0% found this document useful (0 votes)
39 views54 pages

Fingerprint-Based Burglar Alarm System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views54 pages

Fingerprint-Based Burglar Alarm System

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

DESIGN AND CONSTRUCTION OF A

FINGERPRINT BASED BURGLAR ALARM


SYSTEM

BY

RASHEED DADA ABIODUN


FTP/EEE/21/0033375

A FINAL YEAR PROJECT SUBMITTED

TO THE DEPARTMENT OF ELECTRICAL/ELECTRONICS ENGINEERING, FACULTY


OF ENGINEERING, FEDERAL UNIVERSIITY OYE-EKITI, NIGERIA,
IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE AWARD OF [Link].
IN ELECTRICAL/ ELECTRONICS ENGINEERING

NOVEMBER, 2023
DEDICATION

This project is dedicated to Almighty, the supreme God, and the ocean of knowledge, my
noble Parent, my great mentor, pioneer of truth, revivalist with incomparable tuition, may
the promise of God on conscious parents, be fulfilled upon them and bestow his mercy on
every One of us (Amen).

i
DECLARATION OF ORIGINALITY
I hereby declare that this project is a group work and has not been in part or in whole from any other
source except were duly acknowledged. As such, all use of previously published works from (books,
journals, magazines, internet, etc.) has been acknowledged within the main report to an entry in the
References list. We agree that an electronic copy or hardcopy of this report may be stored and used
for the purposes of plagiarism prevention and detection. We understand that cheating and plagiarism
constitute a breach of university Regulations.

We understand that cheating and plagiarism constitute a breach of university Regulations


and will be dealt with accordingly.

ii
CERTIFICATION

This is to certify that the technical report described in this report was fully carried out and undertaken

by Rasheed Dada Abiodun with the Matriculation Number: FTP/EEE/21/0033375 in partial

fulfilment of the requirements for the award of Bachelor of Engineering ([Link].) in

Electrical/Electronics Engineering.

………………………… ………………………
Engr. Oyetola J. B. Date/Sign
Supervisor

………………………… ………………………
Engr. Olusuyi K. Date/sign
Coordinator TOP UP

iii
ABSTRACT

The development of a Fingerprint Based Burglar Alarm System includes many different features from
as simple as keypad to as complex as using smart biometrics. The Fingerprint Burglar Alarm System
–Arduino Based is developed to overcome the issue of upgrading and maintenance the system that
occur in the existing system. This report discusses on the Fingerprint Based Burglar Alarm System
using Arduino. Arduino is a type of microcontroller that uses its own programming language. It has
its own electronic prototyping platform to be used during experiment. This project has two features
as inputs, which are keypad and fingerprint scanner. While the outputs are magnetic switch, indicator,
LCD, and a siren. Interfacing all inputs and outputs with Arduino produced accurate results in
accessing the door based on the accuracy results obtained by performing a test on five individuals
with four different fingerprints each person. The entered password using keypad and minutiae
obtained by scanning fingerprint are clarified as inputs, while the output is the result displayed on
LCD. This project is reliable as it could increase the security level of door access system by
implementing simple approach as Arduino.

iv
LIST OF FIGURES

Figure 2.1 Fingerprint Based Burglar Alarm System –Arduino Based process flow………… 8
Figure 2.2 Block diagram of the system interfaced by Arduino ......................................... ….. 10
Figure 2.3 4x4 keypad matrix ............................................................................................. .. 10
Figure 2.4 Rows and columns of a keypad… ..................................................................... .. 10
Figure 2.5 An 8-bitresolutionimageofminutiae................................................................... . 11
Figure 2.6 Fingerprint scanner process flow....................................................................... . 12
Figure 2.7 16x2 LCD .......................................................................................................... . 13
Figure 2.8 Magnetic switch ................................................................................................ . 14
Figure 2.9 Magnetics witch schematic............................................................................... . 14
Figure 2.10 ON condition of magnetic switch .................................................................... . 14
Figure 2.11 OFF condition of magnetic switch ................................................................... . 14
Figure 2.12 Siren circuit .................................................................................................... . 15
Figure 2.13 LED .................................................................................................................. 15
Figure 3.1 Flowchart of project process flow .................................................................... . 20
Figure 3.2 Flow chart of the project activities ................................................................... 21
Figure 3.3 Hardware .......................................................................................................... 22
Figure 3.4 4x4 keypad schematic....................................................................................... 24
Figure 3.5 4x4 keypad layout............................................................................................. 24
Figure 3.6 Constructed circuit of keypad ........................................................................... 24
Figure 3.7 Constructed circuit of fingerprint scanner ........................................................ 25
Figure 3.8 Constructed circuit of LCD player ................................................................... 25
Figure 3.9 Constructed interface circuit............................................................................. 26
Figure 3.10 Format used in transferring data of fingerprint scanner ................................... 27
Figure 3.11 Example of output from Arduino serial monitor .............................................. 28
Figure 3.12 Constructed circuit on vero board .................................................................... 29
Figure 3.13 Fingerprint Based Burglar Alarm System –Arduino Based prototype ............. 29
Figure 3.14 Gantt chart ........................................................................................................ 30
Figure 3.15 Arduino Mega2560 board................................................................................. 31
Figure 3.16 USB cable ......................................................................................................... 31
Figure 3.17 Fingerprint scanner………………………………………………………………. 31
Figure 3.18 4x4 keypad…........................................................................................................ 31

v
Figure 3.19 16 x2 LCD… ........................................................................................................ 31
Figure 3.20 Arduino IDE development cycle .......................................................................... 32
Figure 4.1 Keypad output (password) at LCD ........................................................................ 33
Figure 4.2 Insert Password… .................................................................................................. 34
Figure 4.3 Result for correct password entered… .................................................................. 34
Figure 4.4 Wrong password entered… ................................................................................... 34
Figure 4.5 Result for wrong password entered… ................................................................... 34
Figure 4.6 Output of entering 3times of wrong password… .................................................. 34
Figure 4.7 Fingerprint enrolling output at serial monitor… ................................................... 35
Figure 4.8 Finger test output at serial monitor… .................................................................... 36
Figure 4.9 Finger test output at LCD ...................................................................................... 36
Figure 4.10 Found match of fingerprint… ................................................................................ 36
Figure 4.11 Process flow on detecting intruder… .................................................................... 37
Figure 4.12 Final product .......................................................................................................... 37
Figure 4.13 Results of accuracy test… ..................................................................................... 38

vi
LIST OF TABLES

Table 1: LCD pin description…............................................................................... 13

