chp1 Blackbook
chp1 Blackbook
A
PROJECT REPORT
ON
(FINGERPRINT DOOR LOCK)
Designed & Developed by:
Muskaan Solkar & Divyanshu Soradiya
(Seat No: 2014438 & 2014439)
Guided by:
Miss. Smita Dalvi
Miss. Vaishali Kadam
Miss. Priya Singh
SUBMITTED IN PARTIAL FULFILLMENT OF
ACADEMIC PROJECT
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)
UNIVERSITY OF MUMBAI
2
3
ACKNOWLEDGEMENT
This project could not have been accomplished if not for the direct or indirect
contribution from many known and unknown individuals. We wish to take this
opportunity to express our profound gratitude to all of them.
I express my gratitude towards our internal guide Miss. PRIYA SINGH who gave
us unending support from the stage the project was initiated. A source of
inspiration, given by them constantly kept our spirits high. I would also like to
thank our H.O.D. Miss. SMITA DALVI.
We are very much thankful for being very much resourceful, kind and helpful.
Her positive attitude, unassailable optimism and unwiring faith in us assured
that we came out of problems whenever we encountered difficulties.
Finally, we wish to thank all my friends and IT department to directly or
indirectly helped us in the completion of this project. Last but not the least we
would thank our family without whose support, motivation and
encouragement this would not have been possible.
Muskaan Solkar
Divyanshu Soradiya
4
ABSTRACT
Muskaan Solkar
Divyanshu Soradiya
5
DECLARATION
I hereby declare that the project entitled, “Finger Print Door lock” done
at home, has not been in any case duplicated to submit to any other university
for the award of any degree. To the best of my knowledge other than me, no
one has submitted to any other university.
Muskaan Solkar
Divyanshu Soradiya
Name and Signature of the Student
6
TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION
1.1 Background
1.2 Objectives
1.3.1 Purpose
1.3.2 Scope
1.3.3 Applicability
1.4 Achievements
7
CHAPTER 4: SYSTEM DESIGN
CHAPTER 7: CONCLUSIONS
Project REFERENCES
8
Introduction
This project is based on IOT technology and Ubiquitous Computing to help
peoples with door security. It is made for home or mini office purposes. It
allow users to free themselves from all the key worries such as keys getting
stolen, misplacing them which consumes our precious time which we can’t
afford to waste. It opens up your door with your fingertip. It gives many
enrolment options for your fingerprint scanner you can allow number of
people as per your need. It is a step forward towards smart living and moving
with time.
In simple words, we can say that we are implementing a door access system
using Arduino which make use of fingerprints to identify whom to allow and
who not to allow inside our homes, offices, shops, etc. We are trying to
implement it using a normal and simple door lock which is fitted in every home
so as to minimize the cost of the device as a product.
9
unique. Here, to implement the project we will use fingerprint as the key. This
arduino project will make use of different devices for the implementation of
the security lock where there will be different features to increase the security
level.
10
Background
Various attempts are made for providing security for all domiciles. Up to date,
complete security is not discovered.
Lock and Key System: First step towards security was Lock and key system.
Security protocol followed in this system was “Single key for a single lock”.
Initially, this system was considered to provide at most security. But this belief
was soon proved wrong by the fact that multiple keys can be easily made for a
single lock. Hence this system is an out-dated system to provide security.
11
Objectives
One of the primary reasons for adopting this system is that it completely
eliminates the need of any key to operate door locks. This is a huge benefit for
most people and especially those who are in the habit of misplacing or
forgetting their keys. With this type of door lock, a big responsibility is
removed from the user’s shoulder as keeping the key securely is a must for
every home owner. There always comes a time when someone loses a key no
matter how careful they have been to keep all things at one place. Biometric
door locks are the perfect solution for such situations. These door locks are
simple in execution and come in a variety of shapes and sizes to fit any type of
door. Initially the designs were limited when this technology was newly
introduced to residential security systems. But today there are numerous door-
fingerprint combinations available in the market. These locks are mostly
designed for front doors or doors inside the garage and all they require is a
thumb-sized scanner fixed somewhere on the handle.
Other types also combine biometric identification and keypads for extra
security. Depending on the number of security layers and how advanced the
system is the prices can range from a couple hundred to several hundred
dollars. The most expensive sensors have the capability to remember the
history of fingerprints as well as hold many print profiles for friends and family.
