0% found this document useful (0 votes)
28 views11 pages

Simulationand Constructionof Fingerprint Vehicle Starter System Using Microcontroller

Uploaded by

Ravikirana V S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views11 pages

Simulationand Constructionof Fingerprint Vehicle Starter System Using Microcontroller

Uploaded by

Ravikirana V S
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/364814501

Simulation and Construction of Fingerprint Vehicle Starter System Using


Microcontroller

Article · October 2022


DOI: 10.51244/IJRSI.2022.9912

CITATIONS READS

0 1,948

4 authors, including:

Samson Yusuf Dauda Ibrahim Umar


Nasarawa State University Keffi Nieria Federal College of Education (Technical) Gombe
98 PUBLICATIONS 511 CITATIONS 17 PUBLICATIONS 18 CITATIONS

SEE PROFILE SEE PROFILE

A. Z. Loko
Nasarawa State University
50 PUBLICATIONS 72 CITATIONS

SEE PROFILE

All content following this page was uploaded by Samson Yusuf Dauda on 28 October 2022.

The user has requested enhancement of the downloaded file.


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705

Simulation and Construction of Fingerprint Vehicle


Starter System Using Microcontroller
Samson Dauda Yusuf *1, Ahmed Dalhatu2, Ibrahim Umar3, Abdulmumini Zubairu Loko4
1,3,4
Department of Physics, Nasarawa State University Keffi, Nigeria
2
ICT/Technical Service Department, News Agency of Nigeria, Abuja, Nigeria
*Correspondence

Abstract: The rising number of vehicle thefts is becoming an issue 2018 In the UK, and between 2015 and 2017, 697,000 motor
particularly in Nigeria where the security system is porous. vehicles were stolen in the EU.
Vehicle security system has become very important and vital in
providing personal security for our cars. In this study, simulation In the case of Nigeria, data from the National Bureau of
and construction of a fingerprint vehicle starter system was Statistics (NBS) has shown that 2,544 vehicles were stolen
carried out using Arduino Uno ATmega328 microcontroller. The between 2013 and 2015, out of which only 1,377 vehicles
circuit was simulated using Proteus ver8.0 via Arduino compiler were recovered, while the unrecovered 1,167 stolen vehicles
programming language using embedded C language. The stages amounted to a loss of about N1.8 billion to the vehicle owners
of the circuit consisting of regulated power supply, fingerprint
[6]. In addition, the level of insecurity is growing in an
module, microcontroller, LCD, motor output driver, and buzzer
unit. The hardware prototype of the circuit was constructed on a
alarming rate as statistics have shown that as of March 2022,
PCB board and performance evaluated test was carried out with Nigerians reported to be most worried about muggers and
150 trials in 5 stages, with 4 authorized users and 1 unauthorized robbers at a concern level about 66.04 points, while worries
user. The specificity, sensitivity and accuracy of the device was about car stolen stood at 59.92 points on a scale from zero to
calculated. Results shows that, the sensitivity, specificity and 100 [7]. Thieves are constantly devising new and
accuracy were 96%, 97% and 97%. This implies that finger print sophisticated means and tactics of stealing autos including
vehicle detector will correctly accept and give access to 96% acquiring smart keys, which eliminated hot-wiring to steal
authorized users, correctly deny 97% unauthorized users, but cars; switching vehicle identification numbers; and using
will fail to accept 4% authorized users, and give access to 3%
stolen identities to secure loans for expensive vehicles [5].
unauthorized users. Also, vehicle starting using the constructed
device is only successful for authenticated users and we are 97%
Even though, keys are being gradually replaced by push start
sure. Evaluation carried out under the measured performance buttons [8], automobile security system still remains an
metrics were able to be compared and analyze distribution scores essential deal in this present days [9]. There is need for a more
of both authorized and unauthorized users with satisfactory robust security in form of personal security system that is
result. The device can be recommended for vehicle security and cheap and efficient to safeguard our vehicles from
other similar operations. unauthorized access and thefts.
Keywords: Fingerprint module, vehicle starter, microcontroller, The uses of biometric based system have been in the
motor driver, Proteus design suit, Arduino Uno increase especially in security systems where they are used to
I. INTRODUCTION provide secured access to major functioning systems like
ATM, cellular phones, cars, laptops, offices, and other

