Fingerprint-Based Burglar Alarm System
Fingerprint-Based Burglar Alarm System
BY
NOVEMBER, 2023
DEDICATION
This project is dedicated to Almighty, the supreme God, and the ocean of knowledge, my
noble Parent, my great mentor, pioneer of truth, revivalist with incomparable tuition, may
the promise of God on conscious parents, be fulfilled upon them and bestow his mercy on
every One of us (Amen).
i
DECLARATION OF ORIGINALITY
I hereby declare that this project is a group work and has not been in part or in whole from any other
source except were duly acknowledged. As such, all use of previously published works from (books,
journals, magazines, internet, etc.) has been acknowledged within the main report to an entry in the
References list. We agree that an electronic copy or hardcopy of this report may be stored and used
for the purposes of plagiarism prevention and detection. We understand that cheating and plagiarism
constitute a breach of university Regulations.
ii
CERTIFICATION
This is to certify that the technical report described in this report was fully carried out and undertaken
Electrical/Electronics Engineering.
………………………… ………………………
Engr. Oyetola J. B. Date/Sign
Supervisor
………………………… ………………………
Engr. Olusuyi K. Date/sign
Coordinator TOP UP
iii
ABSTRACT
The development of a Fingerprint Based Burglar Alarm System includes many different features from
as simple as keypad to as complex as using smart biometrics. The Fingerprint Burglar Alarm System
–Arduino Based is developed to overcome the issue of upgrading and maintenance the system that
occur in the existing system. This report discusses on the Fingerprint Based Burglar Alarm System
using Arduino. Arduino is a type of microcontroller that uses its own programming language. It has
its own electronic prototyping platform to be used during experiment. This project has two features
as inputs, which are keypad and fingerprint scanner. While the outputs are magnetic switch, indicator,
LCD, and a siren. Interfacing all inputs and outputs with Arduino produced accurate results in
accessing the door based on the accuracy results obtained by performing a test on five individuals
with four different fingerprints each person. The entered password using keypad and minutiae
obtained by scanning fingerprint are clarified as inputs, while the output is the result displayed on
LCD. This project is reliable as it could increase the security level of door access system by
implementing simple approach as Arduino.
iv
LIST OF FIGURES
Figure 2.1 Fingerprint Based Burglar Alarm System –Arduino Based process flow………… 8
Figure 2.2 Block diagram of the system interfaced by Arduino ......................................... ….. 10
Figure 2.3 4x4 keypad matrix ............................................................................................. .. 10
Figure 2.4 Rows and columns of a keypad… ..................................................................... .. 10
Figure 2.5 An 8-bitresolutionimageofminutiae................................................................... . 11
Figure 2.6 Fingerprint scanner process flow....................................................................... . 12
Figure 2.7 16x2 LCD .......................................................................................................... . 13
Figure 2.8 Magnetic switch ................................................................................................ . 14
Figure 2.9 Magnetics witch schematic............................................................................... . 14
Figure 2.10 ON condition of magnetic switch .................................................................... . 14
Figure 2.11 OFF condition of magnetic switch ................................................................... . 14
Figure 2.12 Siren circuit .................................................................................................... . 15
Figure 2.13 LED .................................................................................................................. 15
Figure 3.1 Flowchart of project process flow .................................................................... . 20
Figure 3.2 Flow chart of the project activities ................................................................... 21
Figure 3.3 Hardware .......................................................................................................... 22
Figure 3.4 4x4 keypad schematic....................................................................................... 24
Figure 3.5 4x4 keypad layout............................................................................................. 24
Figure 3.6 Constructed circuit of keypad ........................................................................... 24
Figure 3.7 Constructed circuit of fingerprint scanner ........................................................ 25
Figure 3.8 Constructed circuit of LCD player ................................................................... 25
Figure 3.9 Constructed interface circuit............................................................................. 26
Figure 3.10 Format used in transferring data of fingerprint scanner ................................... 27
Figure 3.11 Example of output from Arduino serial monitor .............................................. 28
Figure 3.12 Constructed circuit on vero board .................................................................... 29
Figure 3.13 Fingerprint Based Burglar Alarm System –Arduino Based prototype ............. 29
Figure 3.14 Gantt chart ........................................................................................................ 30
Figure 3.15 Arduino Mega2560 board................................................................................. 31
Figure 3.16 USB cable ......................................................................................................... 31
Figure 3.17 Fingerprint scanner………………………………………………………………. 31
Figure 3.18 4x4 keypad…........................................................................................................ 31
v
Figure 3.19 16 x2 LCD… ........................................................................................................ 31
Figure 3.20 Arduino IDE development cycle .......................................................................... 32
Figure 4.1 Keypad output (password) at LCD ........................................................................ 33