Table 2: Different biometric recognition technologies… ......................................... 16

Table 3: Comparisons of existing door access system with Door Access System -Arduino Base 17

Table 4: Connections to Arduino pins… .................................................................. 23

Table 5: Functions of each hardware ........................................................................ 31

vii
TABLE OF CONTENTS
Dedication………………………………………………..... i
Declaration of Originally ………………………… ii

Certification ……………………………………………. iii

Abstract ………………………………………………… iv

List of Figures ………………………………………… v

List of Tables …………………………………………. vii

CHAPTER ONE
INTRODUCTION ………………………………………………………… 1
1.1 Background of Study ………………………………………………………… 1
1.2 Problem Statement …………………………………………………………… 1
1.3 Objective ……………………………………………………………………… 2
1.4 Scope of Study ………………………………………………………………… 2
1.5 Relevancy/significant/contribution of the Project ……………………………... 2
1.6 Feasibility of the Project within the scope and time frame ……………………. 2
1.7 Advantages of the fingerprint-based burglar alarm system ……………………. 2
1.8 Limitations of the fingerprint Based Burglar Alarm System …………………… 3

CHAPTER TWO
LITERATURE REVIEW ……………………………………………… 5
2.1 Fingerprint based burglar alarm system …………………………… 6
2.1.1 Arduino ………………………...................................................... 8
2.1.2 Keypad ……………………………………………………….. 9
2.1.3 Fingerprint Scanner …………………………………………. 10
2.1.4 LCD …………………………………………………………. 11
2.1.5 Magnetic Switch ……………………………………………… 13
2.1.6 Siren Circuits ……………………………………………… 14
2.1.7 Indicator (LED) …………………………………………… 14

viii
CHAPTER THREE
3.0 RESEARCH METHODOLOGY………………………………………………... 18
3.1 Project Process Flow ……………………………………………………………. 18
3.2 Project Activities ………………………………………………………………... 20
3.2.1 Identify Features/hardware to be used ………………………………………... 21
3.2.2 Design Circuits and identify I/O pins to Arduino ……………………………. 22
3.2.3 Construct Circuits for testing …………………………………………… 23
[Link] Keypad ……………………………………………………………………… 23
[Link] Fingerprint Scanner ……………………………………………………… 24
[Link] LCD ……………………………………………………………………. 24
[Link] Interface …………………………………………………………………… 25
3.2.4 Understand the circuit diagram……………………………………………… 26
[Link] Fingerprint scanner circuit operations………………………………………… 26
3.2.5 Create coding of each feature ....................................................................................... 27
3.2.6 Testing by ‘load and run’ program of each Feature into Arduino………………. 27
3.2.7 Construct circuit on overboard .......................................................................................... 28
3.2.8 Build prototype ……………………………………………………….. 28
3.3 Gantt chart………… ............................................................................................................ 29
3.4 Tool Required …………………………………………………………………. 30
3.4.1 Hardware ……………… .................................................................................................. 30
3.4.2 Software ……………....................................................................................................... 30
[Link] Arduino programming… ........ ………………………………………………………… 31
[Link] Frizzing ………………………………………………………………………. ............. 31

CHAPTER FOUR
CONSTRUCTION/TESTING/DISCUSSION…………………………………… ................... 32
4.1 Keypad ………………………………………………………. 32
4.1.1 Password…………………. ............................................................................................... 32
4.2 Fingerprint scanner ………………………………………………………………. 34
4.2.1 Enrolling …………………………………………………………………………. 34
4.2.2 Finger test and matching… ............................................................................................... 35
4.3 Safety Feature (Intruder Alarm) ........................................................................................... 36
4.4 Interfacing ………………………………………………………………………. .............. 36

ix
4.5 Accuracy test…… ............................................................................................................... 37

CHAPTER FIVE
CONCLUSION/RECOMMENDATIONS…………………………………………………. ... 38
REFERENCES ........................................................................................................................... 40

x
xi
CHAPTER ONE

INTRODUCTION

1.1 Background of Study


In today’s regular life there are many problems of common companies and other security for home application and

there are also important applications of automatic control in many applications.

Nowadays, accurate personal identification is becoming more and more important. Currently, fingerprint

recognition is the most widely used technique for personal identification. Fingerprints are made up of locally

parallel ridges with singular points and they constitute a unique permanent universal pattern. The use of ink and

paper to get an image from a finger was used for a long time, but technological advances have enabled to automatic

the acquisition stage by means of solid-state sensors.

1.2 Problem Statement

Problem statements are the problems identified by observing the existing door access system. Through

observation, there are three problems that have been identified in order to develop this project which are:

a. Obsolete Components
The existence of new technologies comes from the creation of new components. This fact shows

that once the old devices are obsolete, there are no spare components could replace it. Therefore,

new system with new components has to be created.

b. Upgrading Issues
Most of control access system nowadays uses PIC. It would be difficult with PIC because every

time upgrading needs to be done, the stand-alone PIC needs to be pulled out from the circuit and

burned again.

c. Complicated Programming
Since most of control access system nowadays uses PIC, many engineers will face difficulties if

problem occur on the device. The reason being is because PIC is not an open-source IDE

compared to Arduino. Therefore, if problem occur, more time is needed for the engineers to

1
create new coding for the device.

1.3 Objective
• To create a door access system using Arduino approach.

• To test the accuracy of this device.

1.4 Scope of Study


• To understand about door access system.

• To understand about keypad.

