IEEE - Design and Implementation of An Iris Biometric Door Access Control System
IEEE - Design and Implementation of An Iris Biometric Door Access Control System
Chinonso Okereke
Olatunji J. Okesola
Department of electrical and Information Engineering Department of Electrical and Information Engineering
Covenant University, Covenant University,
Ota, Ogun State, Nigeria. Ota, Ogun State, Nigeria.
[email protected] [email protected]
Kennedy O. Okokpujie
Dept. of Electrical & Information Engineering
Covenant University,
Ota, Ogun state, Nigeria.
[email protected]
Abstract: Over the years, security has soared in importance Egyptian locks by using metals as their primary materials. In
as concerned individuals, companies and organizations continue 1861, Linus Yale patented the pin tumbler lock which is simple
to implement measures to improve the security of lives and and effective and it has been essentially unchanged until the
properties. Door-access control is a physical security system that introduction of biometrics in access control [2].
secures a room or building by limiting access to specific people
and keeping records of such accesses. The significance of iris Biometric technology involves using a measureable
technology among others, for security and access control characteristic or identifier to label an individual [3]. The
applications are numerous. In terms of physical security, iris identifier could be behavioural or physiological. Physiological
technology is already making inroads into the access control characteristics describe an individual based on the shape of the
market because of the reliability of its authentication process. In body. It includes using the fingerprint pattern, palm veins, face
this paper, the researchers present an aspect of the system structure, iris image, retina, or scent of persons as identifiers.
relating to the design and construction of an iris biometric door Behavioural characteristics relates to the pattern of behaviour
access control. The system was developed as a means of getting of a person such as gait, voice and even typing behaviour.
into a specified area by securing the door and limiting access. The
database created contains the particulars of those allowed access The integration of biometrics into access-control systems
in order to work in tandem with the mandatory iris has greatly increased the security of such systems. The
authentication process. The implemented design worked biometric characteristics used cannot be forgotten or misplaced
satisfactorily. and thus ensures a safer method of keeping lives and properties
safe [4].
Keywords—Biometrics, iris, recognition, access control,
One of the door access control’s main devices was the iris
security.
scanner supported by a database containing the unique iris
template and particulars of those authorized access the area
I. INTRODUCTION behind the door. The door used in the prototype was the
electric strike lock/dead bolt lock (an electromagnetic locking
Restriction of access to doors in ancient times was achieved
mechanism. A microcontroller was used to integrate the actions
by using knots (made of ropes and related materials to detect
of the scanner, database and the door’s opening and closing
when someone tries to open the door). The Greeks and
mechanism.
Egyptians developed the use of pin tumbler locks which were
made of wood [1]. The romans improved on the Greek and
591
Start Enrollment
Scan users
iris
No
Input the
required Scan image
data accepted?
No
Fig. 2. Block diagram of the designed system
Yes
All required
fields
completed?
Load all data
Yes
Save data
Finish
C. Circuit
The circuit design was accomplished using PROTEUS®. Fig. 4. Algorithm used to implement the designed iris biometric door access
This made it possible to design and test-run the simulated system.
system before it was implemented. The circuit diagram is
shown in Figure 5.
592
CONCLUSION [5] Daugman, J. (1985) Uncertainty relation for resolution in space, spatial
frequency, and orientation optimized by two-dimensional visual cortical
The performance of the designed biometric door-access filters. Journal of the Optical Society of America A 2(7): 1160-1169
control was satisfactory. [6] Daugman, J. (1988) Complete discrete 2D Gabor transforms by neural
networks for image analysis and compression. Trans. Acous. Sp. Sig.
Proc.36(7): 1169-1179.
ACKNOWLEDGMENT
[7] Okokpujie, Kennedy O. and Olajide, Funminiyi and John, S. N. and
This paper was sponsored by Covenant University, Ota, Kennedy, Chinyere Grace (2016) Implementation of the Enhanced
Ogun State. Fingerprint Authentication in the ATM System Using ATmega128 with
GSM Feedback Mechanism. In: The 2016 International Conference on
Security & Management (SAM'16),, July 25-28, 2016, Las Vegas,
REFERENCES Nevada, USA.
[1] Adini, Y., Moses, Y., and Ullman, S. (1997) Face recognition: the [8] Daugman, J. (1994) U.S. Patent No. 5,291,560: Biometric Personal
problem of compensating for changes in illumination direction. Trans. Identification System Based on Iris Analysis. Issue Date: 1 March 1994.
Pat. Anal. Mach. Intell. 19(7): 721-732..J. Clerk Maxwell, A Treatise on [9] Daugman J. (2001) Statistical richness of visual phase information:
Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, Update on recognizing persons by their iris patterns. International
pp.68-73. Journal of Computer Vision 45(1): 25-38.
[2] Belhumeur, P.N., Hespanha, J.P., and Kriegman, D.J. (1997) Eigenfaces [10] Okokpujie K., Noma-Osaghae E., John S., Ajulibe A. (2018) An
vs. Fisherfaces: Recognition using class-specific linear projection. Improved Iris Segmentation Technique Using Circular Hough
Trans. Pat. Anal. Mach. Intell. 19(7): 711-720. Transform. In: Kim K., Kim H., Baek N. (eds) IT Convergence and
[3] Okokpujie K., Etinosa NO., John S., Joy E. (2018) Comparative Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, vol
Analysis of Fingerprint Preprocessing Algorithms for Electronic Voting 450. Springer, Singapore.
Processes. In: Kim K., Kim H., Baek N. (eds) IT Convergence and [11] K.O. Okokpujie, O.O. Uduehi, and F. O. Edeko, "An Innovative
Security 2017. ICITS 2017. Lecture Notes in Electrical Engineering, vol Technique in ATM Security: An Enhanced Biometric ATM with GSM
450. Springer, Singapore. Feedback Mechanism," Journal of Electrical and Electronics
[4] S. John, C. Anele, O. O. Kennedy, F. Olajide, and C. G. Kennedy, Engineering (JEEE), vol. 12, no. 2, pp. Pages 68-81, 2016.
"Realtime Fraud Detection in the Banking Sector Using Data Mining
Techniques/Algorithm," in Computational Science and Computational
Intelligence (CSCI), 2016 International Conference on, 2016, pp. 1186-
1191: IEEE.
593