Design_and_implementation_of_a_fingerprint-based_b (1)
Design_and_implementation_of_a_fingerprint-based_b (1)
1. Introduction available for use on the internet, the need to secure data
from hackers and unauthorized individuals becomes
The primary concern of people is security. Thus, it increasingly apparent. Passwords may assist in
befits us to proffer workable remedies and ideas to avoiding this. The problem is that users may reuse
protect our possessions and privacy. Home security and passwords across many devices. Furthermore, these
possessions may be a serious concern for individuals, passwords might be exchanged and broken by someone
businesses, or governments. Property security and with advanced technical abilities. Locksmiths
intrusion into properties have been a critical concern developed security technologies and equipment
since the start of civilization [1]. Door security controls throughout the development and fall of civilizations [5].
may now easily safeguard a facility. Unauthorized According to [6], fingerprint biometrics is
individuals are denied entry and their movements are considered to be the most trustworthy and universally
tracked [2]. One of the ways to regulate entrance to acceptable biometric recognition; because of its traits
certain areas is via locking indoors [3]. As technology of uniqueness, accuracy, non-transferable, ease of use
evolves and the world around us becomes more digital, and cost-effectiveness. Trauring [7] published the first
protecting sensitive information becomes more scientific paper on biometric recognition based on
difficult. Passwords and keys were formerly regarded fingerprint matching, the study aimed to provide a
to be sufficient for secure data transfers, and other method of decentralized automatic identity verification
reasons. However, sophisticated hacker attacks and using minutiae in finger-ridge patterns. Subsequently,
unauthorized internet users have exposed them [4]. biometric recognitions based on other traits (face,
With the advancement in technology, culminating in voice, iris, signature and hand geometry) were
the emergence of different sophisticated devices developed. Thus, it is over 58 years that the first
———
Corresponding author
E-mail address: [email protected]
https://doi.org/10.37121/jase.v7i1.183
2636–607X /2736–0652 © 2022 the authors. Published by Sciengtex. This is an open access article under CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
E. Esekhaigbe & E. O. Okoduwa. / Journal of Advances in Science and Engineering 7 (2022) 18 – 23 19
research publication on biometric recognition was 2.1. The Power Supply Unit
produced [8-10]. Wayman [11] concluded that a brief A 220/12V step-down transformer powers the
assessment of biometric history indicates that much of system. The secondary side of the transformer's output
what is considered to be "new" in biometrics was was rectified using a diode bridge rectifier. Filter
genuinely envisaged decades ago. There's still work to capacitors in the circuit (Fig. 2) assist filter residual AC
be done, but it's better to focus on what's new than to (ripples). The system needed a controlled 5V DC to
recycle old studies. Jain et al. [12], reviewed the state- power the various components, hence the LM7805 was
of-the-art biometric identification and identified major chosen. The voltage regulator transforms rectified 12V
challenges. Moreover, their findings highlighted the to 5V. Due to the high frequency and high current pulse
great potential for basic and applied biometric research. loads of the system, ceramic capacitors were used in
As a result, scientists and engineers were inspired to the power supply design.
explore biometrics, leading to greater interest in
2.2. Fingerprint Module Unit
developing biometric solutions for resource-
constrained devices. The fingerprint module unit stores pre-scanned
To address the drawbacks and disadvantages of fingerprints. It is retrieved at the time a user inserts his
traditional locks, smart security solutions that are easy finger on the module unit. The module's behaviour and
to use, accessible, and trustworthy have been pattern were analysed from its datasheet. To enable the
developed; aside from the use of smartcards and module, the power source must offer 5V. The pins of
biometrics [13,14]. Advancement in technology spurs the module output respectively link pins 2 and 3 of the
people to look out for sophisticated security gadgets Atmega328p. Fig. 3 shows the fingerprint module.
