0% found this document useful (0 votes)
19 views4 pages

IEEE - Design and Implementation of An Iris Biometric Door Access Control System

The document presents the design and implementation of an iris biometric door access control system aimed at enhancing security by limiting access to authorized individuals. It details the methodology, operational principles, and the technology used, including the integration of an iris scanner and a database for user verification. The system was developed to provide a reliable and secure method of access control, demonstrating satisfactory performance in its implementation.

Uploaded by

Emmanuel victory
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views4 pages

IEEE - Design and Implementation of An Iris Biometric Door Access Control System

The document presents the design and implementation of an iris biometric door access control system aimed at enhancing security by limiting access to authorized individuals. It details the methodology, operational principles, and the technology used, including the integration of an iris scanner and a database for user verification. The system was developed to provide a reliable and secure method of access control, demonstrating satisfactory performance in its implementation.

Uploaded by

Emmanuel victory
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

2017 International Conference on Computational Science and Computational Intelligence

Design and Implementation of an Iris Biometric


Door Access Control System
Etinosa Noma-Osaghae Robert Okonigene
Department of Electrical and Information Engineering Department of Electrical and Electronic Engineering
Covenant University, Ambrose Alli University,
Ota, Ogun State, Nigeria. Ekpoma, Edo State, Nigeria.
[email protected] [email protected]

Chinonso Okereke
Olatunji J. Okesola
Department of electrical and Information Engineering Department of Electrical and Information Engineering
Covenant University, Covenant University,
Ota, Ogun State, Nigeria. Ota, Ogun State, Nigeria.
[email protected] [email protected]

Kennedy O. Okokpujie
Dept. of Electrical & Information Engineering
Covenant University,
Ota, Ogun state, Nigeria.
[email protected]

Abstract: Over the years, security has soared in importance Egyptian locks by using metals as their primary materials. In
as concerned individuals, companies and organizations continue 1861, Linus Yale patented the pin tumbler lock which is simple
to implement measures to improve the security of lives and and effective and it has been essentially unchanged until the
properties. Door-access control is a physical security system that introduction of biometrics in access control [2].
secures a room or building by limiting access to specific people
and keeping records of such accesses. The significance of iris Biometric technology involves using a measureable
technology among others, for security and access control characteristic or identifier to label an individual [3]. The
applications are numerous. In terms of physical security, iris identifier could be behavioural or physiological. Physiological
technology is already making inroads into the access control characteristics describe an individual based on the shape of the
market because of the reliability of its authentication process. In body. It includes using the fingerprint pattern, palm veins, face
this paper, the researchers present an aspect of the system structure, iris image, retina, or scent of persons as identifiers.
relating to the design and construction of an iris biometric door Behavioural characteristics relates to the pattern of behaviour
access control. The system was developed as a means of getting of a person such as gait, voice and even typing behaviour.
into a specified area by securing the door and limiting access. The
database created contains the particulars of those allowed access The integration of biometrics into access-control systems
in order to work in tandem with the mandatory iris has greatly increased the security of such systems. The
authentication process. The implemented design worked biometric characteristics used cannot be forgotten or misplaced
satisfactorily. and thus ensures a safer method of keeping lives and properties
safe [4].
Keywords—Biometrics, iris, recognition, access control,
One of the door access control’s main devices was the iris
security.
scanner supported by a database containing the unique iris
template and particulars of those authorized access the area
I. INTRODUCTION behind the door. The door used in the prototype was the
electric strike lock/dead bolt lock (an electromagnetic locking
Restriction of access to doors in ancient times was achieved
mechanism. A microcontroller was used to integrate the actions
by using knots (made of ropes and related materials to detect
of the scanner, database and the door’s opening and closing
when someone tries to open the door). The Greeks and
mechanism.
Egyptians developed the use of pin tumbler locks which were
made of wood [1]. The romans improved on the Greek and

978-1-5386-2652-8/17 $31.00 © 2017 IEEE 590


DOI 10.1109/CSCI.2017.102
II. RELATED WORKS

A. Aspects of Access Control


A well-structured enrolment process, accurate verification
and up-to-date logs, form some of the most important aspects
of access control. The enrolment process establishes the first
stage of the access control process. It acquires the data required
by the access control system to expedite its coordination
function fluidly. The verification process enables the access
control system identify users while the logs keep track of
accesses granted.