T he development of steam engine is one of the greatest


technology of the 17th century and is the iconic invention
of the industrial revolution [1, 2]. Though cars are an
systems that need authorized access [10]. Biometric have
made significant changes in security systems because its
chances of being duplicated are very less, relatively easier to
expensive commodity but they keep us on the road safely, maintain, efficient, and cheap, as such, making them more
gives us convenience, as well as style. Though, keys ought to secure than before [10, 11]. Many methods are used in
be carried about and misplacing keys or losing them will Biometrics, but the most important are: Palm, Fingerprint, Iris,
result to multiple users using the vehicle without the owner’s Voice, and Face [12]. However, fingerprint sensors are quite
consent, or the car can be stolen if it falls in the wrong hands. cheap in comparison to other biometric sensors and they are
In addition, keys may be duplicated and with the rising relatively easier to maintain [13]. The biometric fingerprint
statistics of car theft, one tends to wonder if we are offering security system is widely used due to its accurate
our cars enough protection [3]. In 2020, New Zealand had the identification, easy to use, low cost, high performance,
highest car theft rate worldwide, with 1,172 occurrences per customizable and reliability [14]. The use of biometric-based
100,000 inhabitants, followed by Uruguay, Italy and the security for automotive industry ensures that car hijacking or
United States [4]. In 2020 about 810,400 vehicles were stolen snatching on highway, car theft due to easy access to a car’s
in the US amounting to $7.4 billion lost and there were functional system can be reduced by using a biometric system
229,339 vehicle thefts with keys between 2016 and 2018 [5]. for starting the car’s engine as protection and access
According to Kuadli [3], car break grew in statistics by 9% in restriction [15]. The objective of this study is to simulate and

www.rsisinternational.org Page 135


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
construct a fingerprint vehicle starter system using a will be removed to realize a smoothened signal using DC
microcontroller. Since naturally each person’s fingerprint is power filter circuits. 12V is used to power the relay/motor unit
different to another, the system will only allow authorized with 12V but regulated to 5V to power the microcontroller.
users to start the vehicle [16]. The study will be significant to The power supply unit is shown in Figure II.
individual vehicle owners for a more secured and reliable
vehicle security system that economically cuts the technology
cost and reduce car theft.
II. MATERIALS AND METHODS
A. Materials
Fig. II The regulated power supply unit
The materials and their specification that were used for the
simulation and construction of fingerprint vehicle starter 2) The Fingerprint Module Unit: The fingerprint sensor/
system includes microcontroller ATMega328, IC7805 voltage module is an electronic device used to capture a digital image
regulator, IC L293D motor driver, 5V dc motor, BC547BP of the fingerprint pattern [17]. Types are; optical, capacitive,
transistor, 5V piezoelectric buzzer, DT830D digital mechanical, thermal and dynamic output constructed in either
multimeter, computer laptop, 175x67x8mm Bread board, stagnant or moving form. An optical biometric fingerprint
100x86mm PCB, 116MHz clock, R305 fingerprint sensor, reader (R305) module with TTL UART interface for direct
12V battery, 2-30A relay, LCD LM16X212 display, Arduino connections to a 3.3v or 5v microcontroller was used in this
Uno board, and Proteus 8.0 software. work. The user can store the fingerprint data in the module
with the aid of a powerful Digital Serial Port (DSP) in its core
B. Methods
and can be configured in 1:1 or 1: N mode for identifying the
The methods for implementation of the fingerprint vehicle person. We can communicate with it using a packet of hex
starter system was carried out in three (3) parts including codes in a specific format but commands for operation can
software design, hardware construction and circuit analysis vary from module to module. Pins 1 – 4 are for serial
(testing). communication with default baud rate of 57600bps. Pins 5 – 8
are for USB communication [18, 19]. The module pins
B.1 Software Design Method
function is shown in Table I. The module has power DC 3.6V-
The software design for the system includes circuit 6.0V, working current 100mA, character file size: 256 bytes,
simulation, algorithm, flow chart, and choice of programming image acquiring time: <0.5s, storage capacity: 256, security
language. level: 5 (low to high: 1, 2, 3, 4, 5), False Accept Rate (FAR):
<0.001%, False Reject Rate (FRR): <0.1%, average searching
B.1.1 Simulation Method
time: < 0.8s, window dimension: 18mm*22mm, baud rate is
The simulation of the fingerprint vehicle starter system was (9600*N) bps, N = 1 – 12 (default N = 6). Therefore, user
carried out in Proteus ver8.0. The process was carried out may set the baud rate in 9600 – 115200bps [19, 20]. The
according to the block diagram shown in Fig. I. The stages in fingerprint module unit is shown in Fig. III.
the implementation includes regulated power supply,
fingerprint module, microcontroller, LCD display, motor
output driver, and buzzer unit.