12
Convenience
This system makes it unnecessary to carry around numerous keys for gaining
access. A simple swipe of the authorized fingerprint across the scanner is
sufficient for gaining access. Owners no longer need to worry about the safety
of their premises or valuables as their fingerprint is unique and virtually
impossible to copy.
Quicker access
Sometimes the traditional number lock on a home safe might not be sufficient.
Instead, a biometric solution is a better option as it provides highly
personalized safety by using fingerprint analysis scanners to protect the
contents. These systems can dissuade thieves who might steal an ordinary
home safe with the intention of breaking it later. Biometric solution also allows
the owner to limit access of the safe to only one or two individuals. In addition
to being highly useful for key documents and jeweller, this is also a valued
security feature for firearm safes and gun cabinets where contents can be
dangerous in the wrong hands.
13
Difficult to override
Unlike door locks with keys, a biometric system cannot be overridden by any
individual unless they have the home owner’s fingers to prove to the system
for authorized access. Conventional door locks are vulnerable to lock pickers.
But biometric systems are impossible to break and provide effective defense
against any kind of intrusion and is the best home security solution for areas
that are prone to robberies.
Cost-effective solution
User-friendly
This system does not need any complicated mechanism or things that might be
discouraging to new users as it is very intuitive and can be used in a simple
manner.
Scope
In future, alarm will be introduced. When intruder tries to break the door, the
vibration is sensed by sensor which makes an alarm. This will inform the
neighbours about intruders and this will help to take further action to prevent
intruder from entering. PROPOSED METHODOLOGY Our proposed system
14
overcomes all the security problems in existing system and provides high
security and efficiency. This is a perfect/optimal solution for saving/protecting
one from the hassle of stolen/lost key or an unauthorized entry.
Fingerprint is a boon solution for these problems which provides high level of
recognition accuracy. The skin on our palms and soles exhibits a flow like
pattern of ridges called friction ridges. The pattern of friction ridges on each
finger is unique and immutable. This makes fingerprint a unique identification
for everyone. Fingerprint door lock incorporates the proven technology.
Fingerprint scanner scans the fingerprints of users and used for ensuring
authentication. Fingerprint scanning is more accurate and cost effective
method and duplication is virtually impossible. A Fingerprint recognition
system can easily perform verification.
Purpose
Our main purpose for making this project is for the safety of middle class
people who can't afford costly locks with this advance technology.
Security: We have provided excellent security towards this finger print door
lock, such as you can turn it off/on manually.
Cost: We have designed this project for home and small business at affordable
range
Time: This project is time effective as compared to our physical door lock.
15
Nothing to carry: We don’t have to carry any keys or remember any
passwords as it works on our fingerprints.
Applicability
16
Achievement
17
Organisation Of Report
18
Survey of technology
In these chapter we are going to study about which technologies are there
available in the market we are going to comparatively study the available
technologies and the reason we choose this technology.
History of fingerprint
19
wrote to Charles Darwin for advice, and the idea was referred on to Darwin's
cousin, Sir Francis Galton. The French scientist Paul-Jean Coulier developed a
method to transfer latent fingerprints on surfaces to paper using iodine
fuming. It allowed the London Scotland Yard to start fingerprinting individuals
and identify criminals using fingerprints in 1901.
When fingerprints came in, detectives would have to compare them manually
with the fingerprints on file for a specific criminal (that's if the person even had
a record). The process would take hours or even days and didn't always
produce a match. By the 1970s, computers were in existence, and the FBI knew
it had to automate the process of classifying, searching for and matching
fingerprints. The Japanese National Police Agency paved the way for this
automation, establishing the first electronic fingerprint matching system in the
1980s. Their Automated Fingerprint Identification Systems (AFIS), eventually
enabled law enforcement officials around the world to cross-check a print with
millions of fingerprint records almost instantaneously.
Fingerprints is one of the best way to identify people as it is unique for every
person that is sole purpose it is used in security systems. As fingerprint
uniqueness differs it from other security systems such as classic old locks which
are opened with keys or new password based locks.
20
What is fingerprint technology and how it works?
21
Convenience Of Use
Fingerprints are essentially ridges and lines present at the end of the fingertips.
They provide users with a grip between the fingers and the object by creating
friction, to help them grip objects better and prevent it from dropping off of
their hand. Every individual has a unique fingerprint, and it is highly unlikely for
two people to possess the same fingerprint pattern. This uniqueness is what
makes fingerprints the preferred choice for biometric security on smartphones.