Figure 4.2 Insert Password… .................................................................................................. 34
Figure 4.3 Result for correct password entered… .................................................................. 34
Figure 4.4 Wrong password entered… ................................................................................... 34
Figure 4.5 Result for wrong password entered… ................................................................... 34
Figure 4.6 Output of entering 3times of wrong password… .................................................. 34
Figure 4.7 Fingerprint enrolling output at serial monitor… ................................................... 35
Figure 4.8 Finger test output at serial monitor… .................................................................... 36
Figure 4.9 Finger test output at LCD ...................................................................................... 36
Figure 4.10 Found match of fingerprint… ................................................................................ 36
Figure 4.11 Process flow on detecting intruder… .................................................................... 37
Figure 4.12 Final product .......................................................................................................... 37
Figure 4.13 Results of accuracy test… ..................................................................................... 38
vi
LIST OF TABLES
Table 3: Comparisons of existing door access system with Door Access System -Arduino Base 17
vii
TABLE OF CONTENTS
Dedication………………………………………………..... i
Declaration of Originally ………………………… ii
Abstract ………………………………………………… iv
CHAPTER ONE
INTRODUCTION ………………………………………………………… 1
1.1 Background of Study ………………………………………………………… 1
1.2 Problem Statement …………………………………………………………… 1
1.3 Objective ……………………………………………………………………… 2
1.4 Scope of Study ………………………………………………………………… 2
1.5 Relevancy/significant/contribution of the Project ……………………………... 2
1.6 Feasibility of the Project within the scope and time frame ……………………. 2
1.7 Advantages of the fingerprint-based burglar alarm system ……………………. 2
1.8 Limitations of the fingerprint Based Burglar Alarm System …………………… 3
CHAPTER TWO
LITERATURE REVIEW ……………………………………………… 5
2.1 Fingerprint based burglar alarm system …………………………… 6
2.1.1 Arduino ………………………...................................................... 8
2.1.2 Keypad ……………………………………………………….. 9
2.1.3 Fingerprint Scanner …………………………………………. 10
2.1.4 LCD …………………………………………………………. 11
2.1.5 Magnetic Switch ……………………………………………… 13
2.1.6 Siren Circuits ……………………………………………… 14
2.1.7 Indicator (LED) …………………………………………… 14
viii
CHAPTER THREE
3.0 RESEARCH METHODOLOGY………………………………………………... 18
3.1 Project Process Flow ……………………………………………………………. 18
3.2 Project Activities ………………………………………………………………... 20
3.2.1 Identify Features/hardware to be used ………………………………………... 21
3.2.2 Design Circuits and identify I/O pins to Arduino ……………………………. 22
3.2.3 Construct Circuits for testing …………………………………………… 23
[Link] Keypad ……………………………………………………………………… 23
[Link] Fingerprint Scanner ……………………………………………………… 24
[Link] LCD ……………………………………………………………………. 24
[Link] Interface …………………………………………………………………… 25
3.2.4 Understand the circuit diagram……………………………………………… 26
[Link] Fingerprint scanner circuit operations………………………………………… 26
3.2.5 Create coding of each feature ....................................................................................... 27
3.2.6 Testing by ‘load and run’ program of each Feature into Arduino………………. 27
3.2.7 Construct circuit on overboard .......................................................................................... 28
3.2.8 Build prototype ……………………………………………………….. 28
3.3 Gantt chart………… ............................................................................................................ 29
3.4 Tool Required …………………………………………………………………. 30
3.4.1 Hardware ……………… .................................................................................................. 30
3.4.2 Software ……………....................................................................................................... 30
[Link] Arduino programming… ........ ………………………………………………………… 31
[Link] Frizzing ………………………………………………………………………. ............. 31
CHAPTER FOUR
CONSTRUCTION/TESTING/DISCUSSION…………………………………… ................... 32
4.1 Keypad ………………………………………………………. 32
4.1.1 Password…………………. ............................................................................................... 32
4.2 Fingerprint scanner ………………………………………………………………. 34
4.2.1 Enrolling …………………………………………………………………………. 34
4.2.2 Finger test and matching… ............................................................................................... 35
4.3 Safety Feature (Intruder Alarm) ........................................................................................... 36
4.4 Interfacing ………………………………………………………………………. .............. 36
ix
4.5 Accuracy test…… ............................................................................................................... 37
CHAPTER FIVE
CONCLUSION/RECOMMENDATIONS…………………………………………………. ... 38
REFERENCES ........................................................................................................................... 40
x
xi
CHAPTER ONE
INTRODUCTION
Nowadays, accurate personal identification is becoming more and more important. Currently, fingerprint
recognition is the most widely used technique for personal identification. Fingerprints are made up of locally
parallel ridges with singular points and they constitute a unique permanent universal pattern. The use of ink and
paper to get an image from a finger was used for a long time, but technological advances have enabled to automatic
Problem statements are the problems identified by observing the existing door access system. Through
observation, there are three problems that have been identified in order to develop this project which are:
a. Obsolete Components
The existence of new technologies comes from the creation of new components. This fact shows
that once the old devices are obsolete, there are no spare components could replace it. Therefore,
b. Upgrading Issues
Most of control access system nowadays uses PIC. It would be difficult with PIC because every
time upgrading needs to be done, the stand-alone PIC needs to be pulled out from the circuit and
burned again.