Fig. III The R305 fingerprint module unit [18]


Table I. The R305 Module Pins Function [18]
Fig. I Block Diagram of the proposed system
Pin No. Name Function
1) Power Supply Unit: The power supply is an electrical 1 VCC Power Input
device that supplies electric power to an electrical load. The 2 GND Signal Ground
voltage from the main source is 220V AC but some sections 3 TD Data Output TTL Logic
of the circuit will need 5V DC. Therefore, a step-down 4 RD Data Input TTL Logic
transformer is needed to get 12V AC from 220V which can be 5 VCC +5 VDC
rectified to 12V DC using a rectifier. The result of the rectifier 6 D- Data -
still comprises of some distortions despite that it is a DC 7 D+ Data +
signal and as such it is called as fluctuating DC. The ripples 8 GND Ground

www.rsisinternational.org Page 136


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
3) Liquid Crystal Display Unit: The Liquid Crystal Display Arduino IDE uses a simplified version C++, making it easier
(LCD) screen is an electronic display module. A 16x2 LCD to learn the program [23]. In this work, the Arduino Uno
display LM16X212 was used. It displays 16 characters per based on Atmel ATmega328P was used. It is a high
line and there are 2 such lines. Each character is displayed in performance, low power, 32K 8-bit microcontroller based on
5x7 pixel matrix. The 16x2 intelligent alphanumeric dot the AVR architecture. Comprising 131 instructions executed
matrix display is capable of displaying 224 different in a single clock cycle, providing a throughput of almost 20
characters and symbols [21]. This LCD has two registers, MIPS at 20MHz. It comes in a PDIP 28 pin package suitable
namely, Command and Data registers. Command register for use on our 28 pin AVR development board. It has 32kB of
accepts and stores various commands or instructions given to programmable flash, 1kB of EEPROM, 2kB SRAM, 10,000
the LCD while data register stores data to be displayed by the write and erase cycles for flash and 100,000 for EEPROM,
LCD. In Arduino project, Liquid Crystal Library simplifies and data retention for 20 years at 85°C and 100 years at 25°C
the process of controlling the display, hence, there is usually [24]. The microcontroller unit is shown in Fig. VI.
no need to know the low-level instructions [22]. However, the
contrast of the display can be adjusted by adjusting the
potentiometer to be connected across VEE pin. The LCD is
used in this study to displays the state of the motor and user
authentication. Fig. IV shows the 16x2 LCD unit.

Fig. IV The LCD LM16X212 Unit Fig. VI Atmel ATmega328P Microcontroller unit

4) The Buzzer Unit: This is an audio signaling device, which 6) The Motor Output Driver Unit: The motor driver is a
may be mechanical, electromechanical, magnetic, device or group of devices that serves to govern in some
electromagnetic, electroacoustic or piezoelectric [28]. An predetermined manner the performance of an electric motor. It
active buzzer, piezoelectric type, which will buzz at a is an integrated chip that is usually used to control motors in
predefined frequency (2300 tolerance of 300Hz) on its own autonomous robots. It acts as an interface between Arduino
when a steady DC power is applied, is used in this work since and the motors [25]. A Motor Driver IC L293D was used in
its element may be driven by an oscillating electronic circuit this system. It is a dual H-bridge motor driver integrated
or another audio signal source, driven with a piezoelectric circuit (IC). Motor drivers act as current amplifiers since they
audio amplifier. A beep will indicate unauthorized, or take a low-current control signal and provide a higher-current
unregistered or unauthenticated fingerprint. The buzzer circuit signal. This higher current signal is used to drive the motors
is shown in Fig. V. [26, 27]. A simple 5V DC motor used in this work to serve as
an illustration of vehicle to generate rotational motion. The
circuit diagram of the motor output driver is shown in Fig.
VII.

Fig. V The buzzer unit

5) The Microcontroller Unit: The Arduino is an open source


platform used for building electronics projects, it consists of a
physical programmable circuit board (often referred to as a
microcontroller) and a piece of software, or IDE (Integrated
Development Environment) that runs on your computer, used
to write and upload computer code to the physical board. The Fig. VII The Motor driver IC L293D [27]