Enrolment – It is the initial step in the process and involves users registering
their fingerprint of the preferred finger, which would be used in the future to
authenticate them on the device. The process essentially includes scanning,
analyzing, and storing the fingerprints in coded form on a secure database, for
future reference.
22
Verification – Once a fingerprint is registered and saved, the same will be used
in the future to verify and authenticate users on the device every time they try
to gain access.
As the name suggests, an optical scanner involves the use of optics (light) to
capture and scan fingerprints on a device. Essentially, the scanner works by
capturing a digital photograph of the fingerprint and then using algorithms to
find unique patterns of lines and ridges, spread across the different lighter and
darker areas of the image. The quality of the image sensor plays a crucial role
in getting a high-definition and detailed image of the fingerprint, which would
make it easier to extract more data from the image, increasing security.
23
2. Capacitive Fingerprint Scanners
Going by the name, one can get an idea of the involvement of capacitors in
Capacitive Scanners. For those unaware, a capacitor is an electronic
component that stores electrical energy in an electric field. In case you’re
wondering about its role in Capacitive Scanners, it’s important to first
understand that unlike optical scanners, which capture a 2D image of the
fingerprint, capacitive scanners capture different details of the fingerprint
using just the electrical signals. For this, it uses a series of tiny capacitors
circuits, arranged in an array, to store data of the captured fingerprints. During
the process of enrolment, the change in fingerprint patterns (ridges and lines)
causes a change in the registration process, as the charge would be different
for a finger placed over the capacitive plate and different for the air gap
between the ridges and lines. This change, in the charge of the capacitor, is
further determined using an op-amp (Operational Amplifier), and then
recorded with the help of an ADC (Analogue-to-Digital Converter).
Once a fingerprint is captured, all its related data is further analyzed for unique
fingerprint information and then saved for comparison at the time of user
authentication, in the future. Since no 2D image capturing is involved in this
process, the fingerprint data is far more secure than the data from an Optical
Scanner. And therefore, a Capacitive Scanner cannot be easily tricked with the
help of prosthetics or photographs of the fingerprint, which is why these
scanners are more popular and widely used across a wide range of
smartphones currently in the market.
24
3. Ultrasonic Fingerprint Scanners
25
Also, if someone has got fi nger injuries, then they can interrupt
successful fingerprint scanning and can deny access and cause
confusion among authorized users. Dirty fingers (and germs) can
interfere with the scanning of the fi ngerprint. Especially in the
manual labour industry where employees work with their hands, their
fi ngers may get rough or scratched which could lead to a
misinterpretati on/ misreading. Opti cal scanners can’t always tell the
diff erence between a picture of a fi nger and the finger itself, and
capaciti ve scanners can be fooled by a mold of a person’s finger. Even
the scanners that have additi onal pulse and heat sensors to verify if
the person who the finger belongs to is alive, can be fooled by a
gelati n print mold over a real fi nger. To make these security systems
more reliable, it is recommended to combine the biometric analysis
with a conventi onal means of identi fi cati on, such as a password (in
the same way an ATM requires a bank card and a PIN code).
Another factor is if your prints get stolen. Now if we lose our credit
card or accidentally tell somebody our secret PIN number, we can sti ll
get a new card or change our code. But if somebody steals our
fi ngerprints, it’s trickier than that. For one, we wouldn't be able to
use our prints as a form of identi fi cati on unti l we have made sure all
copies have been destroyed. This is parti cularly true when it comes to
offi cial / government records.
26
Comparative study about these technologies
As we can see that there are three types of scanning tech that can be used to
scan fingerprint.
Optical fingerprint sensors have been around for a while. The way an
optical scanner works is by shining a bright light over your fingerprint and
taking a digital photo. The light-sensitive microchip makes the digital
image by looking at the ridges and valleys of the fingerprint, turning them
into 1’s and 0’s, and creates the user’s own personal code.
Optical sensors can be fooled by latent prints i.e. the print left behind when a
real finger touches the sensor plate. Latent prints are usually produced by
sweat, skin debris or other sebaceous excretions that cover up the palmar
surface of the fingertips. If a latent print is on the glass platen of the optical
sensor and light is directed on it, this print can fool the optical scanner. This
happens because the light that is directed on the latent print gets optically
scattered and the sensor detects it as a fingerprint image.