c. Complicated Programming
Since most of control access system nowadays uses PIC, many engineers will face difficulties if
problem occur on the device. The reason being is because PIC is not an open-source IDE
compared to Arduino. Therefore, if problem occur, more time is needed for the engineers to
1
create new coding for the device.
1.3 Objective
• To create a door access system using Arduino approach.
The Door Access System Arduino Based is proposed mainly for Tricubes Computer SD. Bhd. This
company produces product and services for Enterprise Mobility and Identity
building. It is also designed to help the engineers in the future to perform maintenance and upgrading
work easily.
1.6 Feasibility of the Project within the Scope & Time Frame
simpler compared to the existing door access system. Since most of buildings nowadays implement the
use of door access system, this project is economically feasible as it can be marketed around the world.
It is also feasible within the scope and time frame because Arduino is an open-source IDE which is
suitable to be used within the time frame which leads to less time consumption.
a. High Accuracy
The attraction of fingerprint scanners is partly due to their high accuracy rate. They outperform
2
traditional techniques such as passwords and pins. With of a claimed mistake rate of less than
1% making them a trustworthy means of user verification. The failure rate will vary between
b. Convenience
Fingerprint scanners considerably ease the login process as a smooth, time-efficient authentication
solution. Users simply need to touch their finger on the scanner for authentication, which takes
seconds-a significant improvement over entering passwords or pins numerous times each day.
They don’t need to worry about leaving their badge or fob at home either.
c. Ultra secure
making it a strong line of defense against security breaches. Fingerprint unlike passwords or
pins cannot be readily copied or guessed making a fingerprint scanner a security firewall.
d. Durability
Designed to withstand the rigors of frequent use, fingerprint scanners are robust. Durability has
improved dramatically in the last ten years with high IP ratings meaning they are dust and water
ingress resistant.
e. Cost effective
Overtime, fingerprint scanners have become increasingly affordable. This cost effectiveness
makes them a viable option not only for large corporations but also for small and medium sized
Fingerprint biometrics is a security feature that cannot be forgotten or misplaced like a password
or hardware token. It can be more secure than other forms of authentication as biometric
information is linked to a specific individual and therefore more difficult to steal, lose or
3
1.8 Limitations
Unlike some other biometric technologies, fingerprint scanners necessitate physical contact. This
requirement might be difficult for those who have physical limitations or injuries that limit their
ability to use their fingers. There was a move away from fingerprint scanners during the
pandemic for this reason, but in the main this reservation is no longer for customers.
b. Susceptibility to Spooling
Despite being a more secure method of authentication, fingerprint scanners are not entirely
deceive these scanners. However, such an undertaking is challenging and far less common than
other fraudulent practices such as password cracking or phishing. In most situations where an
intruder was willing to go to this level of preparation, there would be an exceptionally secure
environment.
c. Not infallible
Fingerprint scanners may falter in accurately recognizing a user’s fingerprint under certain
conditions. Dirty, wet, or damaged fingerprints can cause the scanner to fail, leading to
frustration and delays in the authentication process. In certain sectors this has led to the more
frequent adoption of different biometric technologies such as face scanners in the construction
industry where trades people can find that their fingerprints are degraded or suffer frequent cuts.
d. Privacy Concerns
The use of biometric data and credentials, such as fingerprints, raises concerns about privacy.
Some individuals worry about potential misuse of their biometric data, fearing their movements
could be tracked or their identity ascertained without their consent. With good quality,
4
fingerprint scanners and cyber security, users can be reassured that their data is safe. Can
fingerprint data be given to authorities? If a crime has been committed, then the police or Garda
could request entry and exit reports from a company operating a fingerprint access control
system. This would prove that an individual was in a place at a certain time. However, they
could not extract the person’s fingerprint to compare with one left at a crime scene from the
5
CHAPTER TWO
LITERATURE REVIEW
A smart door lock is defined as an electronic and mechanical locking device that open wirelessly with an
authorized user’s authentication. Rouse M. (2017). The existence of a smart door lock began with the
smart home automation system. The creation of a smart home is where the parts of a home is manipulated
The original basic function of a smart door is to increase a home’s security system. By creating a smart
door, it can enhance a home security by installing an automated door lock which enables access to
authorized users, and installing a surveillance system which can help in catching a criminal IJSRISE
(2015).