which are flexibly beneficial for home use. Thus, 2.3. Microcontroller Unit
researchers are attempting to build intelligent and user- An 8-bit Atmega328p microcontroller, shown in
friendly security devices for smart homes in response Fig. 4, is used in this study. The microcontroller uses
to the growing demand. Based on their intended use, Vcc, GND, TX, RX (the serial port) to operate the H-
devices are created from a variety of perspectives. bridge switch. It consists of a memory that can only be
Some security systems are concerned with unlawful read (ROM). Ports B, C, and D were employed for
entry into the house [15-17]. Some have to do with diverse reasons. In this study, the timer interrupt service
safety from fire consequent upon gas leakage [18], and approach and ADC function were employed. The signal
others covered the use of a password or biometric lock LEDs on the microcontroller were programmed using
for access to the home [19-21]. PD4-PD7, while the modules were set up using PD0
2. Methodology and PD1, the respective module's transmitter and
receiver. PC1, PC2, PC3, and PC4 were the trigger pins
System components include the following units: for the H-bridge motor, and PB0 through PB5 were the
power supply, fingerprint module, LCD, H-bridge LCD pins. Pin UT1 of the ADC keypad was connected
motor, microcontroller, as well as control buttons, to PC0 through down resistors, and the CPU was linked
buzzer and signal LEDs. The supply unit powers the to the emergency and setting buttons.
microcontroller, the fingerprint module and the LCD
with a controlled 5V. Additionally, it provides the same
voltage to the motor unit. The microcontroller unit acts Fingerprint
Power DC Motor
module
as the system’s nerve centre, directing the operations of Supply Atmega3
the other elements. When a fingerprint picture is Unit 28p
Signal, LEDs
identified by the fingerprint module, it is routed via the LCD
Buzzer Unit
system’s database where it is compared with previously
recorded image scans. Upon recognition, the micro- Control
Keypad
controller permits the H-bridge motor to regulate the
automated sliding door opening. The functional block Fig. 1 Functional block diagram of the proposed system.
diagram of the proposed system is shown in Fig. 1.
Start
Initialise all
hardware
N N N
Create admin
Enter normal mode
Y Y Y
Door remains If emergency If outside switch If user Door Door
Initialize door
open switch is pressed is pressed recognised Opens Close
N N
N
Door Closed Finger
Door remains
print
closed
Door Unknown
If inside button
opens(decre
is pressed Y ment count)
N
Door remains
closed
End
Fig. 6 A prototype of system design on a breadboard. Fig. 8 Front view of the designed system.
E. Esekhaigbe & E. O. Okoduwa. / Journal of Advances in Science and Engineering 7 (2022) 18 – 23
22
.
It was observed that: intelligence methods to expedite as well as simplify the
(a) Access to the restricted area was only granted to identification of individuals utilizing facial recognition
persons whose fingerprint minutiae have been technology and a database of well-known thieves. The
extracted, recorded and stored. scope of this effort in the future is exceedingly
(b) When access is granted, the door remains opened expansive.
for 4secs and thereafter closes; to prevent
Conflict of Interests
unauthorised users.
(c) Alarm is activated if an unauthorised user is The authors declare that there is no conflict of
attempting to forcefully gain access. interests regarding the publication of this paper.
3.2. Discussion ORCID
The measured voltage of the power supply unit was E. Esekhaigbe https://orcid.org/0000-0002-5082-4169
5.45V and it was approximately equivalent to the E. O. Okoduwa https://orcid.org/0000-0001-5899-4720
voltage needed for the components to operate. The
fingerprint module successfully fulfilled its function of References
identification and comparison. As a result, it was [1] S. Emakpor, E. Esekhaigbe, “Development of an RFID-
observed that the motor unit turned in either direction based security door system,” J. Elect. Control Technol.
as directed by the microcontroller unit and the H- Res., vol. 1, pp. 9 - 16, 2020.
bridge circuit. During system setup, the LCD played [2] W. O. Winda, S. Mohammed, “Intelligent voice-based
the role of verification concerning program code as door access control system using adaptive-network-based
well as the exact individuals gaining access. When the fuzzy inference systems for building security,” J. Comp.
system was powered on, the liquid crystal display was Sci., vol. 3, pp. 274-280, 2007.
[3] B. O. Omijeh, G. O. Ajabuego, “Design analysis of a
confirmed to operate correctly. Programming and
security lock system using pass-code and smart-card,”
circuit connections were implemented on the IOSR J. Elect. Comm. Eng., vol. 4, pp. 64-72, 2013.
microcontroller. In addition, the microcontroller's C [4] M. S. Okundamiya, S. Emakpor, “Design and control
language program code was error-free, as the LCD, H strategy of a security door system using radio frequency
bridge motor unit, and fingerprint module all signal,” 2017 IEEE 3rd Int. Conference on Electro-
performed as planned. Using a voltage divider under Technology for National Development, pp. 406-412,
typical operating circumstances, the voltages flowing 2017.
through the control buttons were 0V, 2.5V, and 4V. [5] W. Dongdong, “Introduction of capacitive fingerprint
Normal operation of the buzzer was seen when an sensor packaging technology," 2017 18th Int. Conference
unidentified user fingerprint image was discovered. on Electronic Packaging Technology, pp. 130-134, 2017.