• To understand about biometric fingerprint scanner.

• To study about Arduino and its application.

1.5 Relevancy/Significant/Contribution of the Project

The Door Access System Arduino Based is proposed mainly for Tricubes Computer SD. Bhd. This

company produces product and services for Enterprise Mobility and Identity

[Link] of this to have access to the

building. It is also designed to help the engineers in the future to perform maintenance and upgrading

work easily.

1.6 Feasibility of the Project within the Scope & Time Frame

The Door Access System-Arduino Based is designed to be technically feasible. It is designed to be

simpler compared to the existing door access system. Since most of buildings nowadays implement the

use of door access system, this project is economically feasible as it can be marketed around the world.

It is also feasible within the scope and time frame because Arduino is an open-source IDE which is

suitable to be used within the time frame which leads to less time consumption.

1.7 Advantages of the Fingerprint Based Burglar Alarm System

a. High Accuracy

The attraction of fingerprint scanners is partly due to their high accuracy rate. They outperform

2
traditional techniques such as passwords and pins. With of a claimed mistake rate of less than

1% making them a trustworthy means of user verification. The failure rate will vary between

manufacturers and quality of components used. Some are lower as 0.1%.

b. Convenience

Fingerprint scanners considerably ease the login process as a smooth, time-efficient authentication

solution. Users simply need to touch their finger on the scanner for authentication, which takes

seconds-a significant improvement over entering passwords or pins numerous times each day.

They don’t need to worry about leaving their badge or fob at home either.

c. Ultra secure

The fingerprint is an unrepeatable, unique characteristic that belongs solely to an individual,

making it a strong line of defense against security breaches. Fingerprint unlike passwords or

pins cannot be readily copied or guessed making a fingerprint scanner a security firewall.

d. Durability

Designed to withstand the rigors of frequent use, fingerprint scanners are robust. Durability has

improved dramatically in the last ten years with high IP ratings meaning they are dust and water

ingress resistant.

e. Cost effective

Overtime, fingerprint scanners have become increasingly affordable. This cost effectiveness

makes them a viable option not only for large corporations but also for small and medium sized

business looking to bolster their security measures.

Fingerprint biometrics is a security feature that cannot be forgotten or misplaced like a password

or hardware token. It can be more secure than other forms of authentication as biometric

information is linked to a specific individual and therefore more difficult to steal, lose or

compromise which can improve reliability and simplicity security processes.

3
1.8 Limitations

a. The need for physical contact

Unlike some other biometric technologies, fingerprint scanners necessitate physical contact. This

requirement might be difficult for those who have physical limitations or injuries that limit their

ability to use their fingers. There was a move away from fingerprint scanners during the

pandemic for this reason, but in the main this reservation is no longer for customers.

b. Susceptibility to Spooling

Despite being a more secure method of authentication, fingerprint scanners are not entirely

impervious to breaches. High quality replicas of an individual’s fingerprints can potentially

deceive these scanners. However, such an undertaking is challenging and far less common than

other fraudulent practices such as password cracking or phishing. In most situations where an

intruder was willing to go to this level of preparation, there would be an exceptionally secure

environment.

c. Not infallible

Fingerprint scanners may falter in accurately recognizing a user’s fingerprint under certain

conditions. Dirty, wet, or damaged fingerprints can cause the scanner to fail, leading to

frustration and delays in the authentication process. In certain sectors this has led to the more

frequent adoption of different biometric technologies such as face scanners in the construction

industry where trades people can find that their fingerprints are degraded or suffer frequent cuts.

d. Privacy Concerns

The use of biometric data and credentials, such as fingerprints, raises concerns about privacy.

Some individuals worry about potential misuse of their biometric data, fearing their movements

could be tracked or their identity ascertained without their consent. With good quality,

4
fingerprint scanners and cyber security, users can be reassured that their data is safe. Can

fingerprint data be given to authorities? If a crime has been committed, then the police or Garda

could request entry and exit reports from a company operating a fingerprint access control

system. This would prove that an individual was in a place at a certain time. However, they

could not extract the person’s fingerprint to compare with one left at a crime scene from the

database as the biometric template is encrypted.

5
CHAPTER TWO

LITERATURE REVIEW

A smart door lock is defined as an electronic and mechanical locking device that open wirelessly with an

authorized user’s authentication. Rouse M. (2017). The existence of a smart door lock began with the

smart home automation system. The creation of a smart home is where the parts of a home is manipulated

and designed to operate wirelessly where an example of a phone is the door.

The original basic function of a smart door is to increase a home’s security system. By creating a smart

door, it can enhance a home security by installing an automated door lock which enables access to

authorized users, and installing a surveillance system which can help in catching a criminal IJSRISE

(2015).

The fact of time-consuming system has also been said in a journal written by Ibrahim et. al. (2011) on

face-recognition system. Face-recognition is difficult to build as there are a lot of factor needs to be

considered during image capturing which are illumination, distance, and an individual’s head orientation.

This system is also sensitive to aging and facial expression. It is also troublesome during experimental

work as many faces need to be taken at nine different angles by Rashid et. al. (2008).

In this project, keypad and fingerprint scanner are implemented in developing the Fingerprint Based

Burglar Alarm System – Arduino Based. These two features were chosen because of its user-friendly,

smart and high security system compared to other features such as face-verification, smart card, RFID

card and many more.

Fingerprint scanner is a type of biometric sensors whereby it senses the human fingerprint for

identification. Biometric consist of many types such as voice-recognition, face-recognition, fingerprint-

recognition, and other identification that consist of human body parts.

Based on a journal written by [Link]. (2000) on face-verification system, this system is time-

consuming to build because the users need to have more than one images to separate ID and non-ID images

6
for identification data storage purposes. Despite of its advantages of identifying intra and

interdependencies, it is proven that this system is inefficient because it took 6seconds to make decision

while the aim is within 2 seconds Ibrahim, R., & Zin, Z.M. (2011).

