Biometric-Based Smart Security System
Biometric-Based Smart Security System
2
Authorized licensed use limited to: Shri Madhwa Vadiraja Institute of Technology & Management. Downloaded on February 24,2025 at 09:30:12 UTC from IEEE Xplore. Restrictions apply.
It includes everything necessary to support the model will be taught to recognize a user's unique speaking
microcontroller; simply connect it to a computer with a USB pattern.
wire or power it with an AC-to-DC adapter or battery to
begin.
B. Fingerprint Sensor R307:
This is the R307 Fingerprint Reader Optical Sensor
Module. R307 is a fingerprint sensor module with a TTL
UART interface, which it uses for direct connections to
microcontroller UART or PC using USB-to-serial or
MAX232 adaptor. It allows storage of data of fingerprints in
the module and configure it to function in 1:1 or 1:N mode
for identifying individuals. The module can directly interface
with 3.3v or 5v Microcontrollers. Interfacing with the PC
serial port requires a level converter (such as MAX232).
All-in-one fingerprint scanner can be included in a
variety of end products due to its integrated image collection
and algorithm chip. Users can do secondary development,
and the platform can be included in a range of final products,
including access control, attendance, safety deposit boxes,
and car door locks. Good image processing skills enable the
successful capturing of images with a maximum resolution
of 500 dpi.
3
Authorized licensed use limited to: Shri Madhwa Vadiraja Institute of Technology & Management. Downloaded on February 24,2025 at 09:30:12 UTC from IEEE Xplore. Restrictions apply.
so that it may store a fingerprint's data. Following the
selection of a particular id to be associated with the
fingerprint, the user will be required to insert his finger twice
for the data to be saved. This is the process by which data is
saved.
Fig. 6. (a) Audio Sample with the presence of noise Fig. 9. Final Input Waveform
4
Authorized licensed use limited to: Shri Madhwa Vadiraja Institute of Technology & Management. Downloaded on February 24,2025 at 09:30:12 UTC from IEEE Xplore. Restrictions apply.
C. Face Recognition: B. Speech Recognition & Speaker Identification:
To create a face recognition system, the help of OpenCV Using the Multi-layer Perceptron, we achieved an
and face recognition libraries were taken. A database was accuracy of 100% on the test set, as the model accurately
created containing, labeled photos of each person, making identified all 20 speakers (4 people, 5 test samples each).
sure the face was well lit. Then the face recognition library The screenshot demonstrating an example is shown below:
matched the input unlabeled photo with the labeled input
photo, and searched for the nearest match, i.e., the photo with
the least distance. The face was highlighted by creating a box
around it. The program was then modified to work on live
input stream from the on-device camera and was able to
detect and identify people accurately and mark people not a
part of the database as unknown. Fig. 11. Accurate Identification of speaker – Rahil (Test Set)
VI. SOCIAL IMPACT Despite the almost perfect accuracy, challenges still
One of the biggest social impacts of the project is the persist when trying to implement the same in a ‘real-time’
improved accessibility to physically disabled people. setting. This is because the same amount of pre-processing
Physical disability lies on a spectrum and our project (using professional mechanisms like Audacity and Adobe
addresses as many conditions as possible. If a person has Premier Pro) can’t be performed on the received audio
undergone facial surgery, be it due to an accident or cosmetic samples, and we will have to rely on Python and its libraries
purposes, it ensures the rightful owner can still easily access to natively clean the files. This increases the possibility of a
their property. Another impact is the saving of time spent by misjudged classification, but there are measures that can be
bank staff, to physically escort and help unlock safes. taken to reduce the chances of that happening. Firstly, using
Remote biometric authentication capabilities mean, the staff a premium quality sensor microphone, with additional tools
can securely perform authentication from their desk, for eliminating background sounds (such as a dead cat/anti-
reducing queues in banks and saving valuable time. wind foam cap) can massively elevate the quality of sound
input given to the model, and thereby boost chances of a
VII. RESULTS AND CONCLUSION better prediction. In addition, various python libraries can be
used to further enhance the standard of sound fed to the
A. Fingerprint Recognition: model, which will ultimately yield better results. As an
Once the 'fingerprint sensor’ code from the Adafruit example of a real-time prediction, an instance has been
Fingerprint Sensor library has been executed, the R307 shown below where the model accurately predicted the
module constantly flickers and continuously tries to look for speaker.
a fingerprint. Once the user places the finger on the sensor,
the sensor will try to match the instantaneous image captured
with its current existing database.
