Fingerprint Identification Technology Using Arduino With Short Message Service
Fingerprint Identification Technology Using Arduino With Short Message Service
In Partial Fulfilment
of the Course Requirements in
Bachelor of Science in information Technology
Presented by:
AUGUST 2024
ACKNOWLEDGEMENT
ii
APPROVAL SHEET
approval.
APPROVED BY
____________________ ____________________
Panel Evaluator Panel Evaluator
____________________ ____________________
Panel Evaluator Panel Evaluator
iii
ABSTRACT
iv
TABLE OF CONTENTS
ACKNOWLEDGEMENTS.............................................................
.. ii
APPROVAL
SHEET...................................................................... iii
ABSTRACT.............................................................................
... iv
TABLE OF
CONTENTS................................................................... v
LIST OF
TABLES..........................................................................vi
Page
Chapter 1.
INTRODUCTION................ ............................................1
Study...........................................1
Problem..........................................2
Study...........................................2
Study.............................3
……………..5
v
2.1 Hardware…………………….……………………………...
….5
2.2 Software…………………….………………………….…....
….9
STUDIES…...........…10
…10
Studies……………………………………….11
….12
Studies………………………………......13
………………………….....15
3.6 Definition of
Terms…………………………………………...16
………………………….18
4.1 Methods of
Research………………………………………….18
….23
v
Chapter 5. PRESENTATION, ANALYSIS, AND INTERPRETATION OF
DATA.24
Data.....................................24
Data.......................................32
5.3 Interpretation of
Data.............................................37
RECOMMENDATION………..41
6.1 Summary of
Findings..............................................41
6.2
Conclusion..........................................................42
6.3
Recommendations.................................................42
BIBLIOGRAPHY.......................................................................
...44
APPENDIXES..........................................................................
...45
1. Research
Profile.....................................................45
2. Copy of Project
Design.............................................55
LIST OF TABLES
vi
Page
Table
1.....................................................................................25
Table
2.....................................................................................27
Table
3.....................................................................................29
vi
Chapter I
INTRODUCTION
system that we call FITA SMS that can unlock a door using only their
making sure that only their residents have access to unlock their
door and only their residents can go inside the household to avoid
unlock the door to ensure that no intruder can access the door
and the scanners are safe and reliable devices for any security.
1
Statement of the Problem
criminals and put the safety of people in those places at risk. The
using advanced security tools and better ways to control who can
3.1 Security
3.2 Accessibility
3.3 Monitoring
2
This FITA SMS is conducted to benefits the following:
2
Educators- Educators who plan to do relevant research on lock
SMS will be discussed in this study. This study will show and
illustrate how locks have changed throughout time, from basic metal
biometrics.
device.
the lock mechanism will trigger to unlock the door, however when
The FITA SMS project has its limits, which help us stay focused
and practical with the resources and time we have. Looking ahead,
3
disabilities (PWDs) who might struggle with our fingerprint scanner.
For example, imagine someone who can't use the scanner because
3
to introduce a feature where they can unlock the system by sending
a simple SMS through their device. They just register their number,
and no need for a fingerprint scan. Since our budget is tight and
we're still learning, our first step is to set up notifications. This way,
small but important step towards making FITA SMS more accessible
and secure. As we grow and learn from user feedback, we'll keep
with different abilities. Our goal is to create a system that's not only
easy to use but also inclusive and empowering for all users
4
Chapter II
TECHNICAL BACKGROUND
researcher will use in order for the FITA SMS mechanism to process
Hardware
DC Male Plug - Power supply for the Arduino Uno and other
components.
Figure 1
Figure 2
Figure 3
5
Solenoid Door lock - Actuator or mechanism controlled by
Figure 4
Figure 5
Figure 6
6
Buzzer - Used for generating sound alerts or signals.
Figure 7
feedback.
Figure 8
network.
7
Figure 9
7
Relay - A solenoid lock typically requires a relatively high
the power supply to the solenoid lock using a low-power signal. This
mechanisms.
Figure 10
Figure 11
8
Software - This chapter presents the Software of the study that
researcher will use in order for the FITA SMS mechanism to process
system.
Library used:
9
Chapter III
distances utilized for door access. The study created 240 training
10
74.65% for candlelight, and 88% for flashlights, with an average
9
By using research methodology steps like analysis and data
and alert buzzer. Only fingers that are registered can open the door.
homes.
11
system that accepts data using facial recognition technology,
9
using portable mobile platforms. Both hardware and software are
included in it.
with the help of this project we are also able to send an SMS to the
very vital role in any student’s life. It is one of the important criteria
attendance.