The fact of time-consuming system has also been said in a journal written by Ibrahim et. al. (2011) on
face-recognition system. Face-recognition is difficult to build as there are a lot of factor needs to be
considered during image capturing which are illumination, distance, and an individual’s head orientation.
This system is also sensitive to aging and facial expression. It is also troublesome during experimental
work as many faces need to be taken at nine different angles by Rashid et. al. (2008).
In this project, keypad and fingerprint scanner are implemented in developing the Fingerprint Based
Burglar Alarm System – Arduino Based. These two features were chosen because of its user-friendly,
smart and high security system compared to other features such as face-verification, smart card, RFID
Fingerprint scanner is a type of biometric sensors whereby it senses the human fingerprint for
Based on a journal written by [Link]. (2000) on face-verification system, this system is time-
consuming to build because the users need to have more than one images to separate ID and non-ID images
6
for identification data storage purposes. Despite of its advantages of identifying intra and
interdependencies, it is proven that this system is inefficient because it took 6seconds to make decision
while the aim is within 2 seconds Ibrahim, R., & Zin, Z.M. (2011).
Another access control system project by using voice-recognition system done by Rashid et. al. (2008) is
also a sensitive system as it will reject the voice input if there are background noise by Cui et. al. (2009).
Cui et. al. (2009) agrees the fact of voice-recognition system being difficult. The reason being is because
it needs to build up a speech model whereby the users have to pronounce the text according to the stated
ones. Despite of its lacking inefficiency, this project done by Bo Cui and Tongze Xue has its advantages
compared to other projects with similar feature by using a technology to filter low frequency disturbing
As compared to the fingerprint scanner used in this project, during experimental work, the elements need
to be considered are the illumination and humans sweat that may appear on an individual’s finger.
Implementing the fingerprint scanner produce a less time – consuming system as it can easily sense
human fingerprint with a much higher percentage of accuracy which is 70% for the left thumb print There
a son being is because fingerprint scanner accuracy is only influenced less factor than face-verification
which are by human’s sweat and scratch surface of the scanner. Besides that, the fingerprint scanner used
Fingerprint Based Burglar Alarm System is a type of control access system which control the
opening and closing of the door. It is a system that is implemented on a building to keep the
people and assets in the building to be safe from outsiders. The system is usually used during
the activity of people entering and exiting the building. The door access system helps to
differentiate unauthorized and authorized people as the system only allows the authorized
person to enter the building. The door access system has two main features which are: -
7
a) Keypad
b) Fingerprint scanner
To operate the system, these two features are interfaced with Arduino programming and the
outputs are: -
a) LCD
b) Magnetic switch
c) Indicator
Figure 2.1 illustrates the three main processes in the operation of the F i n g e r p r i n t .
B a s e d B u r g l a r A l a r m S y s t e m – Arduino Based: -
8
2.1.1 Arduino
Arduino is an open-source physical computing platform based on a single microcontroller board. Arduino
is used when there are interactions between inputs and outputs. It is used to control the output according
to the inputs command such as controlling the light or motor by using a switch. The Arduino
programming language uses Wiring which is an integrated development environment (IDE), and a single
Cross platform–Arduino software can run on Windows, Macintosh OSX and Linux operating system.
Simple, clear programming environment–Arduino is easy to use by beginners and advanced users.
In this project, Arduino is implemented by using the Arduino Mega 2560 as the micro controller board
ATMEGA2560 can be edited in the future for maintenance purposes. The inputs and outputs will be
connected to the Arduino Mega 2560 I/O pins and interfacing is done by using Arduino software. Based
on Figure 3, it shows the block diagram of the system interfaced by Arduino. At mega 2560 is the
microcontroller which controls the inputs (keypad and fingerprint scanner) and outputs (LCD, magnetic
9
Power
LCD
Keypad
ATMEGA256
Magnetic
Fingerprint
Switch
Scanner
Indicator Siren
by Arduino.
Keypad
A keypad is a device used to enter the desired output. In this project a keypad matrix with 16 push buttons
is used as shown in Figure 2.3. This type of keypad has four rows and four columns whereby the
overlapping rows and columns are the keys as shown in Figure 2.5.