27
Capacitive sensors can be spoofed by using gelatin based soft artificial fingers.
This material can mimic the physical characteristics of the skin and hence are
able to deceive capacitive sensors.
In cases where the surface features are worn out or the sampling conditions
are adverse, the MSI sensor is still able to capture a fingerprint image. The MSI
sensor is strongly able to distinguish between a live finger and other soft
materials. The tissue features under the skin surface provide a great amount of
information to the MSI sensor about the material that is being imaged and
thus makes it less vulnerable to fingerprint sensor attacks.
28
The following are the pros or advantages of optical scanners:
• They can be placed within a capacitive display screen, thus enabling in-
display fingerprint scanning and allowing manufacturers to develop devices
with larger screen real estate and minimal to zero bezels.
• The entire system is still considerably small. The optical module can occupy
an area footprint of less than one millimetre.
29
Problem Definition
As there are many fingerprint door lock systems already available in the
market. But due to their high cost they’ll never reach to the middle-class
people house. No one would busy such expensive locks instead they’ll prefer
the classic lock system with lock and key.
Let’s clearly define the problem and sub-problems we tried to solve through
our project.
The first and the most important is getting a fingerprint door lock at a
affordable price.
Encouraging People to walk towards the road of Technology and Smart
Living.
The common sub problems that other fingerprint scanner provides too are :-
More Security
No key worries
Let’s briefly see how these problems are going to be solved and what way we
are going to use
To solve our problem we just take inspirations from life hacks we can put a lot
effort on design to make it simple and minimal while satisfying our
requirements.
30
So what does IOT design mean?
As you can see, the Internet of Things brings about a range of entirely new
experiences. All of these experiences will require new modes of interaction.
And those will have to be designed carefully.
For example, the rise of IOT devices means that gestures and physical body
motion will become a new and far more natural way of interacting with the
digital world that surrounds us.
The IOT space is now a great topic of exploration for designers who investigate
the potential human-machine interaction models. They ask themselves
questions about unlocking the value of these interactions through design.
IOT design means that the focus is on singular experiences and no longer but
about design principles that represent a broader ecosystem within which IOT
devices function.
Designing an IOT solution comes with a set of totally new design challenges.
Consider that IOT systems usually consist of multiple elements such as physical
device sensors, actuators, and interactive devices, the network that connects
these devices, as well as the data gathered and then analysed to create a
meaningful experience.
31
6 principles of IOT design
1. Do your research
When getting into IOT design, you’re not building products anymore. You’re
building services and experiences that improve people’s lives. That’s why in-
depth qualitative research is the key to figuring out how you can do that.
Assume the perspective of your customers to understand what they need and
how your IoT implementation can solve their pain points. Research your target
audience deeply to see what
their existing experiences are and what they wish was different about them.
2. Concentrate on value
Early adopters are eager to try out new technologies. But the rest of your
customer base might be reluctant to put a new solution to use. They may not
feel confident with it and are likely to be cautious about using it.
32
If you want your IOT solution to become widely adopted, you need to focus on
the actual tangible value it’s going to deliver to your target audience.
What is the real end-user value of your solution? What might be the barriers to
adopting new technology? How can your solution address them specifically?
Note that the features the early tech adopters might find valuable might turn
out to be completely uninteresting for the majority of users. That’s why you
need to carefully plan which features to include and in what order, always
concentrating on the actual value they provide.
One characteristic trait of IOT solutions is that they typically include multiple
devices that come with different capabilities and consist of both digital and
physical touch points. Your solution might also be delivered to users in
cooperation with service providers.
That’s why it’s not enough to design a single touch point well. Instead, you
need to take the bigger picture into account and treat your IOT system
holistically.
Delineate the role of every device and service. Develop a conceptual model of
how users will perceive and understand the system. All the parts of your
system need to work seamlessly together. Only then you’ll be able to create a
meaningful experience for your end-users.
33
4. Remember about the security
Don’t forget that IOT solutions aren’t purely digital. They’re located in the real-
world context, and the consequences of their actions might be serious if
something goes wrong. At the same time, building trust in IOT solutions should
be one of your main design drivers.
Make sure that every interaction with your product builds consumer trust
rather than breaking it. In practice, it means that you should understand all the
possible error situations that may be related to the context of its use. Then try
to design your product in a way to prevent them. If error situations occur,
make sure that the user is informed appropriately and provided with help.