12
According to Saroj Singh (2020) Bio metric systems have
Fingerprints are the oldest and most widely used form of bio metric
9
fingerprint for identification has been employed in law enforcement
stolen. fingerprint based door lock system can achieve all these
features.
to being tampered with fake keys, which can lead to house break-
13
a smartphone can function well, with an average response time of
sending
9
signals to a smartphone shows that it can read data accurately with
their homes. Currently, the only doors available on the market have
keys, which can lead to house break-ins and theft. With rapidly
safety and comfort in their homes. There are currently several types
access to the door lock can be limited. The expected result is the
14
ability to unlock home doors automatically using a fingerprint sensor
9
Conceptual Model of the Study
Startup
Initialize
components
and display
the welcome
message on
the LCD
Output:
Main
LCD: Update based on Menu:
menu navigation and
actions.
Buzzer: Sound on Display
actions (e.g., beep 3 options
times on unauthorized
access ). (Enroll,
Door Lock: Unlock if Delete,
fingerprint verification is Unlock,
successful. Settings)
SMS: Send notification on Process
specific events.
Loop: Continuously Input:
monitor inputs and
process accordingly.
Enroll Fingerprint:
Navigate to enroll menu
and scan fingerprint.
Delete Fingerprint:
Navigate to delete
menu, choose
fingerprint to delete.
Unlock Door: Scan
fingerprint for
verification.
Settings: Navigate
using up, down, and
back buttons.
15
Definitions of Terms
Arduino microcontroller.
devices.
versatility.
16
Biometric Security - A security measure that uses unique
18
Template Matching - The process of comparing the captured
exchange data with other devices and systems over the Internet or
17
CHAPTER IV
RESEARCH DESIGN
This chapter will discuss the method used in this research and
Methods of Research
one by one, you divide them into clusters based on things like where
they live or their job. Then, you randomly pick some clusters and
the group is large and spread out because it makes sampling easier
and cheaper. The goal is to have a sample that represents the whole
18
technology integration such as Arduino, Fingerprint, Short Message
18
Extreme Programming (XP) was also chosen for this project
and system testing are done iteratively. This guarantees that each
19
regulating access to restricted areas or devices. In order to achieve
19
comprehensive research methodology that will guarantee the
20
Data Analysis
implementation.
the survey may include particular questions that user may answer
that can affect their ability to operate the FITA SMS device, and
the device. For example, researchers might inquire about the need
for button or text message to access the FITA SMS if they have a
21
problem accessing the fingerprint scanner, they can use the
21
even if they can’t operate it using the fingerprint scanner.
how secure the user feels while using the device, it will be
on how the user can monitor people that can access the FITA SMS,
on this device only registered identity can access the device to open
inquire about users' experiences with the FITA SMS, including any
22
In addition, surveys ought to be used to get input on how well
the FITA SMS user interface works and how simple it is to perform
commands. Questions can gauge how satisfied users are with the
Sources of Data
23
security mentoring and accessibility. Your contributions will greatly
enhances usability.
23
Chapter V
with SMS notification (FITA SMS) and a traditional lock. The data
Formula
n = total number of respondent’s
Scale Interpretation
scale below.
24
Table 1
Traditional 11 18 7 3 1 3.88
Lock:
Uses physical
keys that can be
lost, stolen, or
duplicated.
27.5% 45% 17.5 7.5% 2.5%
%
25
FITA SMS: 16 18 6 0 0 4.25
Sends
immediate SMS
notifications for
access events,
including
successful and
failed attempts,
providing real-
time awareness
of who is
accessing the
property.
40% 45% 15%
25
Traditional 10 16 8 5 1 3.73
Lock:
No built-in alert
system; users
are unaware of
access events
unless they are
physically
present.
25% 40% 20% 12.5% 2.5%
26
given questionnaire and their responses were subjected to weighted
26
weighted mean the level of involvement was identified using the
scale below.
Table 2
Access 18 14 6 2 0 4.2
Updates:
Users can stay
informed about
who is
accessing their
premises and
when, even
when they are
not physically
present.
45% 35% 15% 5%
27
27
User 14 21 5 0 0 4.23
Accountabilit
y: Tracking
access events
through SMS
helps ensure
that users are
accountable for
their actions
35% 52.5 12.5%
%
Immediate 22 14 4 0 0 4.45
Alerts: Users
receive instant
SMS
notifications
when specific
events occur,
such as
successful or
failed access
attempts,
unauthorized
28
entry, or
tampering with
the lock.
55% 35% 10%
28
The Table 2 shows that by leveraging SMS technology,
security systems can provide more robust and flexible solutions for
to any security concerns. The weighed mean was 4.1,4.1,4.1 4.5 and
4.5 respectively.
Table 3
29
Anomaly 12 23 5 0 0 4.1
Detection: 8
Immediate
notifications of
unusual activity,
such as
repeated failed
access
attempts, help
detect and
respond to
potential
security threats
quickly.