10
2.1.2 Fingerprint scanner
A fingerprint scanner is a type of biometric scanner which scans the human fingerprint. Its function is to
capture the human fingerprint as in Figure 1.5. There are two types of fingerprint scanner which are
optical and capacitive fingerprint scanner. The differences between these two types of fingerprints are
that the optical fingerprint and capacitive fingerprints canner captures minutiae by light and current
respectively. In this project, the optical scanner is used because it is less accessible to electrostatic
discharge (ESD) compared to capacitive fingerprint scanner. The fingerprint scanner is frequently
implemented in control access system. The reason being is because every human has different fingerprint
minutiae which help in identifying the true data of a person accurately. In the case of door access system,
the person who wishes to enter the building needs to scan their fingerprint to be based on Figure 2.5, in
this project the Adafruit fingerprint scanner used can cater up to 162 fingerprints. The stored fingerprints
are stored in the onboard Flash Memory which has the size of 512bytes. The fingerprint scanner process
11
Scan & enrolment-User place finger onto the scanner
↓
Sensing by sensor-Fingerprint sensor provide light to fingers surface and
captures the minutiae by using a charge-coupled device (CCD)with an
8bits per dot with a
Resolution of 500dpi (dots per inch) in grey scale
↓
Storing by processor–The captured minutiae which has been converted to
digital signal.
Is stored in the local database.
↓
Comparing by software–Every fingerprint scanning event will capture a new humans’ minutiae.
These new minutiae will be compared to the ones stored in database to be
Identified whether the person is authorized or non-authorized.
2.1.4 LCD
A 16 x 2 LCD which has 2 horizontal lines comprising a space of 16 displaying character is used in this
project as shown in Figure 2.9. It has two types of registries inbuilt which are: -
In this project, the function of the LCD is to displays the desired output according to the program.
Based on Table 1, each LCD pins has its own and it is connected to Arduino I/O digital pins.
12
Figure 2.7: 16 x 2
LCD [7]
13
2.5.1 Magnetic switch
A magnetic switch is a normally closed dry contact that depends on magnetic field to operate. It applies
relay working principle and control electrical switches by another switch. In this project the magnetic
switch act as a magnetic door lock, whereby it is activated to lock the doors and it will be deactivated for
the authorized users. It is also used as an intruder alarm to acknowledge the security guards on the
presence of intruder. Figure 2.10 shows the magnetic switch, while Figure 2.11 shows the schematic of
magnetic switch.
Based on Figure 2.11, there are two circuits in magnetic switch, which are: -
During ON condition, the current flows through control circuit will produce magnetic field that would
cause load circuit to be close (ON) as shown in Figure 2.13. Otherwise, the load circuit will be open
(OFF).
14
2.6.1 Siren Circuit
A siren circuit is a circuit which produce siren by connecting the circuit to the speaker as output as shown
in Figure 2.13. The function of the siren circuit in this project is to produce siren at a certain basis. There
are two conditions that will activate the siren which are: -
Presence of intruder
Users inserted wrong password more than the allowable attempts
indicator. The red LED indicates door lock while the green LED indicates door unlock.
The benefit of using fingerprint scanner was also said by Zhu et. al. (2011) in their journal that fingerprint-
verification overcome the issue of losing ID card wherein their project is car keys. Another advantage is
that the ownership can never be passed to other people. An optical fingerprint scanner is implemented in
this project compared to other biometric features is because it has more advantages as stated in Table 2
by Albunni M. N. (2004).
15
The quality of the scanned fingerprint is very important. To obtain a good quality fingerprint, the
fingerprint sensor senses the skin types and humidity of the finger grain. The type of fingerprint used in
this system is the optical sensor whereby optics sensor the CCD (Charge Coupled Device) Kurosawa et.
al. (1999).
In order to interface or have the system functioning, software’s and programming language are used
besides hardware. Project by Wheeler [Link]. (2000) implements MATLAB for face engine and Visual
Basic for interface according to Ibrahim, R., & Zin, Z.M. (2011). While project by Ibrahim et. al. (2011)
implements Microsoft Visual C++ and Visual Basic 2008 platforms for the application of Artificial
Neural Network. Compared to Arduino, which is used in this project, it implements a simple yet can be
used by an advanced programmer to interface the hardware and develop the door access system by Rashid
In terms of communications, Arduino is much more efficient as it communicates by using USB cable
compared to the project done by Rashid et. Al (2008) which uses parallel port that is less speed according
Table 3 below shows the comparisons of existing door access system with Door Access System –
16
Table 3: Comparison of existing door access system with door access System ARDUINO
Based
No Author Title Advantages Disadvantages/
Limitations
1 Wheeler, Performance Identify intra and 1- An individual needs to
G.V., assessment of a interdependencies have more than 1 image
Courtney., face-verification to separate id and non-id
Cootes, T.F., based access images.
& Taylor, control. 2- Very sensitive
C. J system
3- Less speed because it
(2000)
takes 6 seconds to make
decision while the aim is
within2seconds.