B. Door Access Control


Jam locks and animals are widely used as physical layers of
protection. Many a time, after-hours alarms are placed at entry
points to deter intruders from getting access to restricted areas.
Identification badges, I-card keys, Tokens and Biometrics can
be used to monitor and control the daily flow of individuals in
and out of any location [5].
Automated door-access control is an emerging area of
security that is used to grant authorized individuals access to
restricted places and keep logs of such accesses. Door-access
control is a physical security system that assures the security of Fig. 1. Categorization of biometrics in terms of usability and security
a room or building by limiting access to specific people and
keeping record of all accesses. To limit access to specific III. METHODOLOGY
people, it utilizes an individual-authentication method [6].
Biometric authentication uses unique physiological or A. Design Consideration Specification
behavioural characteristics to limit access. This makes the
issue of loss and impersonation less prevalent. There are The embedded door access control system was centered on
several types of biometric authentication methods. The iris recognition for verification. One of the aims was to
biometric used in this paper is the Iris. This paper describes the improve security and avoid impersonation. The proposed
features of the iris as a biometric and how it can be used system makes use of the ATmega128 chip as the core of the
control access to restricted areas. embedded system and an iris scanner. These were used to
control access via a door by ensuring that access was granted
only to verified persons [11].
C. Biometrics
Biometrics uses unique behavioural and physical traits in The embedded chip was programmed using the C language.
humans to identify individuals [7]. This usually involves The compiler used during development of the system was the
acquiring an image of the individual’s unique physical trait and GNU Compiler. The integrated development platform used
comparing it with the previously stored templates in a database. was Eclipse which has a fully functional C and C++ Platform.
This has made it possible to use biometrics in a wide range of
applications and the field keeps evolving [8, 9]. The face, B. Operational Principle of the Designed System
voice, fingerprints and many other physical traits have found The proposed design involves two phases, the enrolment
use in a diverse range of applications. The reliability in terms phase and verification phase. Each phase is depicted in Figure
of usability and security are depicted in Figure 1. 3.
The iris is surrounded by the pupil and sclera. It is one of Once an individual has been enrolled into the system, the
the most reliable physical traits that can be used for individual user is given access to the door. Identification implies a one-to-
identification. The stable, invariant and unique nature of the iris many match requiring the iris of the user to be provided as a
is in a special class of its own. It is a more stable biometric trait means of identification. The iris sample provided is compared
in comparison to others. The iris is so unique that it is different to the previously stored information in the database. If there is
for the left and right of the same individual (even twins). a match with the iris pattern enrolled, access is allowed.
Daugman wrote an efficient algorithm for iris recognition Otherwise, access is denied.
developed a very efficient method for iris recognition in 1992
[10]. Daugman used the integro-differential method to detect Figure 2 shows the block diagram of the designed system
the boundaries of the iris and 2D Gabor filter, was used for while Figure 4 is a depiction of the algorithm used to
feature extraction. implement the iris biometric door access system.

591
Start Enrollment
Scan users
iris

No

Input the
required Scan image
data accepted?

No
Fig. 2. Block diagram of the designed system
Yes

All required
fields
completed?
Load all data

Yes

Save data
Finish

Fig. 3. The Enrolment and Authentication Algorithm

C. Circuit
The circuit design was accomplished using PROTEUS®. Fig. 4. Algorithm used to implement the designed iris biometric door access
This made it possible to design and test-run the simulated system.
system before it was implemented. The circuit diagram is
shown in Figure 5.

592
CONCLUSION [5] Daugman, J. (1985) Uncertainty relation for resolution in space, spatial
frequency, and orientation optimized by two-dimensional visual cortical
The performance of the designed biometric door-access filters. Journal of the Optical Society of America A 2(7): 1160-1169
control was satisfactory. [6] Daugman, J. (1988) Complete discrete 2D Gabor transforms by neural
networks for image analysis and compression. Trans. Acous. Sp. Sig.
Proc.36(7): 1169-1179.
ACKNOWLEDGMENT
[7] Okokpujie, Kennedy O. and Olajide, Funminiyi and John, S. N. and
This paper was sponsored by Covenant University, Ota, Kennedy, Chinyere Grace (2016) Implementation of the Enhanced
Ogun State. Fingerprint Authentication in the ATM System Using ATmega128 with
GSM Feedback Mechanism. In: The 2016 International Conference on
Security & Management (SAM'16),, July 25-28, 2016, Las Vegas,
REFERENCES Nevada, USA.
[1] Adini, Y., Moses, Y., and Ullman, S. (1997) Face recognition: the [8] Daugman, J. (1994) U.S. Patent No. 5,291,560: Biometric Personal
problem of compensating for changes in illumination direction. Trans. Identification System Based on Iris Analysis. Issue Date: 1 March 1994.
Pat. Anal. Mach. Intell. 19(7): 721-732..J. Clerk Maxwell, A Treatise on [9] Daugman J. (2001) Statistical richness of visual phase information:
Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, Update on recognizing persons by their iris patterns. International
pp.68-73. Journal of Computer Vision 45(1): 25-38.
[2] Belhumeur, P.N., Hespanha, J.P., and Kriegman, D.J. (1997) Eigenfaces [10] Okokpujie K., Noma-Osaghae E., John S., Ajulibe A. (2018) An
vs. Fisherfaces: Recognition using class-specific linear projection. Improved Iris Segmentation Technique Using Circular Hough
Trans. Pat. Anal. Mach. Intell. 19(7): 711-720. Transform. In: Kim K., Kim H., Baek N. (eds) IT Convergence and
[3] Okokpujie K., Etinosa NO., John S., Joy E. (2018) Comparative Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, vol
Analysis of Fingerprint Preprocessing Algorithms for Electronic Voting 450. Springer, Singapore.
Processes. In: Kim K., Kim H., Baek N. (eds) IT Convergence and [11] K.O. Okokpujie, O.O. Uduehi, and F. O. Edeko, "An Innovative
Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, vol Technique in ATM Security: An Enhanced Biometric ATM with GSM
450. Springer, Singapore. Feedback Mechanism," Journal of Electrical and Electronics
[4] S. John, C. Anele, O. O. Kennedy, F. Olajide, and C. G. Kennedy, Engineering (JEEE), vol. 12, no. 2, pp. Pages 68-81, 2016.
"Realtime Fraud Detection in the Banking Sector Using Data Mining
Techniques/Algorithm," in Computational Science and Computational
Intelligence (CSCI), 2016 International Conference on, 2016, pp. 1186-
1191: IEEE.

593

You might also like