Another access control system project by using voice-recognition system done by Rashid et. al. (2008) is

also a sensitive system as it will reject the voice input if there are background noise by Cui et. al. (2009).

Cui et. al. (2009) agrees the fact of voice-recognition system being difficult. The reason being is because

it needs to build up a speech model whereby the users have to pronounce the text according to the stated

ones. Despite of its lacking inefficiency, this project done by Bo Cui and Tongze Xue has its advantages

compared to other projects with similar feature by using a technology to filter low frequency disturbing

according to Zhu, Z., & Chen, F., (2011).

As compared to the fingerprint scanner used in this project, during experimental work, the elements need

to be considered are the illumination and humans sweat that may appear on an individual’s finger.

Implementing the fingerprint scanner produce a less time – consuming system as it can easily sense

human fingerprint with a much higher percentage of accuracy which is 70% for the left thumb print There

a son being is because fingerprint scanner accuracy is only influenced less factor than face-verification

which are by human’s sweat and scratch surface of the scanner. Besides that, the fingerprint scanner used

in this project can make decision in less than 1 second.

2.1 Fingerprint Based Burglar Alarm System

Fingerprint Based Burglar Alarm System is a type of control access system which control the

opening and closing of the door. It is a system that is implemented on a building to keep the

people and assets in the building to be safe from outsiders. The system is usually used during

the activity of people entering and exiting the building. The door access system helps to

differentiate unauthorized and authorized people as the system only allows the authorized

person to enter the building. The door access system has two main features which are: -
7
a) Keypad

b) Fingerprint scanner

To operate the system, these two features are interfaced with Arduino programming and the

outputs are: -

a) LCD

b) Magnetic switch

c) Indicator

Figure 2.1 illustrates the three main processes in the operation of the F i n g e r p r i n t .

B a s e d B u r g l a r A l a r m S y s t e m – Arduino Based: -

Figure 2.1 Door Access System - Arduino Based Process Flow

Features (Keypad Component (LCD


Programming (Arduino) magnetic switch, siren
&Fingerprint scanner)
System will identify the &indicator) Allow
Users enter password and
password and search any authorized users to enter and
scan fingerprint.
match ID with fingerprint non-authorized otherwise
minutiae.

8
2.1.1 Arduino

Arduino is an open-source physical computing platform based on a single microcontroller board. Arduino

is used when there are interactions between inputs and outputs. It is used to control the output according

to the inputs command such as controlling the light or motor by using a switch. The Arduino

programming language uses Wiring which is an integrated development environment (IDE), and a single

board microcontroller. The language can be expanded through C libraries.

The Advantages Of Using Arduino Are:

Inexpensive Compared to other microcontroller boards, Arduino board is rather cheaper.

Cross platform–Arduino software can run on Windows, Macintosh OSX and Linux operating system.

While most microcontroller systems can only run on Windows only.

Simple, clear programming environment–Arduino is easy to use by beginners and advanced users.

In this project, Arduino is implemented by using the Arduino Mega 2560 as the micro controller board

as in Figure 2. It comes with an ATMEGA2560 microcontroller whereby the program stored in

ATMEGA2560 can be edited in the future for maintenance purposes. The inputs and outputs will be

connected to the Arduino Mega 2560 I/O pins and interfacing is done by using Arduino software. Based

on Figure 3, it shows the block diagram of the system interfaced by Arduino. At mega 2560 is the

microcontroller which controls the inputs (keypad and fingerprint scanner) and outputs (LCD, magnetic

switch, siren and indicator).

9
Power
LCD
Keypad

ATMEGA256
Magnetic
Fingerprint
Switch
Scanner

Indicator Siren

Figure 2.2: Block diagram of the system interfaced

by Arduino.

Keypad

A keypad is a device used to enter the desired output. In this project a keypad matrix with 16 push buttons

is used as shown in Figure 2.3. This type of keypad has four rows and four columns whereby the

overlapping rows and columns are the keys as shown in Figure 2.5.

Figure 2.4: Rows and


columns of a keypad

Figure 2.3: 4x4 keypad matrix

10
2.1.2 Fingerprint scanner

A fingerprint scanner is a type of biometric scanner which scans the human fingerprint. Its function is to

capture the human fingerprint as in Figure 1.5. There are two types of fingerprint scanner which are

optical and capacitive fingerprint scanner. The differences between these two types of fingerprints are

that the optical fingerprint and capacitive fingerprints canner captures minutiae by light and current

respectively. In this project, the optical scanner is used because it is less accessible to electrostatic

discharge (ESD) compared to capacitive fingerprint scanner. The fingerprint scanner is frequently

implemented in control access system. The reason being is because every human has different fingerprint

minutiae which help in identifying the true data of a person accurately. In the case of door access system,

the person who wishes to enter the building needs to scan their fingerprint to be based on Figure 2.5, in

this project the Adafruit fingerprint scanner used can cater up to 162 fingerprints. The stored fingerprints

are stored in the onboard Flash Memory which has the size of 512bytes. The fingerprint scanner process

flow is shown in Figure 2.6.

Figure 2.5: An8-bit resolution image of minutiae

11
Scan & enrolment-User place finger onto the scanner


Sensing by sensor-Fingerprint sensor provide light to fingers surface and
captures the minutiae by using a charge-coupled device (CCD)with an
8bits per dot with a
Resolution of 500dpi (dots per inch) in grey scale


Storing by processor–The captured minutiae which has been converted to
digital signal.
Is stored in the local database.


Comparing by software–Every fingerprint scanning event will capture a new humans’ minutiae.
These new minutiae will be compared to the ones stored in database to be
Identified whether the person is authorized or non-authorized.

Figure 2.6: Fingerprint scanner process flow

2.1.4 LCD

A 16 x 2 LCD which has 2 horizontal lines comprising a space of 16 displaying character is used in this

project as shown in Figure 2.9. It has two types of registries inbuilt which are: -

a) Command register that is use to insert command.

b) Data register that is use to insert data.

In this project, the function of the LCD is to displays the desired output according to the program.