Also, consider data security and privacy as a key aspect of your
implementation. Users need to feel that their data is safe, and objects located
in their workspaces or home can’t be hacked. That’s why quality assurance and
testing the system in the real-world context are so important.
And speaking of context, it pays to remember that IoT solutions are located at
the intersection of the physical and digital world. The commands you give
through digital interfaces produce real-world effects. Unlike digital commands,
these actions may not be easily undone.
In a real-world context, many unexpected things may happen. That’s why you
need to make sure that the design of your solution enables users to feel safe
and in control at all times.
34
The context itself is a crucial consideration during IoT design. Depending on the
physical context of your solution, you might have different goals in mind. For
example, you might want to minimize user distraction or design devices that
will be resistant to the changing weather conditions.
The social context is an important factor, as well. Don’t forget that the devices
you design for workspaces or homes will be used by multiple users.
IoT solutions are often difficult to upgrade. Once the user places the connected
object somewhere, it might be hard to replace it with a new version –
especially if the user would have to pay for the upgrade.
Even the software within the object might be hard to update because of
security and privacy reasons. Make sure that your design practices help to
avoid costly hardware iterations. Get your solution right from the start. From
the design perspective, it means that prototyping and rapid iteration will
become critical in the early stages of the project.
Requirements Specification:
Non-functional requirements:
35
A non-functional requirement (NFR) is a requirement that specifies criteria
that can be used to judge the operation of a system, rather than specific
behaviours. They are contrasted with functional requirements that define
specific behaviour or functions. The plan for implementing functional
requirements is detailed in the system design. The plan for implementing non-
functional requirements is detailed in the system architecture, because they
are usually architecturally significant requirements.
Functional Requirements:
36
Planning and scheduling
37
What Is a Fingerprint?
38
Fingerprint image acquisiti on is the most important step in an
automated fi ngerprint authenti cati on system, as it assesses the final
fi ngerprint image quality, which has a crucial impact on the overall
system performance. The questi on then is how is this fi ngerprint
assessed? The answer is: using fi ngerprint sensors that these scanners
come fi tt ed with.
We’ll then buy the necessary components and then we will execute
the design we have created for the project and we’ll solve any error
that we will face while creati ng the project.
39
Hardware Requirements
Arduino
Arduino is an open-source electronic platform based on easy-to-use hardware
and software. Arduino boards are able to read inputs – light on sensor, a finger
on a button, or a Twitter message – and turn it into an output – activating a
motor, turning on an LED, publishing something online. You can tell your board
what to do by sending a set of instructions to the microcontroller on the board.
To do so you use the Arduino programming language (based on writing), and
the arduino software (IDE), based on processing.
Arduino was born at the ivrea interaction design institute as an easy tool for
fast prototyping, aimed at students without a background in electronics and
programming. All Arduino boards are completely open-source, empowering
users to build them independently and eventually adapt them to their
40
particular needs. The software, too, is open – source, and it is growing through
the contributions of users worldwide.
Operating Voltage 5V
SRAM 8 KB
EEPROM 4 KB
41
It is the heart of our project. It is a micro-controller based open source
electronic prototyping with an easy to use IDE.
USB Connector
Power Port
Microcontroller
Analog Input Pins
Digital Pins
Reset Switch
Crystal Oscillator
USB Interface Chip
TX RX LEDs
+VIN:- The input voltage to the Arduino board when it’s using an external
power source (as opposed to volt from the USB connector or other regulated
power source). You can supply voltage through this pin, or, if supplying voltage
via the power jack, access through this pin.
42
+5V:- The regulated power supply used to power the microcontroller and other
components on the board. This can come either from VIN an on-board
regulator, or be supplied but USB or another 5V supply.
Serial:-0 (RX) and 1 (TX); Serial 1:19 (RX) and 18 (TX); Serial 2:17 (RX) and 16
(TX); Serial 3:15 (RX) and 14 (TX). Used to receive (RX) and transmit (TX) TTL
serial data. Pins 0 and 1 are also connected to the corresponding pins of the
ATmega8U2 USB-to-TTL Serial chip.
43
PWM: 0 to 13. Provide 8-bit PWM output with the analog write () function.SPI:
50 (MISO), 51 (MOSI), 52 (SCK), 53 (SS). These pins support SPI communication
using the SPI library.
The SPI pins also broken out on the ICSP header, which is physically
compatible with the Uno, Duemilanove and Diecimila.