17
3 Rashid, R. Security System Provides adjustable 1- Very sensitive. It will
A., Mahalin, Using Biometric security level setting reject the match if there
System (VRS)-
ones.
Automobiles
18
CHAPTER THREE
RESEARCH METHODOLOGY
The project process flow is illustrated as flow chart in Figure 15. Firstly, the user will insert the password
that has already been set by the system. If the entered password is correct, the user may proceed by
entering their ID. Otherwise the user will be given three attempts to enter password. If wrong password
Next, each authorized user has a template of their own fingerprint saved in the memory. In order to enter
the building, the users need to scan their fingers by placing their finger onto the fingerprint scanner.
During storing process for fingerprint scanner, the storing starts by enrolling the users ID. Once the users
place their finger, the fingerprint scanner will capture the fingerprint. It will then extract the minutiae and
Next the process continues by finding the match. For fingerprint, it uses the stored minutiae with the ones
If the users’ minutiae match their own minutiae which have already been stored before, the users may
access the door as the magnetic door lock will be deactivated. Otherwise, the users have to enter their ID
number again. The users will be given three attempts. If the users fail at the third attempt, alarm will be
19
Start
Enter Password
NO
(1st&2ndattempts)
Match
NO
password?
NO
YES
(3rd attempt)
Alarm activated.
Scan fingerprint
NO
(1st&2ndattempts)
Match NO
fingerprint
NO
YES (3rdattempt)
Deactivate
magnetic door lock. Alarm activated.
End
20
3.2 Project Activities
The project activities are done according to flow chart in Figure 3.16. The procedure shows the activity
from the beginning of the project until it is completed.
Obtain results.
Build
prototype.
21
3.2.1 Identify features / hardware to be used.
Figure 18 shows the hardware used in this project. There are five main hardware which are 4x4 keypad,
fingerprint scanner, Arduino Mega board and 16x2 LCD. Keypad and fingerprint scanner are the
features used to access the door. While the Arduino board platform is a platform that is designed to be
used for testing by connecting the features to its I/O pins and uploading program to the Atmel
Atmega2560 microcontroller. The function of LCD is to display the output and the USB cable is used
to communicate the Arduino programming language and the Atmel Atmega 2560 microcontroller.
LCD display
Keypad
Fingerprint
Arduino
Scanner
Mega
Board USB Cable
22
3.2.2 Design circuit and identify I/O pins to Arduino board.
The circuit diagram (Appendix A) of this door access system is designed by using Fritzing software
which is a type of designing tools that supports Arduino. The connections of the features to Arduino I/O
pins are shown in Table 4.
Siren Positive 9
Negative GND
Indicator Red 11
Green 10
23
3.2.3 Construct circuit for testing
[Link] Keypad
The keypad used in this project is 4x4 keypad which have eight I/O pins. It is divided as rows and columns
as Figure 1.18.
Based on Figure 19 the first four pins (pink, light blue, black, orange) of the keypad are the columns
while the following four pins (red, yellow, dark blue, purple) are the rows. Circuit of the keypad is shown
24
[Link] Fingerprint scanner
The fingerprint scanner has 4 wires that can be connected to Arduino. Figure 3.21 below shows the circuit
connection of it. The connection of fingerprints scanner to Arduino I/O pins can be referred to Table 4.
[Link] LCD
The LCD is a 16 x 2 display. It is used to replace the Arduino IDE serial monitor to display the output.
Figure 3.23 shows the constructed circuit of LCD. The connections of LCD to Arduino I/O pins can be
referred to Table 4.
25
[Link] Interface
After testing the keypad circuit and fingerprint scanner circuit by interfacing with Arduino separately,
both of the circuits are then combined together with LCD and Arduino to be interfaced. Figure 3.23 shows
the interfacing circuit between keypad and fingerprint scanner with Arduino.
2. Pins at D23 until D29 are pins for rows, while pins at D31 until D37 are pins for
columns.
4. The format of the data passing through D12 and D13 will follow the format in
Figure 24.
26
8bits Stop bit
Start bit
UART POWER
1byte
Figure 3.10 Format used in transferring data of fingerprint scanner
27
3.2.5 Create coding of each feature
Since keypad and fingerprint scanner is the feature used in this project, therefore coding for these two
features are created in the beginning. For fingerprint scanner it includes coding for enrolling and finger
test. The output of the keypad and fingerprint scanner will be displayed using the serial monitor before it
is displayed though LCD. After each feature has its own programming, it has then been interface among
the features itself. Below is the list of coding developed for this project. Refer Appendix C for coding.
3.2.6 Testing by ‘load and run’ program of each feature into Arduino
Testing is done after constructing each circuit and creates coding. Before interfacing with LCD, the
output is displayed on the Arduino serial monitor. If the testing was a success, each circuit will be
interfaced with LCD to have the output on the display as shown in Figure 1.25.