Based on Table 1, each LCD pins has its own and it is connected to Arduino I/O digital pins.

12
Figure 2.7: 16 x 2

LCD [7]

Table 1: LCD pin description

13
2.5.1 Magnetic switch

A magnetic switch is a normally closed dry contact that depends on magnetic field to operate. It applies

relay working principle and control electrical switches by another switch. In this project the magnetic

switch act as a magnetic door lock, whereby it is activated to lock the doors and it will be deactivated for

the authorized users. It is also used as an intruder alarm to acknowledge the security guards on the

presence of intruder. Figure 2.10 shows the magnetic switch, while Figure 2.11 shows the schematic of

magnetic switch.

Based on Figure 2.11, there are two circuits in magnetic switch, which are: -

Control circuit (in green)

Load circuit (in red)

During ON condition, the current flows through control circuit will produce magnetic field that would

cause load circuit to be close (ON) as shown in Figure 2.13. Otherwise, the load circuit will be open

(OFF).

Figure 2.8: Figure 2.9: Figure 2.10: ON Figure 2.11: OFF


Magnetic switch Magnetic switch condition of magnetic condition of magnetic
schematic switch switch

14
2.6.1 Siren Circuit
A siren circuit is a circuit which produce siren by connecting the circuit to the speaker as output as shown

in Figure 2.13. The function of the siren circuit in this project is to produce siren at a certain basis. There

are two conditions that will activate the siren which are: -

Presence of intruder
Users inserted wrong password more than the allowable attempts

Figure 2.12: Siren circuit

2.1.6 Indicator (LED)


A light emitting diode (LED) is a semiconductor light source that as shown in Figure 2.14 act as an

indicator. The red LED indicates door lock while the green LED indicates door unlock.

Figure 2.13: LED

The benefit of using fingerprint scanner was also said by Zhu et. al. (2011) in their journal that fingerprint-

verification overcome the issue of losing ID card wherein their project is car keys. Another advantage is

that the ownership can never be passed to other people. An optical fingerprint scanner is implemented in

this project compared to other biometric features is because it has more advantages as stated in Table 2

by Albunni M. N. (2004).

Table 2: Different biometric recognition technologies by Albunni M. N. (2004).

15
The quality of the scanned fingerprint is very important. To obtain a good quality fingerprint, the

fingerprint sensor senses the skin types and humidity of the finger grain. The type of fingerprint used in

this system is the optical sensor whereby optics sensor the CCD (Charge Coupled Device) Kurosawa et.

al. (1999).

In order to interface or have the system functioning, software’s and programming language are used

besides hardware. Project by Wheeler [Link]. (2000) implements MATLAB for face engine and Visual

Basic for interface according to Ibrahim, R., & Zin, Z.M. (2011). While project by Ibrahim et. al. (2011)

implements Microsoft Visual C++ and Visual Basic 2008 platforms for the application of Artificial

Neural Network. Compared to Arduino, which is used in this project, it implements a simple yet can be

used by an advanced programmer to interface the hardware and develop the door access system by Rashid

et. al. (2008)

In terms of communications, Arduino is much more efficient as it communicates by using USB cable

compared to the project done by Rashid et. Al (2008) which uses parallel port that is less speed according

to Cui, B., & Xue, T., (2009).

Table 3 below shows the comparisons of existing door access system with Door Access System –

Arduino Based by its advantages and limitations of each system.

16
Table 3: Comparison of existing door access system with door access System ARDUINO
Based
No Author Title Advantages Disadvantages/
Limitations
1 Wheeler, Performance Identify intra and 1- An individual needs to
G.V., assessment of a interdependencies have more than 1 image
Courtney., face-verification to separate id and non-id
Cootes, T.F., based access images.
& Taylor, control. 2- Very sensitive
C. J system
3- Less speed because it
(2000)
takes 6 seconds to make
decision while the aim is
within2seconds.

2 Ibrahim, R., Study of Able to improve the 1- Difficult because had


& Zin, Z. M Automated Face human identification by to consider many other
(2011) Recognition distinguish a person’s elements such as
System for Office particular face from illumination, distance
Door Access other person’s face and an individual’s head
Control images. orientation for capturing
image.
2- Sensitive to aging and
facial expression.
3- Subject needs to be
very cooperative during
image capturing to have
accurate results.
4- Troublesome during
experimental work
because a lot of face
positions needs to be
stored.
5- Results are influenced
by illumination and pose.

17
3 Rashid, R. Security System Provides adjustable 1- Very sensitive. It will

A., Mahalin, Using Biometric security level setting reject the match if there

N. H., Technology: account for variations are background noise.

Sarijari, M. Design and 2- Less speed because

A., &Abdu Implementation it uses parallel port for

Aziz, A. A. of Voice communication

(2008) Recognition interface.

System (VRS)-

4 Cui, B., & Design and Implements fore- Difficult because it

Xue,T. Realization of an aggravation technology needs to build up a

(2009) Intelligent Access to filter low frequency speech model whereby

Control System disturbing the users have to

Based on Voice pronounce the text

Recognition according to the stated

ones.

5 G Zhu, Z., & Fingerprint Overcome the issue of Designed specifically

Chen, F Recognition- car robbery if the for automobiles

(2011) Based Access owners lose his car keys

Controlling or his car keys been

System for stolen

Automobiles

18
CHAPTER THREE

RESEARCH METHODOLOGY

3.1 Project Process Flow

The project process flow is illustrated as flow chart in Figure 15. Firstly, the user will insert the password

that has already been set by the system. If the entered password is correct, the user may proceed by

entering their ID. Otherwise the user will be given three attempts to enter password. If wrong password

is entered at the third attempt, alarm will be activated.

Next, each authorized user has a template of their own fingerprint saved in the memory. In order to enter

the building, the users need to scan their fingers by placing their finger onto the fingerprint scanner.

During storing process for fingerprint scanner, the storing starts by enrolling the users ID. Once the users

place their finger, the fingerprint scanner will capture the fingerprint. It will then extract the minutiae and

store the output in memory.