www.rsisinternational.org Page 137


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
B.1.2 Flowchart B.1.6. Fingerprint Detection
The flowchart for the fingerprint vehicle starter system is The fingerprint detection method in this study is the pattern
shown in Fig. VIII. and minutia algorithms method, where the fingerprint pattern
is determined by the pattern algorithm from one of the three
options; an arch, a loop, or a whirl. The fingerprint ridges
themselves are analysed by the minutia algorithm, which
involves ridge endings, or where the ridges end, bifurcation,
or where ridges split, whether short or dot ridges, which are
shorter than the average ridge size. According to Maio and
Maltoni [30], automatic minutiae detection is an extremely
critical process, especially in low-quality fingerprints where
noise and contrast deficiency can originate pixel
configurations similar to minutiae or hide real minutiae.
Although, different from each other, all these methods
transform fingerprint images into binary images. Comparing
with original technique, based on ridge line following, the
minutiae are extracted directly from gray scale images and the
results achieved are compared. Despite a greater conceptual
complexity, the method performs better in terms of efficiency
and robustness.
B.2. Hardware Construction Method
Fig. VIII Flowchart of the proposed System The circuit construction was carried out in stages according
B.1.3. Algorithm to the block diagram shown in Figure I. The components were
first assembled on electronics breadboard to ensure proper
The algorithm that explains the flowchart for the fingerprint terminal connections and then transferred on to a PCB board
vehicle starter system is presented as follows: for permanent soldering using the soldering iron and MBO
1mm wire lead solder, +183°C melting point. However, too
1. Start
much Lead was avoided to prevent clumsiness and bridging of
2. Press Enter button
the component to each another.
3. Place finger to scan fingerprint
4. If the image match with pre-loaded image, then start B.3. Circuit Testing Method
the engine
5. If not, go back to no.1 and give no output Components testing was carried out before fixing them on
6. Stop the PCB board. Also Continuity test and Power ON test were
carried out during construction to ensure proper functioning of
B.1.4. Choice of Programming Language the circuit and to ensure that no components in the circuit
undergo heating when the device is in use and also to avoid
The basic software program is written via the Arduino
loading and impedance mismatch of one stage and another.
programming language using embedded C language. The
choice of C language programming was chosen because it is B.3.1. Continuity Test
more compatible with the Arduino programming software.
This is widely used in programming language for embedded This test is performed to find any electrical open paths in
microcontrollers. C language is also used mainly to implement the circuit after the soldering. The continuity test was carried
those portion of the code where very timing accuracy, code out to make sure no cable or line jammed and all lines have
size efficiency are key requirements. free flow of electrons. It helps the researcher to check and see
if current flows in the constructed circuit or the lines are
B.1.5. Fingerprint Registration continuous. The test can be performed by using a multi meters
which measure current and specialized continuity testers
In setting up the input of the fingerprint, a fingerprint must
which are cheaper, or generally with a simple light bulb that
be registered (entered) twice by the same finger. The two are
lights up when current flows or even a piezo electric speaker.
stored as a template, to improve the system's fault tolerance
If electron flow is inhibited by broken conductors, damaged
[29]. In the two entry process, in case the deviation of the
components, or excessive resistance, the circuit is "open". We
contact occurs in the fingers and the entry slot becomes too
used a multi meter to perform this test in this study.
large, the system will deny registration and consider them as a
different fingerprint. Also if two finger entry positions change B.3.2. Power ON Test
a little, the system may collect them exactly as same
fingerprint and deny the registration. This test is carried out to ascertain whether the voltage at
the different terminals is according to the requirement or not.
It was carried out without microcontroller to protect the

www.rsisinternational.org Page 138


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
microcontroller from damage by any excessive voltage and Sensitivity, (2)
possible heat [31]. In this study, a multi meter was used to
Accuracy, (3)
carry out this test.
III. RESULTS
B.3.3. Performance Evaluation Test
A. Simulation Result
The performance evaluation was carried out to ascertain the
functionality of the constructed device. This was carried out to The Simulation was carried out in stages according to the
test the working condition of the fingerprint module for block diagram in Fig. I to observe the behavior at different
various authentication conditions and the true positive, false levels and finally carried out on the full schematic system and
negative, true negative and false positive were determined. the results are presented in Fig. IX to XII.
True Positive (TP) = Number of authorized users that are Figure IX is the simulation result showing the complete
correctly accepted by the system. circuit at initialization stage when powered ON with the LCD
displaying ‘’fingerprint-based car access’’. The probe between
False Negative (FN) = Number of authorized users that are
V1 and BR1 shows 12.17Vac input that is fed to the rectifier
incorrectly denied by the system.
circuit. Another probe between D3 and voltmeter indicates
True Negative (TN) = Number of unauthorized users that are 4.85Vdc output to the other parts of the system, the same with
correctly denied by the system the voltmeter display. The probe at the base terminal of the
transistor indicates 2.303V. LED D3 glows to indicate voltage
False Positive (FP) = Number of unauthorized users that are
output. Other indicators blue, grey and red colors indicate
incorrectly accepted by the system
signal flow. An Analog graph can be observed at the left
The result obtained was used to calculate specificity, bottom indicating a sinusoidal signal of the input voltage and
sensitivity and accuracy of the device as follows: next is a digital graph displaying output DC voltage on load
from the regulator at approximately 4.8Vdc.
Specificity, (1)