LED: 13. There is a built-in LED connected to digital pin 13. When the pin is
HIGH value, the LED is on, when the pin is LOW, it’s off.
I2C: 20 (SDA) and 21 (SCL). Support I2C (TWI) communication using the Wire
library(documentation on the Wiring website). Note that these pins are not in
the same location as the I2C pins on the Duemilanove or Decimal.
There are a couple of other pins on the board:
AREF. Reference voltage for the analog inputs. Used with analog Reference ().
Reset. Bring this line LOW to reset the microcontroller. Typically used to add a
reset button to shields which block the one on the board.
Communication The Arduino Mega2560 has a number of facilities for
communicating with a computer, another Arduino, or other microcontrollers.
The ATmega2560 provides four hardware UARTs for TTL (5V) serial
Power Port
44
The power source can be connected by plugging in a 21mm center
positive plug into the power jack of the board.
The arduino uno board operates at the a voltage of 5 volts but it can
withstand the voltage of 20 volts.
If the board is supplied with a higher voltage, ther is a voltage regulator
it sits between power point and USB connector that protects the board
from burning out.
Micro controller
CPU
It controls everything that goes on within the device it fetches the program
instruction from flash memory and runs it with the help of RAM.
EEPROM
45
ATmega328p is pre-programmed with bootloader. This allows you to
directly upload a new arduino program into the device, without using
any external hardware programmer making the arduino UNO board easy
to use.
SERVO MOTOR
46
FINGERPRINT SENSOR
A fingerprint is an impression left by the friction ridges of a human finger. The
recovery of partial fingerprints from a crime scene is an important method
of forensic science. Moisture and grease on a finger result in fingerprints on
surfaces such as glass or metal. Deliberate impressions of entire fingerprints
can be obtained by ink or other substances transferred from the peaks of
friction ridges on the skin to a smooth surface such as paper. Fingerprint
records normally contain impressions from the pad on the last joint of fingers
and thumbs, although fingerprint cards also typically record portions of lower
joint areas of the fingers.
47
BATTERY
The nine-volt battery, or 9-volt battery, is a common size of battery that was
introduced for the early transistor radios. It has a rectangular prism shape with
rounded edges and a polarized snap connector at the top. This type is
commonly used in walkie–talkies, clocks and smoke detectors.
The nine-volt battery format is commonly available in primary carbon-zinc and
alkaline chemistry, in primary lithium iron disulfide, and in rechargeable form
in nickel-cadmium, nickel-metal hydride and lithium-ion. Mercury-oxide
batteries of this format, once common, have not been manufactured in many
years due to their mercury content. Designations for this format include NEDA
1604 and IEC 6F22 (for zinc-carbon) or MN1604 6LR61 (for alkaline). The size,
regardless of chemistry, is commonly designated PP3—a designation originally
reserved solely for carbon-zinc, or in some countries, E or E-block.
48
JUMPER WIRE
A jump wire is an electrical wire, or group of them in a cable, with a connector
or pin at each end, which is normally used to interconnect the components of a
breadboard or other prototype or test circuit, internally or with other
equipment or components, without soldering.
SOFTWEAR DESCRIPTION
ARDUINO IDE (R3)
The open-source Arduino software (IDE) makes is easy to write code and
upload it to the board. It runs on windows, MAX OS X, and Linux. The
environment is written in java and based on processing and other open-source
software. The Arduino integrate Development Environment or Arduino
software (IDE) contains a text editor for writing code, a message area, a text
console, a toolbar with buttons for common function and a series of menus. It
connects to the Arduino and Genuine hardware to upload the program and
communication with them.
49
Gantt Chart
18-09-21 Introduction 05
11-10-21 Design 14
50
horizontal bars in the graph shows the duration of each activity. Gantt charts
illustrate the start and finish dates of the terminal elements and summary
elements of a project. Terminal elements and summary elements constitute
the work breakdown structure of the project. Modern Gantt charts also show
the dependency (i.e., precedence network) relationships between activities.
Task 2 Understanding
about
Technologies
needed to
create the
project
Acquiring
knowledge and
skills needed
to create the
project.
Task 3 Defining the
overall
problem and
51
solving it .
Also acquiring
hardware and
software
resources and
creating
models.
Task 4 Creating Design
For the project
Describing
features
making logic
diagrams
implementing
algorithms .