Next the process continues by finding the match. For fingerprint, it uses the stored minutiae with the ones

that was recently capture.

If the users’ minutiae match their own minutiae which have already been stored before, the users may

access the door as the magnetic door lock will be deactivated. Otherwise, the users have to enter their ID

number again. The users will be given three attempts. If the users fail at the third attempt, alarm will be

activated indicating the presence of intruders.

19
Start

Enter Password
NO

(1st&2ndattempts)
Match
NO
password?

NO
YES
(3rd attempt)

Alarm activated.

Scan fingerprint

NO

(1st&2ndattempts)
Match NO
fingerprint
NO

YES (3rdattempt)

Deactivate
magnetic door lock. Alarm activated.

End

Figure 3.1: Flow chart of project process flow

20
3.2 Project Activities

The project activities are done according to flow chart in Figure 3.16. The procedure shows the activity
from the beginning of the project until it is completed.

Identify features/hardware to be used.

Design circuit and identify I/O pins to Arduino board.

Construct circuit for testing

Understand on the circuit operations of each feature.

Create coding of each feature

Testing by ‘load and run’ program of each feature into


Arduino.

Obtain results.

Construct circuit on Veroboard

Build
prototype.

Figure 3.2: Flow chart of the project activities

21
3.2.1 Identify features / hardware to be used.
Figure 18 shows the hardware used in this project. There are five main hardware which are 4x4 keypad,
fingerprint scanner, Arduino Mega board and 16x2 LCD. Keypad and fingerprint scanner are the
features used to access the door. While the Arduino board platform is a platform that is designed to be
used for testing by connecting the features to its I/O pins and uploading program to the Atmel
Atmega2560 microcontroller. The function of LCD is to display the output and the USB cable is used
to communicate the Arduino programming language and the Atmel Atmega 2560 microcontroller.

LCD display

Keypad

Fingerprint
Arduino
Scanner
Mega
Board USB Cable

Figure 3.3: Hardware

22
3.2.2 Design circuit and identify I/O pins to Arduino board.

The circuit diagram (Appendix A) of this door access system is designed by using Fritzing software
which is a type of designing tools that supports Arduino. The connections of the features to Arduino I/O
pins are shown in Table 4.

TABLE 4: Connections to Arduino I/O pins


Arduino I/ Opins
Keypad 1 23
2 25
3 27
4 29
5 31
6 33
7 35
8 37
Fingerprint Red 5V
scanner Green 12
White 13
Black GND
LCD 1 GND
Display 2 5V
3 150Ω
4 40
5 42
6 44
7 NC
8 NC
9 NC
10 NC
11 46
12 48
13 50
14 52
15 5VG
16 ND
Magnetic 1end 11
Switch 1end GND

Siren Positive 9
Negative GND
Indicator Red 11
Green 10

23
3.2.3 Construct circuit for testing
[Link] Keypad

The keypad used in this project is 4x4 keypad which have eight I/O pins. It is divided as rows and columns

as Figure 1.18.

Figure 3.4:4x4 Keypad schematic

Based on Figure 19 the first four pins (pink, light blue, black, orange) of the keypad are the columns

while the following four pins (red, yellow, dark blue, purple) are the rows. Circuit of the keypad is shown

in Figure 20. The connections can be referred toTable4.

Figure 3.5:4x4 Keypad layouts Figure 3.6: Constructed circuit of keypad

24
[Link] Fingerprint scanner

The fingerprint scanner has 4 wires that can be connected to Arduino. Figure 3.21 below shows the circuit

connection of it. The connection of fingerprints scanner to Arduino I/O pins can be referred to Table 4.

Figure 3.7 Constructed circuit of fingerprint scanner

[Link] LCD

The LCD is a 16 x 2 display. It is used to replace the Arduino IDE serial monitor to display the output.

Figure 3.23 shows the constructed circuit of LCD. The connections of LCD to Arduino I/O pins can be

referred to Table 4.

Figure 3.8 Constructed circuit of LCD

25
[Link] Interface

After testing the keypad circuit and fingerprint scanner circuit by interfacing with Arduino separately,
both of the circuits are then combined together with LCD and Arduino to be interfaced. Figure 3.23 shows
the interfacing circuit between keypad and fingerprint scanner with Arduino.

Figure 3.9: Constructed interfaced circuit

3.2.4 Understand the circuit operations.

Keypad circuit operations

1. Arduino will sense the present of keypad by scanning

D23, D25, D27, D29, D31, D33, D35 and D37

2. Pins at D23 until D29 are pins for rows, while pins at D31 until D37 are pins for

columns.

[Link] Fingerprint scanner circuit operations

1. Arduino communicate with biometrics through UART.

-UART (any voltage)

-RS232 (+5/ -5)

2. D12 for data flowing from Arduino to biometric sensor.

3. D13 for data flowing from biometric sensor to Arduino.

4. The format of the data passing through D12 and D13 will follow the format in
Figure 24.
26
8bits Stop bit
Start bit

UART POWER

1byte
Figure 3.10 Format used in transferring data of fingerprint scanner

5. The data contains in8 bits.


1stbit– start of bit
end bit-stop of bit

27
3.2.5 Create coding of each feature

Since keypad and fingerprint scanner is the feature used in this project, therefore coding for these two
features are created in the beginning. For fingerprint scanner it includes coding for enrolling and finger
test. The output of the keypad and fingerprint scanner will be displayed using the serial monitor before it
is displayed though LCD. After each feature has its own programming, it has then been interface among
the features itself. Below is the list of coding developed for this project. Refer Appendix C for coding.

1. 4x4 keypad coding


2. Fingerprints enroll coding
3. Fingerprint test coding
4. 4x4 keypad interface with LCD coding
5. Password coding interface with LCD
6. Fingerprint test interface with LCD coding
7. Interface 4x4 keypad, fingerprint test and LCD coding

3.2.6 Testing by ‘load and run’ program of each feature into Arduino

Testing is done after constructing each circuit and creates coding. Before interfacing with LCD, the

output is displayed on the Arduino serial monitor. If the testing was a success, each circuit will be

interfaced with LCD to have the output on the display as shown in Figure 1.25.