[6] J. B. Awotunde, O. W. Fatai, M. B. Akanbi, D. I.
4. Conclusion Abulkadir, O. F. Idepefo “A hybrid fingerprint
identification system for immigration control using the
Within the scope of this research, both the minutiae and correlation methods,” J. Comput. Sci. Appl.,
conception and execution of an automated fingerprint vol. 22, no. 1, pp. 15-23, 2015.
door entry system were described. The Arduino [7] M. Trauring, “Automatic comparison of finger ridge
Atmega 328p microcontroller was used in the patterns,” Nature, vol. 197, pp. 938-940, 1963.
construction of the automated door access control [8] J. G. Daugman, “High confidence visual recognition of
system that was presented. The performance of the persons by a test of statistical independence,” IEEE
developed system was evaluated in the context of real- Trans. Pattern Anal. Mach. Intell., vol. 15, no. 11, pp.
1148-1160, 1993.
time environments, and it was determined to be
[9] W. W. Bledsoe, “Man-machine facial recognition,”
adequate. It is feasible that the inclusion of security Technical Report, PRI 22, Panoramic Research Inc. 1966
features, such as fingerprint and password systems, [10] A. J. Mauccri, “Feasibility study of personal
will distinguish and make the system more competitive identification by signature verification,” Technical
in the marketplace. Numerous other security Report SID 65, Defence Technical Information Centre,
technologies may be implemented into the system to North America Aviation, 1965.
enhance its security since the future scope of this work [11] J. L. Wayman, “The scientific development of biometrics
is highly expansive. As an example, consider an iris over the last 40 years,” K. De Leeuw, J. Bergstra, (eds.),
scanner for visual identification. Additionally, the In: The History of Information Security, Elsevier Science
system may be strengthened by employing machine B.V., pp. 263-274, 2007.
E. Esekhaigbe & E. O. Okoduwa. / Journal of Advances in Science and Engineering 7 (2022) 18 – 23 23
[12] A. K. Jain, K. Nandakumar, A. Ross, “50 years of technology,” Open J. Safety Sci. Technol., vol. 5, pp.
biometric research: Accomplishments, challenges, and 55-62, 2015.
opportunities,” Pattern Recognition Letters, vol. 79, pp. [17] M. Potnis, A. Chimnani, V. Chawla, A. Hatekar, “Home
80-105, 2016. security system using gsm modem,” J. Eng. Res. Appl.,
[13] S. Palka, H. Wechsler, B. A. Hamilton, “Fingerprint vol. 5, no. 4, pp. 143-147, 2015.
readers: Vulnerabilities to front- and back- end [18] L. Fraiwan, K. Lweesy, A. Bani-Salma, N. Mani, “A
attacks,” 2007 First IEEE Int. Conference on Biometrics: wireless home safety gas leakage detection system,” 2011
Theory, Applications, and Systems, pp. 1-5, 2007. 1st Middle East Conference on Biomedical Engineering,
[14] C. Lin, A. Kumar, “Matching contactless and contact- pp. 11-14, 2011.
based conventional fingerprint images for biometrics [19] A. Aditya Shankar, P. R. K. Sastry, A. L. Vishnu Ram, A.
identification,” IEEE Trans. Image Process., vol. 27, no. Vamsidhar, “Finger print based door locking system,” Int.
4, pp. 2008-2021, 2018. J. Eng. Comput. Sci., vol. 4, no. 3, pp. 10810-10814,
[15] J. Bangali, A. Shaligram, “Design and implementation of 2015.
security systems for smart home based on GSM [20] K. W. Nafi, T. S. Kar, S. A. Hoque, “An advanced door
technology”, Int. J. Smart Home, vol. 7, no. 6, pp. 201- lock security system using palmtop recognition
208, 2013. system,” Int. J. Comput. Appl., vol. 56, pp. 18-26, 2012.
[16] R. Hasan, M. M. Khan, A. Asehek, I. J. Rumpa, [21] A. Kawale, “Fingerprint based locking system,” Int. J.
“Microcontroller based home security system with gsm Sci. Eng. Res., vol. 4, no. 5, pp. 899-900, 2013.