Fig. IX simulated general circuit in idle state initializing

Fig. X simulated result showing system menu

www.rsisinternational.org Page 139


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705

Fig. XI simulated result showing authorized user

Fig. XII simulated result showing unauthorized user

Fig. X presents the simulation result of the system menu for authorized”, denies the user to start the vehicle and the buzzer
selection between Enroll and Start. Enroll is when you sounds.
intended to register the user(s) while start is when a user(s)
B. Hardware Construction
intended to operate the vehicle either to start or to stop it. The
arrow indicates the direction of start. It can be redirected B.1 Circuit Construction
between start and enroll by using Up and Down push bottom
The construction was carried out first on a bread board to
switches. At this very moment, the motor remains stationary.
ensure that the circuit is working as required, then transferred
Fig. XI presents the simulated result of authorized user to the PCB board for permanent soldering. The constructed
showing vehicle running when the system has authenticated circuit showing the top view of the device on PCB board with
an authorized user and started the vehicle. The user selects user authenticated and user not authorized is shown in Fig.
‘’Start” from the menu by pressing Enter switch, capture the XIII and Fig. XIV.
fingerprint by placing a finger on the scanner and the system
compares the captured fingerprint with the image stored in its
memory, if a match is found, it then displays “authenticated”
and allow the user to start the vehicle.
Fig. XII presents the simulated result of unauthorized user
showing vehicle stop when the system has denied an
unauthorized user and the vehicle refused to start. The system
compares the captured fingerprint with the image stored in its
memory, if no match is found, it then displays “user not
Fig. XIII Top view showing user authenticated

www.rsisinternational.org Page 140


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
C. Testing and Analysis
C.1 Continuity Test
In this study, the multi meter was used to perform this test.
The multi meter was set at the continuity mode and the two
ends of the probe was placed at the ends of a particular wire
that is being checked for continuity, if there is a negligible
resistance between the ends of the wire or path or the multi
Fig. XIV Top view showing user not authorized meter buzzer sounds then, the ends or path is continuous. Test
results shows that the soldering was perfectly done as there
B.2 Casing and Packaging
were no short circuits along the paths, or broken conductors,
A casing measuring 15cm x 15cm x 5cm was finally damaged components, or excessive resistance along the
provided to the system for mechanical protection. It is circuit.
provided with 5no. of 0.5cm diameter hole for the push
C.2 Power ON Test
bottom switches (Enter, Back, Up, On and Reset), 4no. of
0.25cm diameter hole within 0.5cm diameter groove the edges In this test, we took a multi meter and put it in voltage mode
of its top side for screw lock, 1no. of 0.5cm diameter hole for and the output of the transformer was checked for 12V AC.
the power switch tighten by 1.5cm diameter nut and 1no. of This voltage was then applied to the power supply circuit and
1cm diameter hole for the motor tighten by 2cm diameter nut. the output of voltage regulator was checked and ascertained to
Others are 2no. of 0.25cm diameter hole spaced apart 0.5cm be 5V output. This 5V output is fed to the microcontroller at
for LED indicators (Red for power and Yellow for DC motor), the 40th pin. The voltages at the other terminals were also
1no. of 7cm x 2.3cm hole for LCD and 1no. of 3cm x 2cm checked and ascertained to be as required from the
hole for the Fingerprint sensor. Finally, provision has been specification in the simulated circuit.
made for the system ventilation. The complete isometric
diagram of the casing showing its three views (Front, Side and C.3 Performance Evaluation
Top) and the various dimensions is shown in Fig. XV, while To ascertain the functionality of the constructed device a
the complete packaged device with full casing showing its top performance evaluation test was carried out for various
and side view is shown in Fig. XVI. authentication conditions i.e. authorized and none authorized
users. Multiple users (up to 162) can be registered and
unregistered whenever the need arises through id No. or by
resetting the system, like in the case of a change of car
ownership. However, five (5) fingerprints (four (4) authorized
and one (1) unauthorized users) were selected at random to
operate the system. A total of 150 trials were made in 5
different stages of 10, 20, 30, 40, and 50 trials. The number of
true positive (TP), false negative (FN), true negative (TN),
and false positive (FP) were recorded and presented in Table
II.
Table II. Performance Evaluation Test Result
True
No. of False – True – False
Stage +ve
Trials ve (FN) ve (TN) +ve (FP)
Fig. XV The isometric diagram of the casing (TP)
1 10 10 0 10 0
2 20 20 0 20 0
3 30 30 0 30 0
4 40 38 2 39 1
5 50 46 4 47 3
Total 150 144 6 146 4

