Design And Construction Of Biometric Security System Using Fingerprint
This research work on “Design And Construction Of Biometric Security System Using Fingerprint” is available in PDF/DOC. Click the below button to request or download the complete material
ABSTRACT
Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There is a number of biometrics and different applications need different biometrics. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual’s unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics includes fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Project deals with Identification, Authentication and Setup of Security System using SM 630 Biometrics and 8051 Microcontroller. Beside Biometrics and 8051 Microcontroller the major components required are LCD, General purpose PCB, Relay section (for opening and closing of security doors). The interfacing between 8051-LCD and 8051 – SM 630 Biometrics Module (Thumb Geometry recognition) is to be implemented. The details about each module are given in next sections of this report.
TABLE OF CONTENTS
TITLE PAGE
APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRCT
TABLE OF CONTENT
CHAPTER ONE
- INTRODUCTION
- BACKGROUND OF THE PROJECT
- AIM/OBJECTIVE OF THE PROJECT
- SIGNIFICANCE OF THE PROJECT
- PURPOSE OF THE PROJECT
- LIMITATION OF THE PROJECT
- APPLICATION OF THE PROJECT
- METHODOLOGY
- PROJECT ORGANISATION
CHAPTER TWO
LITERATURE REVIEW
2.0 LITERATURE REVIEW
2.1 REVIEW OF ELECTRICAL PHASES
2.2 REVIEW OF THREE-PHASE ELECTRIC POWER
2.3 REVIEW OF CAUSES OF POWER FAILURES
2.4 POWER SUPPLY RELIABILITY
2.5 HISTORICAL BACKGROUND OF ARDUINO
2.6 DEVELOPMENT OF ARDUINO
CHAPTER THREE
3.0 CONSTRUCTION METHODOLOGY
3.1 BLOCK DIAGRAM OF THE SYSTEM
3.2 DESCRIPTION OF SYSTEM BLOCK DIAGRAM
3.3 CIRCUIT DIAGRAM
3.3 CIRCUIT DESCRIPTION
3.4 SYSTEM OPERATION
3.5 COMPONENTS LIST
3.6 POWER SUPPLY UNIT
3.7 POWER SUPPLY CIRCUIT DSECRIPTION
3.7 DESCRIPTION OF MAJOR COMPONENTS USED
CHAPTER FOUR
4.0 RESULT ANALYSIS
4.1 CONSTRUCTION PROCEDURE AND TESTING
4.2 ASSEMBLING OF SECTIONS
4.3 CONSRUCTION OF THE CASING
4.4 ECONOMIC OF THE PROJECT
4.5 PROJECT VIABILITY
4.6 PROJECT RELIABILITY
4.7 PROJECT MAINTAINABILITY
4.8 PROJECT EVALUATION
4.9 TESTING, TROUBLESHOOTING AND REMEDY
CHAPTER FIVE
- CONCLUSIONS
- RECOMMENDATION
5.3 REFERENCES
Appendix A: user’s guide
Appendix B: cost analysis
CHAPTER ONE
- INTRODUCTION
1.1 BACKGROUND OF THE PROJECT
The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (according to Engert, Gerald J., 1964)[1].
Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.
Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson, P. Lee 1973[3]).
RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc.
Fingerprint System Authentication is a simpler process. It involves affirming or rejecting a claimed identity by matching a live template with an existing one. Most of these identification/ authentications are done by using Smart Card. The large growth of ID – Card based Fingerprint system security is wildly used in Public service applications ( according to Fiebig, Tobias; Krissler, Jan; Hänsch, Ronny August 2014)[7]. These cards are used for multiple purpose applications such as Digital parking meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity, Personal Identification Verification Number etc.
Another kind of Fingerprint System is the scanner using ultrasound. The process involves high frequency sound to identify a fingerprint. An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature differences used for a variety of security and data-collection purposes, from identifying prisoners to allowing access to information or high-security areas (Ashbaugh, David R, 2003)[4].
1.2 OBJECTIVE OF THE PROJECT
The objective of this work is to construct a device that utilizes fingerprint recognition technology to allow access. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button.
1.3 SIGNIFICANCE OF THE PROJECT
- Fingerprint based security system is most secured system as compared to other systems. Reason is that RFID card or Keys of lock can be stolen, password may be leaked. However thumbnail of every human being is unique, so lock will not open unless the same person is present to give the impression of fingerprint.
- No need to carry the keys to open the lock. Or even there is no need to remember the password or any Pin number.
- One of the main advantages is that this system remembers the stored password even if the power supply is turned off.
- Scientific research and studies have proved that fingerprints do not change as you grow up.
- Using Fingerprint saves time to gain access as compared to other methods like RFID card, Password or Key.
1.4 APPLICATIONS OF THE PROJECT
- Industrial application:“Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
- Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
- Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.
1.5 SCOPE OF THE PROJECT
Personal Safes are revolutionary locking storage cases that open with just the touch of your finger. These products are designed as secure storage for medications, jewelry, weapons, documents, and other valuable or potentially harmful items. These utilize fingerprint recognition technology to allow access to only those whose fingerprints you choose. It contains all the necessary electronics to allow you to store, delete, and verify fingerprints with just the touch of a button. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or combinations to be copied or stolen, or locks that can be picked (Henry, Edward R., Sir (1900)[2].
1.6 METHODOLOGY
To achieve the aim and objectives of this work, the following are the steps involved:
- Study of the previous work on the project so as to improve it efficiency.
- Draw a block diagram.
- Test for continuity of components and devices,
- Design and calculation for the device was carried out.
- Studying of various component used in circuit.
- Construction of the circuit was carried out.
- Finally, the whole device was cased and final test was carried out.
1.6 PROJECT WORK ORGANISATION
The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:
Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and application of the study were discussed.
Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.
Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.
Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.
Chapter five is on conclusion, recommendation and references.
References
- Engert, Gerald J. (1964). “International Corner”. Identification News. 14 (1).
- Henry, Edward R., Sir (1900). “Classification and Uses of Finger Prints” (PDF). London: George Rutledge & Sons, Ltd.
- Conklin, Barbara Gardner, Robert Gardner, and Dennis Shortelle. Encyclopedia of Forensic Science: a Compendium of Detective Fact and Fiction. Westport, Conn.: Oryx, 2002. Print.
- Ashbaugh, David R. “Ridgeology” (PDF). Royal Canadian Mounted Police. Retrieved 2013-10-26.
- Zabell, Sandy. “Fingerprint Evidence” (PDF). Journal of Law and Policy.
- Johnson, P. Lee (1973). “Life of Latents”. Identification News. 23 (1).
Fiebig, Tobias; Krissler, Jan; Hänsch, Ronny (August 2014). Security Impact of High Resolution Smartphone Cameras. Usenix Association. Retrieved 5 February 2015.