If the image successfully matches with a high value of
confidence, it displays success and authenticates the user or
else it displays fingerprint did not match and restricts the
user. For the extent of this project, a total of 4 different
fingerprints were stored in the database, and the sensor was
able to detect each of them correctly on all occasions, and
also appropriately displayed error messages for unregistered
Fig. 12. Accurate Identification of speaker – Yash (Real Time)
fingerprints. The module R307 can store a total of 1000
fingerprints, which well exceeded the project’s requirements. As per our observations, the performance of the model
depends massively on the microphone used and the nature of
the environment. For code ‘0’ or the built-in microphone in
the laptop, poor predictions are obtained since the sound
quality deteriorates immensely. When we use the same
phone (Samsung Galaxy S20 FE) as used to create the
database, estimates are more consistent. As a metric, the
model gets accurate predictions 70% of the time, in the 40-50
instances we tested it in.
To overcome this issue, a virtual cable application was
used, that when installed created a virtual link such that it
transmitted the audio recorded by the mic on one device to
the other, as its audio input. This enabled the usage of the
high-quality microphone of a smartphone to be used to take a
live recording and input it to the PC. The PC gives a live
instant output of the voice, with a high accuracy.
C. Face Recognition:
Fig. 10. Fingerprint Recognition Phase Below is the output detecting a random unlabeled photo,
via a live stream captured by the device camera. The same
5
Authorized licensed use limited to: Shri Madhwa Vadiraja Institute of Technology & Management. Downloaded on February 24,2025 at 09:30:12 UTC from IEEE Xplore. Restrictions apply.
person, Jeff Bezos, was registered in the model with a advanced and safe method of identification that is generally
different unlabeled photo. The given model also worked on immune to any known kind of impersonation. Gait tracking
team members, accurately identifying and differentiating and detection are also known as biometric gait analysis. A
between them. The model performed adequately on most powerful method of authentication that can be utilized by
occasions and was able to easily identify and distinguish financial institutions and other industries that place a high
between different members in the group. It was also able to priority on client safety and security is a gait identification
identify 3-4 people at once. However, the program faced system that has been adequately educated and is equipped
difficulties identifying and labelling individuals in dark with the requisite hardware.
lighting conditions, owing to the limitations of the webcam
used. Similar to the speaker identification system, this can be Finally, one of the most essential upgrades to the system
addressed, and the performance can be significantly will be the introduction of chip-level encryption, which
improved by the usage of better-quality web cameras, stores data in an encrypted format, such that even if the
preferably with a flashlight. system were to be physically compromised and accessed, it
would still not reveal any sensitive biometrics stored to any
malicious entity.
ACKNOWLEDGMENT
This initiative and technical report received strong
backing from Mrs. Yukti Bandi. Her comprehensive
guidance and proper mentoring at every stage from writing
this paper to valuable insights was helpful. We appreciate
our colleagues who offered advice and knowledge that made
significant contributions to the research, and supported us
wholeheartedly throughout the whole procedure.
REFERENCES
[1] JigmeYeshi, Kazuhiro Muramatsu, “Dual Door Lock System Using
Radio-Frequency Identification and Fingerprint Recognition”, 2019.
[2] HashemAlnabhi, Yahya Al- Naaman, Mohammed Al- madhehagi,
Mohammed Alhamzi, “Enhanced Security Methods of Door Locking
Fig. 13. Face Recognition Output Based Fingerprint”, 2020.
[3] Rohit Kumar Dubey, Jonathan Goh and Vrizlyn L, “Fingerprint
VIII.FUTURE SCOPE Liveness Detection From Single Image Using Low-Level Features
and Shape Analysis”, 2016
The product in its current iteration is dependent on a [4] VikasGoyal, Himanshu Jindal, “Improved fingerprint matching
number of different platforms in order to operate efficiently minutiae singular points network”, 2017
and safely. The subsequent step would be to develop a single [5] PravjotKaur, Gagandeep Jagdev, “Reconnoitering and Instigating
platform that is capable of natively running all three types of Fingerprints as Secure Biometric Technique”, 2017
authentications while also incorporating all three into a [6] Wu Ping, Wu Guichu, XieWebin, Lu Jianguo, Li Peng, “Remote
single system. This would lower the cost, as well as the Monitoring Intelligent System Based on Fingerprint Door Lock”,
number of dependencies, that are required to execute all 2010
three modules. In the longer term, it would make the entire [7] Gudavalli, Monica, Vidyasagar Novel, “Door Lock Operation Using
project commercially viable because it would become a plug- Two-Staged Smart Security Verification”, 2019
and-play product for the customer, who would not have to [8] Anu and Bhatia, “A smart door access system using fingerprint
biometric system”, 2014
fuss over the installation and running of the system. This
[9] Hema Lathaatha S, “A systematic review on Fingerprint based
would eliminate a significant barrier to entry for potential Biometric Authentication Systems”, 2020
buyers of the product. A fourth module will be added for
[10] 10. OnyanA, Enalume K, “Property Security Using a Biometric Based
ultra-secure situations to improve the level of security Door Lock System”, 2018
already present. Tracking and detecting gait is a highly
6
Authorized licensed use limited to: Shri Madhwa Vadiraja Institute of Technology & Management. Downloaded on February 24,2025 at 09:30:12 UTC from IEEE Xplore. Restrictions apply.