Table II presents the outcome of performance analysis. It


was observed that out of 150 trials in 5 stages, the TP was
144, FN was 6, TN was 146, and FP was 4. These result was
used to calculate specificity (Sp), sensitivity (Se) and
Accuracy (Acc) and the results are presented as follows:

Fig. XVI Top view of complete packaged device with full casing For the Specificity test, equation 1 was used as follows:

www.rsisinternational.org Page 141


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
be very significant in user authentication. However,
immediately after 35 total trials, the system starts miss-
For the Sensitivity test, equation 2 was used as follows:
authenticating users. This behavior is an indication of the
system threshold. However, as more trials increases, fewer
imposters’ attempts will be falsely considered matches, at the
Also for the Accuracy test, equation 3 was used as follows:
same time more genuine attempts will be falsely classified as
non-matches. This means that the system can take a maximum
of 35 users conveniently.
Further analyses were carried out to compare TP and TN
and the result is presented in Fig. XVII. D. Comparison with Other Fingerprint Algorithm Detection
The present system was compared with previews studies on
fingerprint detection and the results are presented in Table III
and IV. Comparing the threshold, storage capacity and speed
with similar module is shown in Figs. XVIII, XIX and XX.
Table III. Comparison Between R305 And R307 Module

Fingerprint Module R305 R307


Storage Capacity (Fingerprints) 250 1,000
False Accepted Rate (FAR) ≤0.0001% <0.001%
False Rejected Rate (FRR) ≤0.1% <1.0%
Work environment -20 to 55°C -20 ℃ - +40 ℃
Fig. XVII Comparison between true positive and true negative Scanning speed <0.5 second <0.3 seconds

The comparison between TP and TN rates as indicated in Template size 512bytes 512bytes
Fig. XVII shows that for the five (5) selected users making 7 Security Level
5 (1, 2, 3, 4, 5 5 (1, 2, 3, 4, 5
attempts each which is 35 trials, the system was observed to (highest)) (highest))

Table IV. Comparing Present System with Other Fingerprint Algorithms Detection
Fingerprint Sensor Micro- GSM/GP Threshold Fingerprint
Specificity Sensitivity Accuracy
Application Module controller RS Value Set Application
Present Study R305 ATmega 328 × 30% Vehicle Starter ✓ ✓ ✓
Jain et al [15] ✓ PIC 18F4620 ✓ Unstated ✓ × × ×
Gill & Sachin
✓ AT89S52 ✓ Unstated ✓ × × ×
[11]
Brijet et al [10] ✓ ATmega 328 ✓ Unstated ✓ × × ×
Exam Hall
Ingashitula [32] ✓ ATmega 328 × Unstated × × ×
Authentication
Vaishnavi et al Educational
R307 PIC18f4520 × 25% × × ×
[33] System
Swaroop et al
✓ PCF8574 ✓ Unstated Access Door × × ×
[34]