Conceptuial Model
52
Different Conceptual Model for Fingerprint Scanner
53
54
55
System Design
Basic Module
In Basic Module we divide our project into different types of modules which
helps us to create our project in a structure.
Planning Module
Under this model, we have planned the entire project in detail, what
technology will we use in this?
How will be the design of the project, which method will we use, what will be
our design to complete the project within the time period.
56
Coding Module:
Our coding module covers the important part of our project. It includes the
library needed for our fingerprint scanner to work and the source code of our
app which is required to turn on and off the scanner . This app will also contain
the details about our project how it is made and what’s the idea behind the
project.
Adafruit-Fingerprint-Sensor-Library
Connect to any microcontroller or system with TTL serial, and send packets of
data to take photos, detect prints, hash and search. Using this library we can
enrol new fingerprint record fingerprint, we can update or delete fingerprint.
This library consist code in c++ in Arduino IDE.
Next is the source code for our app. We are going to use Python Language for
creating the app. In python we are going to use KIVY framework + MySQL for
database.
Implementation Module:
After learning about all the necessary knowledge and skills required for the
project we theorize in the book first then implemented physically.
Then we implement our design that we created for fingerprint door lock. We
have to connect all our components as per the design while implementing
coding module to create the working fingerprint door lock.
Testing Module:
Here we test our project checking it’s functionality if there are any bugs in
code or any mechanical problem we remove them.
57
Data Design
The data we are going to manage includes fingerprint data and application
data.
Fingerprint Data
First we are going to explain the technological flow of data.
When the user enrols for the fingerprint: - The Fingerprint data flows from the
Optical Scanner to Arduino (Microcontroller).
When user uses the fingerprint door lock: - The Fingerprint data flows from the
Optical Scanner to Arduino (Microcontroller) then data flows to server motor.
58
Application Data
59
In this paper finger print processing includes two parts finger point enrolment
and finger print matching. when enrolling, user needs to enter the finger image
two time. The system will process the finger images, generate a template of
the finger images based on processing results and store the template. When
matching user enters the finger through optical sensor and system will
generate a template of the finger image and compare it with templates
present in the finger library. 2.4 “On securing a door with finger print biometric
technique” - In this paper, the project was constructed done in three different
stages, the writing of the code (driver) which controls the Microcontroller
using C language, the implementation of the whole project on a solder-less
experiment board, the soldering of the circuits on Vero-boards and the
coupling of the entire project to the casing. The implementation of this project
was done on the breadboard as a prototype, the power supply was first
derived from a bench power supply in the electronics laboratory, in all the
development guaranteed security for illegal intrusion of illegal entity to room,
the mechanism can be implemented in a broader sense on a door where a
there is restriction of access.
The design of security door lock using the finger print technology was built
around a Microcontroller Unit (MCU), PIC16F628A, which reads in finger prints
from finger print scanner and grant access, to a protected compartment, only
to pre-registered finger prints. The finger print scanner serves as the main
input into this embedded security system. Finger prints read are compared to
those ones pre-programmed into the memory of the microcontroller. When a
match is made, the microcontroller outputs a HIGH which activates the
transistor-relay switching stage that controls opening and closing of the
modelled motorized door granting access into the protected building. An
alphanumeric liquid crystal display (LCD) is used in this design to show the
operating status of this embedded security system. By default it displays a
welcome message requesting that the user should enter a finger print. And
when a match is made it displays “ACCESS GRANTED” otherwise it displays
“ACCESS DENIED”.
60
“Implementation of biometric security in a smartphone based domotics.” - In
this paper a cost effective Home Automation System which is secured by a
biometric system is proposed. The circuit design, simulation and experimental
analysis of the proposed system are discussed. This work proposes a home
automation system in which the home appliances can be controlled remotely
using the Bluetooth technology through an android app, installed in the
Smartphone.
61
This is a time, where everything is attached through network, where anyone
can get hands on information from anyplace around the globe. Thus
possibilities of one’s information being hacked are a serious affair. Due to
these chances, it’s very crucial to have some kind of personal recognition to
enter one’s own information. These days personal identification is becoming a
principle affair all around. Our fingerprint based lock system has high
correctness rate and is also rapid to identify fingerprints which authorize
flawless combination with the users and gives away tighter security.
2. The fingerprint is put in a condition where it scans for the match of the
fingerprint. If match is found, it moves to step 3. Else it moves to step 6.