Figure 3.11: Example of output from Arduino serial monitor

28
3.2.7 Construct circuit on Vero board

After all the circuit connections have been confirmed, the circuit is constructed and soldered on

Veroboard as in Figure 3.12

Figure 3.12: Constructed circuit on Veroboard

3.2.8 Build prototype.

The prototype is built to show the process flow of the system clearly as shown in Figure 3.27. It is

designed with a door and a panel to insert the features which are keypad, fingerprint scanner and LCD.

Figure 3.13: Door Access System–Arduino Based Prototype

29
3.3 Gantt Chart

Figure 3.28 shows the Gantt chart of the project. The function of the Gantt chart is to plan

on how to complete the project.

Figure 3.14: Gantt chart

30
3.4 Tools Required
3.4.1 Hardware
There are five main hardware used in this project. Figure 1.29 to Figure 1.33 shows the
hardware and Table 5 states the functions of each hardware.

Figure 3.16: USB cable


Figure 3.15: Arduino
Mega2560Board

Figure 3.19: 16x2 LCD display

Figure 3.17: Fingerprint


Scanner Figure 3.18: 4x4 keypad

Hardware Function
USB cable Connects the Arduino board to computer for Uploading purposes
Arduino Mega2560 Testing purposes and interface Arduino with the features
Board
Fingerprint scanner Scan the user’s thumbprint
Keypad To enter ID/password
LCD Display the output

Table 5: Functions of each hardware

31
3.4.2 Software
[Link] Arduino programming
Arduino is an open-source microcontroller. It can be edited and loaded to the microcontroller by using a
USB cable. Arduino is an inexpensive type of single-microprocessor prototyping platform. The software
consists of standard programming language, which is similar to C/C++. To run the program, Arduino
comes with a boot loader that runs on the board. There as one of implementing Arduino in this project is
because it has many advantages compared to other microcontrollers such as PIC. It is coming with an
ATMEGA2560 microcontroller whereby the program stored in ATMEGA2560 can be edited in the
future for maintenance purposes. Figure 34 shows the development cycle of Arduino IDE whereby it
consists of editing the coding, compile, upload and run.

Edit

Compile

Upload

Run

Finish

Figure 3.20 Arduino IDE Development Cycle

[Link] Frizzing
Frizzing is software that supports Arduino. The libraries include components such as sensors and

displays. The purpose of using fritzing is to design a circuit diagram virtually.

32
CHAPTER FOUR

RESULTS/DISCUSSIONS

According to project activities flow chart Figure 16 above, after constructing the circuit, testing was done.
Figures 4.35 to 1.46 shows the results obtained from each feature and the interfacing all feature with
Arduino. During testing, the outputs obtained were displayed through serial monitor. The LCD is added
afterwards to replace the serial monitor.

4.1 Keypad
4.1.1 Password
Keypad is used to enter character and integer that is required to access the door. In this project, keypad
is implemented for password feature and use to insert ID. The first stage to access the door is to enter
password. Figure 4.35 shows a display for the user to enter the password. In this program the password
is set as ‘C141516’. If the users entered the same password as the ones set as in Figure 4.36, it will result
as’ Successful, Now scan finger’ as in Figure 4.37. Next the users may scan their fingerprint immediately
for the next stage of door access system. Otherwise, if the wrong password is entered as in Figure 4.38,
the LCD will display as ‘Wrong’ as in Figure 4.39. While Figure 4.40 shows the output of intruder’s
alarm.

Figure 4.1: Keypad output (password) at LCD

33
Figure 4.2: Insert Password

Figure 4.3: Result for correct password entered

Figure 4.4: Wrong password entered

Figure 4.5: Result for wrong password entered

Figure 4.6: Output of entering 3 times of wrong password

34
4.1 Fingerprint scanner
4.1.2 Enrolling
The function of fingerprint scanner is to scan the user’s fingerprint. During scanning the fingerprint

scanner will capture and store the users’ minutiae. To have a database of user’s fingerprint minutiae, the

user needs to enroll their fingerprint. Figure 4.5 shows the result of an enrolled fingerprint. Once Arduino

detected fingerprint scanner, the users will insert the ID that will be saved together with their fingerprint minutiae.

According to figure above, the users fingerprint minutiae is enrolled with the ID: 2. It is then stored in the

fingerprint scanner on board flash memory,

Figure 4.7: Fingerprint enrolling output at serial monitor

35
4.2.2 Finger test and matching
After enrolling the fingerprint, the stored minutiae need to be tested to test the accuracy of the fingerprint

scanner. Figure 4.42 shows the finger test output at serial monitor. The user ID is found to be ID: 2. It

states the confidence which actually measures the accuracy of the current scanned fingerprint and the ones

stored in memory. The fingerprint scanner has a level of confidence from 0 to 255 which indicates from

less accurate to very accurate. Figure 4.43 is a command display for the user to place their fingerprint.

After scanned finger, Figure 44 shows the output being displayed at LCD. The output indicates the current

scanned fingerprint is matched with the stored minutiae with ID: 2.

Figure 4.8: Finger test output at serial monitor

Figure 4.9: Finger test output at LCD

Figure 4.10: Found match of fingerprint

36
4.2.2 Safety Feature (Intruder Alarm)
Intruder Alarm is added to acknowledge the safety guards of intruder. Figure 4.11
Shows the process flow on detecting intruder.

Figure 4.11: Process flow on detecting intruder.

4.4 Interfacing

Figure 4.12: shows the final product. After all the features have been interfaced, it is then

being placed together with the prototype.