30% 57.5% 12.5%
Multiple 18 18 2 1 1 4.2
Users: 8
Fingerprint locks
can store
numerous
fingerprints,
making them
suitable for
households,
offices, or
facilities with
many users.
45% 45% 5% 2.5% 2.5%
30
30
Simple 17 15 4 3 1 4.1
Management: 0
Administrators
can easily add
or remove users'
fingerprints
without needing
to reconfigure
the lock or
distribute new
keys.
42.5% 37.5% 10% 7.5% 2.5%
Table 3, proves that the practical considerations in
security needs.
31
31
Graphical Analysis of Data
Table 1 Graph
Figure 13
Figure 14
Figure 15
32
Figure 16
Figure 17
Figure 18
33
Figure 19
Table 2 Graph
Figure 20
Figure 21
34
Figure 22
Figure 23
Figure 24
35
Table 3 Graph
Figure 25
Figure 26
Figure 27
36
Figure 28
Interpretation of Data
events.
37
4. The mean score of 3.73 places the statement "Traditional
37
physically present" in the "Agree" category. This suggests general
seen as beneficial.
effectiveness.
premises and when, even when they are not physically present" in
that the feature allows users to stay informed about access events
38
remotely, enhancing their awareness and security even when they
38
accountable for their actions" in the "Strongly Agree" category. This
accountability purposes.
39
likelihood of unauthorized access due to the uniqueness of
fingerprints.
39
12. The mean score of 4.18 places the statement "Anomaly
40
Chapter VI
and Recommendations
Summary of Findings
ease of use.
Key Findings:
codes.
Future Plans:
errors.
41
2. More Features: Future updates could include remote locking
41
3. Scaling Up: The researchers plan to expand the system for
Conclusion
Recommendations
42
Simplify User Interaction: Design a user-friendly interface
with clear instructions and feedback using an LCD display. Make the
process of
42
fingerprint enrollment and authentication intuitive and
environments.
required.
43
43
BIBLIOGRAPHY
https://www.studocu.com/ph/document/jacobo-z-gonzales-memorial-
national-high-school/technology-and-lively-hood-education/arduino-
controlled-locking-system-using-fingerprint-module/95881416
AUTOMATED
DOOR LOCK
44
SYSTEM WITH
FACIAL
RECOGNITION,
FINGERPRINT
SCANNER AND
DISINFECTANT
USING ARDUINO
AND SENSOR
DEVICES
“Automated Door Lock System with Facial Recognition, Fingerprint
Scanner and Disinfectant Using Arduino and Sensor Devices”
https://www.studocu.com/ph/document/bestlink-college-of-the-
philippines/bachelor-of-science-in-information-technology/group-2-
automated-door-lock-system-with-facial-recognition-fingerprint-
scanner-and-disinfectant-using-arduino-and-sensor-devices/
63127762
44
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/https://
ijcrt.org/papers/IJCRT2205303.pdf
44
APPENDIXES
1. RESEARCHERS PROFILE
a. Curriculum Vitae
Skills
Adaptability
Technical Skills
Time Management
45
ENGRACIA, MICHAIL KENT DELOS REYES
Skills
Creativity
Technical Skills
Adaptability
46
FERANCULIO, FRANCIS RAMOS
Skills
Teamwork and Collaboration
Technical Skills
Creativity
47
IBAÑEZ III, RODOLFO SALAK
Skills
Teamwork and Collaboration
Technical Skills
Cooking
48
LAURAS, MA. ERICA
Skills
Adaptability
Technical Skills
Creativity
49
MAMURI, JAYLLOYD SAMILING
Skills
Teamwork and Collaboration
Multitasking
Creativity
Adaptability
50
MARCELO, VINCENT ADRIAN CELIS
Skills
Adaptability
Technical Skills
Multitasking
Time Management
51
MEDICO, JATHNIEL SALENGA
Skills
Organizational Skills
Creativity
Adaptability
52
SABORNIDO, ARON GEMUEL MAGDAONG
Skills
Teamwork and Collaboration
Technical Skills
Multitasking
Creativity
53
YU, MARK ANTHONY CADILO
Skills
Teamwork and Collaboration
Technical Skills
Leadership
Organizational Skills
54
Copy of Project Design
Notifications
Components:
everything.
fingerprints.
door's status.
How It Works:
1. Fingerprint Enrollment:
scanner.
2. Authentication Process:
scanner.
55
- The Arduino compares the
ones.
55
3. Unlocking the Door:
feedback.
an invalid fingerprint.
56
6. User Experience:
The LCD screen gives visual updates, making it easy for users
unlock the door from their phones, even when they're not nearby.
mistakes.
in various settings.
project requirements.
57