securityinformed.com/insights/access-control-traditional-
locks-co-6184-ga.1633620003.html
[6] A. Z. M. Tahmidul Kabir, N. Deb Nath, U. R. Akther, F. Hasan and T.
I. Alam, "Six Tier Multipurpose Security Locker System Based on
Arduino," 2019 1st International Conference on Advances in Science,

You might also like