Figure 4.12: Final product

37
4.5 Accuracy test
Accuracy test is performed to observe the security level of the fingerprint scanner. Figure 1.47 shows the
result of the accuracy test based on the confidence level. The test was done on five individuals with four
thumbprints from each and one of them. The fingers scanned were, left and right thumbprint and also left
and right index finger. From the result below, it shows that finger with the most accurate result is left
thumbprint with the percentage of 70%, followed by right thumbprint, right index finger and left index
finger with the accuracy of 67.2%, 41.4% and 30% respectively.

Confidence level
250

200

150 Left Thumbprint

Right Thumbprint
100
Right Index Finger

50 Left Index Finger

0 User
Shuhada Rohana Katy Mardiah
Syafiqah

Figure 4.13: Result of accuracy test

38
CHAPTER FIVE

CONCLUSION/RECOMMENDATIONS

The implementation of door access system is considered to be a need for a building especially
companies to have a security system in order to keep the people inside and assets to be safe
from unwanted cases such as burglaries and kidnapping.

Tricubes Computer Sdn. Bhd. has been reported that the company’s existing door access system have
problems in maintaining due to its obsolete components that could not be replaced. The Door Access
System – Arduino Based is developed to overcome this issue as Arduino does not use a lot of components
with the existence of the Arduino plat form board and Atmel AVR microcontroller. The Arduino approach
also overcome the issue of upgrading as it comes with an Atmel AVR microcontroller which can be edited
and reprogrammed many times. Arduino is also known to its open source and cross-platform that could
ease the task of a programmer.

The software used in this project is Arduino programming language which is similar to C++. Based on
the research done by Ibrahim, R., & Zin, Z.M. (2011), Rashid et. al. (2008), Cui, B., & Xue, T. (2009),
Zhu, Z., & Chen, F. (2011), Albunni, M.N. (2004) & Kurosawa, K., Kuroki, K., and Saitoh, N. (1999).
It shows that Arduino is much simpler compared to other and suitable to be used in this project. Besides
software and approach, this project also differs in terms of its features which are keypad and fingerprint
scanner. It clearly shows that the features used in this project are more efficient compared to the existing
system.

There are two inputs used in this project which are keypad and fingerprint scanner. While the outputs are
LCD and magnetic door lock. Based on Figure 1.38, the fingerprint scanner has also high accuracy with
the percentage of 70% for the highest fingerprint. The fingerprint scanner used is in this project also have
high efficiency due to its time in obtaining results identifying minutiae which is less than 1 second in
identifying minutiae.

For future work it is recommended to add another feature such as smart card to increase the security level.
Smart card stores data such as name and ID of the owner and in future it can be used to match the entered
ID using keypad.

In conclusion the implementation of a door access system using Arduino. Arduino is a less time -
consuming programming because it is an open-source microcontroller. It has high quality system
compared to the existing door access system. The features used in this system helps to overcome the
39
security issues. The proposed system overcomes the issues of maintaining the device in future as Arduino
comes with ATMEGA2560 microcontroller that can be edited to comply with any changing system.
Adopting the keypad and fingerprint scanner features, creating a door access system- Arduino Based
brings a whole new high security access system with a simple new approach.

RECOMMENDATIONS
There is no engineering design that does not create room for improvement or future work. This design can be

further improved on by incorporating the fingerprint-based burglar alarm system with a GSM module so that it can

be able to send a warning to the owner in the absence of the owner.

The followings can also be improved further.

 It is recommended that if failure occurs, the vero board should be trouble shoot by aprofessional

due to the wiring system.

 It is recommended that a manual should be provided for the Arduino microcontroller if it is

needed for industrial and home use so as to avoid unpalatable errors.

40
REFERENCES

Adafruit products (2012), [Link]

Albunni M.N., (2004), Charge Coupled Devices.


[Link]

Andrew B. (2012), [Link] fingerprint

Arduino Guide (2012), [Link] to Advantages of Arduino

Arduino Mega2560 Microcontroller Board (2012),


[Link]

Azzad Firdaus, Z., (2008) Electronic Combination Lock Using PIC, Final Year Project Report,
University Teknikal Melaka

Cui, B., & Xue, T., (2009), Design and realization of an intelligent access control system based on voice
recognition, Computing, Communication, Control, and Management, CCCM2009, ISECS
International Colloquium, Vol. 1, p.229-232,

Courtney, P., Cootes, T.F., Wheeler, G.V., & Taylor, C.J., (2000) Performance assessment of face-
verification based access control system, Automatic Face and Gesture Recognition, Proceedings.
Fourth IEEE International Conference, p. 221-226

Ibrahim, R., & Zin, Z.M. (2011) Study of automated face recognition system for office door access
control application, Communication Software and Networks (ICCSN), 2011 IEEE 3rd International
Conference, p. 132-136

Khan, S.R., (2012), Development of Low-Cost Private Office Access Control System (OACS),
International Journal of Embedded System and Application (IJESA), Vol.2, No.2,

Keypad Matrix (2012), Retrieved on 20 Oct 2012 at 07 30,


[Link]

Kurosawa, K., Kuroki, K., and Saitoh, N (1999) CCD Fingerprint Method- Identification of a Video
Camera from Videotape Images, Proceedings of International Conference on Image
Processing, Volume3:537 – 540, (1999),

LCD 16x2 interface (2012) [Link]


[Link]
Matrix Keypad Interfacing with Microcontrollers (2012)
17Nov2012at2243,from[Link]
41
L6PITMFaV96eyL5iuG1xMIYuMnBZF5n0O9PMIcBsfFmx

Rashid, R. A., Mahalin, N. H., Sarijari, M. A., & Abdul Aziz, A. A. (2008) Security system using
biometric technology: Design and implementation of Voice Recognition System (VRS),
Computer and Communication Engineering, ICCCE International Conference, p. 898-902

Red and green LED (2012) [Link]


[Link] (2012).
Reinstalling your Arduino boot loader (2012) [Link]

Understanding-relays(2012) [Link]

Zhu, Z., & Chen, F., (2011) Fingerprint recognition-based access controlling system for automobiles,
Image and Signal Processing (CISP), 4th International Congress, Vol. 4, p.1899-1902

42

You might also like