28
3.2.7 Construct circuit on Vero board
After all the circuit connections have been confirmed, the circuit is constructed and soldered on
The prototype is built to show the process flow of the system clearly as shown in Figure 3.27. It is
designed with a door and a panel to insert the features which are keypad, fingerprint scanner and LCD.
29
3.3 Gantt Chart
Figure 3.28 shows the Gantt chart of the project. The function of the Gantt chart is to plan
30
3.4 Tools Required
3.4.1 Hardware
There are five main hardware used in this project. Figure 1.29 to Figure 1.33 shows the
hardware and Table 5 states the functions of each hardware.
Hardware Function
USB cable Connects the Arduino board to computer for Uploading purposes
Arduino Mega2560 Testing purposes and interface Arduino with the features
Board
Fingerprint scanner Scan the user’s thumbprint
Keypad To enter ID/password
LCD Display the output
31
3.4.2 Software
[Link] Arduino programming
Arduino is an open-source microcontroller. It can be edited and loaded to the microcontroller by using a
USB cable. Arduino is an inexpensive type of single-microprocessor prototyping platform. The software
consists of standard programming language, which is similar to C/C++. To run the program, Arduino
comes with a boot loader that runs on the board. There as one of implementing Arduino in this project is
because it has many advantages compared to other microcontrollers such as PIC. It is coming with an
ATMEGA2560 microcontroller whereby the program stored in ATMEGA2560 can be edited in the
future for maintenance purposes. Figure 34 shows the development cycle of Arduino IDE whereby it
consists of editing the coding, compile, upload and run.
Edit
Compile
Upload
Run
Finish
[Link] Frizzing
Frizzing is software that supports Arduino. The libraries include components such as sensors and
32
CHAPTER FOUR
RESULTS/DISCUSSIONS
According to project activities flow chart Figure 16 above, after constructing the circuit, testing was done.
Figures 4.35 to 1.46 shows the results obtained from each feature and the interfacing all feature with
Arduino. During testing, the outputs obtained were displayed through serial monitor. The LCD is added
afterwards to replace the serial monitor.
4.1 Keypad
4.1.1 Password
Keypad is used to enter character and integer that is required to access the door. In this project, keypad
is implemented for password feature and use to insert ID. The first stage to access the door is to enter
password. Figure 4.35 shows a display for the user to enter the password. In this program the password
is set as ‘C141516’. If the users entered the same password as the ones set as in Figure 4.36, it will result
as’ Successful, Now scan finger’ as in Figure 4.37. Next the users may scan their fingerprint immediately
for the next stage of door access system. Otherwise, if the wrong password is entered as in Figure 4.38,
the LCD will display as ‘Wrong’ as in Figure 4.39. While Figure 4.40 shows the output of intruder’s
alarm.
33
Figure 4.2: Insert Password
34
4.1 Fingerprint scanner
4.1.2 Enrolling
The function of fingerprint scanner is to scan the user’s fingerprint. During scanning the fingerprint
scanner will capture and store the users’ minutiae. To have a database of user’s fingerprint minutiae, the
user needs to enroll their fingerprint. Figure 4.5 shows the result of an enrolled fingerprint. Once Arduino
detected fingerprint scanner, the users will insert the ID that will be saved together with their fingerprint minutiae.
According to figure above, the users fingerprint minutiae is enrolled with the ID: 2. It is then stored in the
35
4.2.2 Finger test and matching
After enrolling the fingerprint, the stored minutiae need to be tested to test the accuracy of the fingerprint
scanner. Figure 4.42 shows the finger test output at serial monitor. The user ID is found to be ID: 2. It
states the confidence which actually measures the accuracy of the current scanned fingerprint and the ones
stored in memory. The fingerprint scanner has a level of confidence from 0 to 255 which indicates from
less accurate to very accurate. Figure 4.43 is a command display for the user to place their fingerprint.
After scanned finger, Figure 44 shows the output being displayed at LCD. The output indicates the current
36
4.2.2 Safety Feature (Intruder Alarm)
Intruder Alarm is added to acknowledge the safety guards of intruder. Figure 4.11
Shows the process flow on detecting intruder.
4.4 Interfacing
Figure 4.12: shows the final product. After all the features have been interfaced, it is then
37
4.5 Accuracy test
Accuracy test is performed to observe the security level of the fingerprint scanner. Figure 1.47 shows the
result of the accuracy test based on the confidence level. The test was done on five individuals with four
thumbprints from each and one of them. The fingers scanned were, left and right thumbprint and also left
and right index finger. From the result below, it shows that finger with the most accurate result is left
thumbprint with the percentage of 70%, followed by right thumbprint, right index finger and left index
finger with the accuracy of 67.2%, 41.4% and 30% respectively.
