Enhanced Security Methods of Door Locking Based Fingerprint
Enhanced Security Methods of Door Locking Based Fingerprint
net/publication/338540856
Article in International Journal of Innovative Technology and Exploring Engineering · January 2020
DOI: 10.35940/ijitee.B7855.019320
CITATIONS READS
15 5,161
1 author:
Hashem Al-Nabhi
Northwestern Polytechnical University
3 PUBLICATIONS 18 CITATIONS
SEE PROFILE
All content following this page was uploaded by Hashem Al-Nabhi on 13 February 2020.
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1173 & Sciences Publication
Enhanced Security Methods of Door Locking Based Fingerprint
One more disadvantage of traditional lock is that when II. DESIGN AND IMPLEMENTATION USING
homeowners lose the key and have no alternative key, in this ARDUINO UNO ATMEGA328P
case, they should wait for long hours for a technician to come, Fig. 1. Shows the block diagram of the implemented system
otherwise they should break the door. Another challenge or involving all hardware components that are used to
disadvantage is that when the key is locked away or maybe accomplish the security task. Arduino Uno microcontroller
misplaced inside the house, in this case even authorized board acts as a master and it is the body of our project, while
persons won’t have access to his/her property or belongings. other hardware components act as slaves. The system behaves
This will issue can be solved with the help of technician again according to the written program and performs all mentioned
and may cost the authorized [4]. In addition to providing security actions without human intervention, and all other
access to the target building, personal belongings and automatic operations are carried out. All hardware
important documents at homes or offices can be accessed components are of vital importance for the system to provide
depending on the lock system; personal belongings can be enough security, and all these tools work together under one
very valuable things such as expensive pieces of jewelry, controller.
confidential documents, and money in cash, etc. To overcome
all those challenges and drawbacks in the traditional locks,
smart security systems are developed which provide more
security to the individuals, however, these systems are easy to
use, to access, and can be reliable. Such of these security
systems, the use of smartcards, voice technology, passcode,
and biometrics [5-8]. In this work, we develop a biometric
security system based fingerprint. Biometrics involves the
science which can statistically analyze the biological
characteristics. A biometric system is defined as a technology
that can recognize and verify the identity of a person using a
measurable physical or behavioral characteristic of the
person. There are some conditions to choose characteristics
such as performance, universality, collectability, uniqueness,
acceptability, circumvention and permanence. Some other
characteristics can be used by biometrics such as fingerprint,
eye features, facial features, etc. [9]. Our work developed a
biometric-based fingerprint which involves other
technologies like GSM, cam web, and password keypad
system.
At present, there are six major biometric technologies
available in today’s market. They are Fingerprint recognition,
Hand geometry recognition, Iris and Retina recognition,
Voice recognition, Signature recognition, and Facial
recognition. Of these recognition technologies, facial Fig.1. Block diagram design of biometric-based
recognition, fingerprint recognition, and iris recognition are fingerprint door locking system
the most dominantly used for numerous applications. In this
work, fingerprint recognition technology is considered. III. PREPROCESSING
Fingerprint recognition technology is a technique that’s used the operation of fingerprint-based door locking system
to detect and recognize different human fingerprints based on starts with adding fingerprints features of the authorized
different patterns of fingers, which is found to be unique persons to the database of our system, by placing the finger on
among each person. It is very common and maybe the best the fingerprint optical scanner, some features are extracted
way of obtaining details of any person and identifying a from the finger surface and stored to the database with
person can be done most easily and conveniently [5]-[6]. specific ID and the name of the person can be added, the steps
Study of fingerprints for recognition and identification the of this process are shown in fig.2. The features extracted from
individuals is scientifically called Dactylography. The main the finger surface are different from one person to another,
advantage of the fingerprint recognition method is that each this is because the finger’s surface pattern has different
person has a unique fingerprint pattern that remains the same characteristics related to core, ridges, island, and delta, pore,
and never changes throughout life, making the fingerprint etc. these different characteristics of the fingerprint are
recognition method an unfailing method of human illustrated in fig.3. if we want to check whether the fingerprint
identification. is already registered or not, it can be easily done by placing
The sections of this paper are organized as follows. Section II the finger on the optical scanner and then some features will
discusses the design and implementation of the proposed be extracted from the finger and compared with stored
biometric-based door locking system using Arduino UNO R3. features, if there is a similarity,
Section III explains the preprocessing operations. Section IV.
Flowchart of the entire working process. The hardware results
and discussion are presented in Section V.
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1174 & Sciences Publication
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-9 Issue-3, January 2020
the door will open and if there is no any similarity, the door bulger tried to open the door by placing his or her finger on
won’t open. the scanner, LCD shows that the fingerprint is not identified.
if he/she tries to open the door more than three times the
buzzer will be activated, thus will alert the people who are at
the surroundings. In case he/she tries to break the door, by
shaking, kicking the door or using any other tool, there is a
sensor called Micro Electro Mechanical System which is very
sensitive to small shakes as a result of shakes, it activates the
GSM system to take an action and alert the responsible person
by sending him/her a message as shown in fig. 8. In addition
to that, the camera will record this crime, and with the help of
all those mentioned technologies, it is possible to secure our
homes, banks, and companies from such evil crimes by using
this security system. But if any authorized person tries to open
the door, he/she has to pass through two steps. The first step is
placing the fingerprint for sensing and if it is successfully
recognized, the system passes him/her to the next step that is
entering the password; finally, the door will open and after 5
seconds will automatically close. The whole operation is
Fig.2 .The process of Extracting features from the controlled by the case program without our intervention, our
finger surface and storing them in a database. job is to write the case program, fire it to the microcontroller
board and make the connections between different hardware
components.
IV. FLOWCHART
Fig.4 shows the hardware components of the system and the
connectivity among them which is called the prototype of the
entire system. Fig.5 shows the functional steps of our project,
and all conditions are explained in this section. When the
system is powered on, a sim card should be inserted into the
GSM to be processed for a few seconds, after successful
processing, LCD shows a command that says Network found
as shown in fig. 6, and that means the system is ready to
operate. At this stage, the welcome message will appear in the
LCD screen as shown in Fig. 7. As we mentioned in section
(III), our security system allows us to store the fingerprints
and IDs of all persons who are considered to be registered,
and all the corresponding data is stored in the database. The
system provides double-check security by fingerprint and
password. This security is tested and compared to other
related projects and it is found to be more robust and secured.
Nobody can open the door except the persons whose
fingerprints are available in the database. If any stranger or
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1175 & Sciences Publication
Enhanced Security Methods of Door Locking Based Fingerprint
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1176 & Sciences Publication
International Journal of Innovative Technology and Exploring Engineering (IJITEE)
ISSN: 2278-3075, Volume-9 Issue-3, January 2020
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1177 & Sciences Publication
Enhanced Security Methods of Door Locking Based Fingerprint
Published By:
Retrieval Number: B7855129219/2020©BEIESP
Blue Eyes Intelligence Engineering
DOI: 10.35940/ijitee.B7855.019320 1178 & Sciences Publication
View publication stats