Fig. XIX Comparison between storage capacities


Fig. XVIII Comparison between thresholds

www.rsisinternational.org Page 142


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
calculate specificity, sensitivity and accuracy which was not
done in previous studies. This reveals the additional
contribution of this work to the existing literature.
However, this does not guarantee 100% security
considering treats associated with single biometrics, such as
spoofing, hacking, and non-universal biometric traits [35].
The observed errors of false rejects and false accepts could be
due to some people have biometric features that were either
hard to capture because of worn friction ridges following
manual labour, dry skin due to cold weather and skin diseases
Fig. XX Comparison between speeds or show few indications of unique characteristics like few
IV. DISCUSSION minutiae in the ridge pattern, scar contours and edges, and
failure to present finger proper part. For instance, the top of
The constructed fingerprint vehicle starter subjected to fingers has fewer characteristic structures. In addition, the
various test have revealed vital information that ascertain its vehicle may not be used in case of an emergency where the
functionality. The continuity test revealed that the circuit was authorized user is incapacitated to start the system. The device
continue with no short circuits along the paths, or broken may also develop a fault that can lead to memory loss and
conductors, damaged components, or excessive resistance improper functioning due to electrical faults in the vehicle
along the circuit and the soldering was ok. While the power system.
ON test shows that, the voltage at the different terminals was
according to the requirement and specification of the VI. CONCLUSION
simulated circuit. Prototype was tested beyond reasonable This study focused on vehicle security system using a
doubt and found worthy to be implemented by car owners for simple biometric structure to protect vehicle owners from
vehicle protection. The device performances in terms of unauthorized access to their automobile. The fingerprint
security level expectation is highly sensitive in authenticating sensor match will activate the relay that controls the ignition
authorized users, but it can neither track your vehicle nor system. It provides authentication to users and only genuine
arrest the thief. users can be permitted to start the vehicle. The system can be
The design is similar to that of Jain et al. [15] who designed a better substitute for Key, smartcard and password, which
and developed a fingerprint-based car ignition system using a could not eliminate impersonation. The device was simulated,
fingerprint module and microcontroller, Brijet et al. [10] who prototype was constructed, tested and obtained satisfactory
developed a vehicle anti-theft system using fingerprint results. The system’s performance was evaluated using a
recognition technique and microcontroller, Ingashitula [32] statistical measure for the performance of a binary
who designed a fingerprint based exam hall authentication classification test. Its future applications could be achieved in
systems, though, his design was to assist in the elimination of many areas for developing very high-security systems. These
examination impersonation, while the present study is on areas may include access control system, punch card system,
automobile users. Also, Gill and Sachin [11] developed a ATM system, bank locker system, and vehicle’s electronic
vehicle ignition system using a fingerprint sensor. Although, safe.
their system can either send an SMS or an email or give a call REFERENCES
when someone tries to access the vehicle illegally, while the
present study only employed a buzzer. [1] Gambino M. A Salute to the wheel. Smith Sonian Magazine 2009.
[Online]. Available: www.smithsonianmag.com/science-nature/a-
For the performance analysis on the device, findings from salute-to-the-wheel-31805121/.
[2] Wilde R. Steam in the Industrial Revolution. Thought Co 2019.
this study has revealed that the sensitivity, specificity and
[Online]. Available: https://www.thoughtco.com/steam-in-the-
accuracy were 96%, 97% and 97%. This implies that finger industrial-revolution-1221643.
print vehicle starter will correctly accept and give access to [3] Kuadli J. 25 Car Theft Statistics to Keep Your Ride Safe in 2022.
96% authorized users, correctly deny 97% unauthorized users Legal Jobs 2021. [Online]. Available: https://legaljobs.io/blog/car-
theft-statistics/.
but will also fail to accept 4% authorized users, and give
[4] Szmigiera M. Car theft rate globally 2018, by country. Statista
access to 3% unauthorized users. In addition, with an accuracy 2021. [Online]. Available:
of 97%, we can say that vehicle starting using the constructed https://www.statista.com/statistics/1238378/car-theft-rate-
device is only successful for authenticated users and we are country/#statisticContainer.
[5] Insurance Information Institute (2022). Facts + Statistics: Auto
97% sure. Performance evaluation has also revealed that the theft 2022. [Online]. Available: https://www.iii.org/fact-
system can take a maximum of 35 users conveniently. statistic/facts-statistics-auto-theft.
Therefore, the device is found worthy to be implemented by [6] Sule T. Only 5 of every 10 stolen vehicles are recovered in
car owners for personal vehicle security and protection against Nigeria. Business Day 2016. [Online]. Available:
https://businessday.ng/uncategorized/article/5-every-10-stolen-
thefts. This can be a better substitute for key, push button, vehicles-recovered-nigeria/.
smartcard and password. The present study differs from all the [7] Statista. Levels of concern related to different crimes in Nigeria as
previous studies in the addition of performance evaluation to of March 2022. [Online]. Available:

www.rsisinternational.org Page 143


International Journal of Research and Scientific Innovation (IJRSI) |Volume IX, Issue IX, September 2022|ISSN 2321-2705
https://www.statista.com/statistics/1200186/levels-of-worry- [22] Atayero AA, Alatishe AS. Design and Construction of a
related-to-different-crimes-in-nigeria/. Microcontroller-based Automatic Irrigation System. In
[8] Susarla M, Akhil C, Reddy A, Rizwana S. Vehicle Ignition Using Proceedings of the world Congress on Engineering and Computer
Biometric Data. Journal of Network Communications and Science 2015;1(1):21-23.
Emerging Technologies (JNCET) 2018;8(5):21-23. [23] Ojha M, Sheetal M, Shranddha K, Diksha T. (2016). Microcont
[9] Sundar R, Hebbar S, Golla V. Implementing intelligent traffic Automatic Plant Watering System. International Academy of
control system for congestion control, ambulance clearance, and Science, Engineering and Technology 2016;5(3):25-43.
stolen vehicle detection. IEEE Sensors Journal 2014;15(12):1109- [24] Manjula M, Basha SM. Universal Remote Control for Home
1113. Appliances Using Arduino. International Journal of Research
[10] Brijet Z, Kumar BS, Bharathi N. Vehicle Anti-Theft System Using 2019;6(10):985-1005.
Fingerprint Recognition Technique. Open Academic Journal of [25] Mraz S. What’s the Difference between Motor and Drive?
Advanced Science and Technology 2017;1(1):36-41. DOI: Machine Design 2015. [Online]. Available:
10.33094/5.2017.11.36.41. www.machinedesign.com/motorsdrives/what-s-difference-
[11] Gill KR, Sachin J. Vehicle Ignition using Fingerprint Sensor. between-motor-and-drive.
International Journal for Innovative Research in Science & [26] Singh S. L293D Motor Driver IC. Include Help 2018. [Online].
Technology (IJIRST) 2016;2(12):357–363. Available: www.includehelp.com/embedded-system/1293d-motor-
[12] Ghayoumi M. A review of multimodal biometric systems: Fusion driver-ic.aspx.
methods and their application. In Proceedings of the IEEE/ACIS [27] Nevon Projects. Fingerprint Vehicle Starter Project 2018.
14th International Conference in Computer and Information [Online]. Available: https://nevonprojects.com/fingerprint-vehicle-
Sciences (ICIS) 2015;131-136. starter-project/.
[13] Yang W. Security and Accuracy of Fingerprint-Based Biometrics: [28] Electronic Projects Focus. What is a Buzzer: Working & Its
A Review. MDPI 2019. [Online]. Available: Applications 2022. [Online]. Available:
https://www.mdpi.com/2073-8994/11/2/141/pdf. https://www.elprocus.com/buzzer-working-applications/.
[14] Dermalog. The Fastest AFIS in the World 2019. [Online]. [29] Piratheepan A, Sasikaran S, Thanushkanth P, Tharsika S, Nathiya
Available: http://dermalog.com/products/software/fingerprint- M, Sivakaran C, Thiruthanigesan K. Fingerprint Voting System
identification/?gclid=EAlalQobchMlr7rZgL. Using Arduino. Middle-East Journal of Scientific Research
[15] Jain A, Goswami A, Joshi P, Nag P, Saxen G. Design and 2017;25(8):1793-1802.
development of fingerprint based vehicle starting system. National [30] Maio D, Maltoni D. Direct gray-scale minutiae detection in
Journal of Advanced Research 2017;3(1):39-41. fingerprints. IEEE transactions on pattern analysis and machine
[16] Townsend AM. Smart cities: Big data, civic hackers, and the quest intelligence 1997;19(1):27-40.
for a new Utopia. W. W. Norton & Company, New York, USA, [31] Jha DK. Computational Physics, 1st ed., Discovery publishing
2013, 1285. House PVT, Ltd., New Delhi 2016, 223-268.
[17] Pandit VR, Joshi KA, Bawane NG. ATM Terminal Security using [32] Ingashitula MS. Designing Fingerprint Based Exam Hall
Fingerprint Recognition. International Journal of Applied Authentication. BSc. Project Submitted to the Department of
Information Systems (IJAIS)–ISSN 2249-0868 2013;14-18. Networking and Security, International University of
[18] Rhydolabz. Finger Print Sensor (R305) -TTL UART 2019. Management, Bachbrecht, Namibia (Published) 2017.
[Online]. Available: https://www.rhydolabz.com/miscellaneous- [33] Swaroop YJ, Kumar AT, Raju B, Chandramohan NL, Arshini G.
other-widgets-c-205_124/finger-print-sensor-r305-ttl-uart-p- Fingerprint Recognition Access Microcontroller-Based Doors.
1085.html. UGC Care Group I Listed Journal 2022;12(1): 662-666.
[19] Sumit Electronics & Electricals. Finger Print Scanner R305. “India [34] Vaishnavi VK, Mangita SW, Supriya KG, Dananjay BS.
Mart” 2022. [Online]. Available: Fingerprint Based Exam Hall Authentication. International Journal
https://www.indiamart.com/proddetail/finger-print-scanner-r305- of Research in Engineering, Science and Management.
20147423648.html. 2019;2(10):787-789.
[20] Electro Peak. R305 Optical Fingerprint Scanner Sensor Module [35] Ross A, Jain AK. Multimodal biometrics: An overview. In
2019. [Online]. Available: https://electropeak.com/optical- Proceeding of the 12th European Signal Processing Conference
fingerprint-module-r305. 2004, 1221-1224.
[21] Novoselov P, Aubert JE. Display device control method. U.S.
Patent No. 9,589,530. Washington, DC: U.S. Patent and
Trademark Office 2017.

www.rsisinternational.org Page 144

View publication stats

You might also like