Confidence level
250
200
Right Thumbprint
100
Right Index Finger
0 User
Shuhada Rohana Katy Mardiah
Syafiqah
38
CHAPTER FIVE
CONCLUSION/RECOMMENDATIONS
The implementation of door access system is considered to be a need for a building especially
companies to have a security system in order to keep the people inside and assets to be safe
from unwanted cases such as burglaries and kidnapping.
Tricubes Computer Sdn. Bhd. has been reported that the company’s existing door access system have
problems in maintaining due to its obsolete components that could not be replaced. The Door Access
System – Arduino Based is developed to overcome this issue as Arduino does not use a lot of components
with the existence of the Arduino plat form board and Atmel AVR microcontroller. The Arduino approach
also overcome the issue of upgrading as it comes with an Atmel AVR microcontroller which can be edited
and reprogrammed many times. Arduino is also known to its open source and cross-platform that could
ease the task of a programmer.
The software used in this project is Arduino programming language which is similar to C++. Based on
the research done by Ibrahim, R., & Zin, Z.M. (2011), Rashid et. al. (2008), Cui, B., & Xue, T. (2009),
Zhu, Z., & Chen, F. (2011), Albunni, M.N. (2004) & Kurosawa, K., Kuroki, K., and Saitoh, N. (1999).
It shows that Arduino is much simpler compared to other and suitable to be used in this project. Besides
software and approach, this project also differs in terms of its features which are keypad and fingerprint
scanner. It clearly shows that the features used in this project are more efficient compared to the existing
system.
There are two inputs used in this project which are keypad and fingerprint scanner. While the outputs are
LCD and magnetic door lock. Based on Figure 1.38, the fingerprint scanner has also high accuracy with
the percentage of 70% for the highest fingerprint. The fingerprint scanner used is in this project also have
high efficiency due to its time in obtaining results identifying minutiae which is less than 1 second in
identifying minutiae.
For future work it is recommended to add another feature such as smart card to increase the security level.
Smart card stores data such as name and ID of the owner and in future it can be used to match the entered
ID using keypad.
In conclusion the implementation of a door access system using Arduino. Arduino is a less time -
consuming programming because it is an open-source microcontroller. It has high quality system
compared to the existing door access system. The features used in this system helps to overcome the
39
security issues. The proposed system overcomes the issues of maintaining the device in future as Arduino
comes with ATMEGA2560 microcontroller that can be edited to comply with any changing system.
Adopting the keypad and fingerprint scanner features, creating a door access system- Arduino Based
brings a whole new high security access system with a simple new approach.
RECOMMENDATIONS
There is no engineering design that does not create room for improvement or future work. This design can be
further improved on by incorporating the fingerprint-based burglar alarm system with a GSM module so that it can
It is recommended that if failure occurs, the vero board should be trouble shoot by aprofessional
40
REFERENCES
Azzad Firdaus, Z., (2008) Electronic Combination Lock Using PIC, Final Year Project Report,
University Teknikal Melaka
Cui, B., & Xue, T., (2009), Design and realization of an intelligent access control system based on voice
recognition, Computing, Communication, Control, and Management, CCCM2009, ISECS
International Colloquium, Vol. 1, p.229-232,
Courtney, P., Cootes, T.F., Wheeler, G.V., & Taylor, C.J., (2000) Performance assessment of face-
verification based access control system, Automatic Face and Gesture Recognition, Proceedings.
Fourth IEEE International Conference, p. 221-226
Ibrahim, R., & Zin, Z.M. (2011) Study of automated face recognition system for office door access
control application, Communication Software and Networks (ICCSN), 2011 IEEE 3rd International
Conference, p. 132-136
Khan, S.R., (2012), Development of Low-Cost Private Office Access Control System (OACS),
International Journal of Embedded System and Application (IJESA), Vol.2, No.2,
Kurosawa, K., Kuroki, K., and Saitoh, N (1999) CCD Fingerprint Method- Identification of a Video
Camera from Videotape Images, Proceedings of International Conference on Image
Processing, Volume3:537 – 540, (1999),
Rashid, R. A., Mahalin, N. H., Sarijari, M. A., & Abdul Aziz, A. A. (2008) Security system using
biometric technology: Design and implementation of Voice Recognition System (VRS),
Computer and Communication Engineering, ICCCE International Conference, p. 898-902
Understanding-relays(2012) [Link]
Zhu, Z., & Chen, F., (2011) Fingerprint recognition-based access controlling system for automobiles,
Image and Signal Processing (CISP), 4th International Congress, Vol. 4, p.1899-1902
42