3. The information of the person is recorded like name, time of entry/exit, etc.
62
4. The servo motor is started and accordingly the hook lock connected to the
servo motor does its work of locking or unlocking.
6. It will check if the unrecognized fingerprint is tried more than 3 times. If such
attempt is made, it will move to step 7. Else, it will move to step 10.
Also, along with the hardware devices we are using Arduino IDE as software to
program the functioning of the hardware devices. Note- Before any procedure
we must first register/store the fingerprints using the Arduino IDE which will
work as unlocking fingerprints. The main connection of the servo motor and
fingerprint which are the main component of our project are done in the
following ways. The arduino is connected to servo motor where red wire is
connected to 5V, brown wire is connected to point 8 and orange wire is
connected to GND.
63
Implementation Approaches
Coding Details
void Enroll()
int count=0;
lcd.clear();
lcd.setCursor(0,1);
lcd.print("Location:");
while(1)
lcd.setCursor(9,1);
lcd.print(count);
if(digitalRead(up) == 0)
count++;
if(count>25)
count=0;
delay(500);
64
else if(digitalRead(down) == 0)
count--;
count=0;
delay(500);
else if(digitalRead(down) == 0)
count--;
if(count<0)
count=25;
delay(500);
else if(digitalRead(del) == 0)
id=count;
deleteFingerprint(id);
65
return;
else if(digitalRead(enroll) == 0)
return;
uint8_t getFingerprintEnroll()
int p = -1;
lcd.clear();
lcd.print("Finger ID:");
lcd.print(id);
lcd.setCursor(0,1);
lcd.print("Place Finger");
delay(2000);
while (p != FINGERPRINT_OK)
p = finger.getImage();
switch (p)
66
case FINGERPRINT_OK:
Serial.println("Image taken");
lcd.clear();
lcd.print("Image taken");
break;
case FINGERPRINT_NOFINGER:
Serial.println("No Finger");
lcd.clear();
lcd.print("No Finger");
break;
case FINGERPRINT_PACKETRECIEVEERR:
Serial.println("Communication error");
lcd.clear();
lcd.print("Comm Error");
break;
case FINGERPRINT_IMAGEFAIL:
Serial.println("Imaging error");
lcd.clear();
lcd.print("Imaging Error");
break;
default:
Serial.println("Unknown error");
67
lcd.clear();
lcd.print("Unknown Error");
break;
68
Code For Unlocking Door
void unlockdoor()
delay(900);
lcd.setCursor(0,0);
lcd.println(" ");
lcd.setCursor(1,0);
lcd.print("Access Granted");
lcd.setCursor(4,1);
lcd.println("WELCOME!!");
lcd.setCursor(15,1);
lcd.println(" ");
lcd.setCursor(16,1);
lcd.println(" ");
lcd.setCursor(14,1);
lcd.println(" ");
lcd.setCursor(13,1);
lcd.println(" ");
unlockbuzz();
69
for(pos = 180; pos>=0; pos-=5) // goes from 180 degrees to 0 degrees
delay(2000);
delay(1000);
counterbeep();
delay(1000);
for(pos = 0; pos <= 180; pos +=5) // goes from 0 degrees to 180 degrees
{ // in steps of 1 degree
delay(15);
int currentposition=0;
lcd.clear();
displayscreen();
70
Physically Implementing Project
71
Then we will take a stopper and drill it to the board.
72
Then we will apply bond set and stick the bolt to the stopper.
73
We will stuck it’s end with the grip of pen.
74
We will stick the fingerprint scanner to the wooden board
using the double tap.
75
Connections:
Fingerprint:
Green - 2
White - 3
Red – 5V
Black –GND
Servo Motor:
Orange – 8
Brown – GND
Red – 5V
76
Then arduino is connected to the laptop and code is uploaded.
Unit Testing
77
In SDLC, STLC, V Model, Unit testing is first level of testing done before
integration testing. Unit testing is a White Box testing technique that is usually
performed by the developer. Though, in a practical world due to time crunch
or reluctance of developers to tests, QA engineers also do unit testing.
Manual
Automated
A developer writes a section of code in the application just to test the function.
They would later comment out and finally remove the test code when the
application is deployed.
A developer could also isolate the function to test it more rigorously. This is a
more thorough unit testing practice that involves copy and paste of code to its
own testing environment than its natural environment. Isolating the code
helps in revealing unnecessary dependencies between the code being tested
and other units or data spaces in the product. These dependencies can then be
eliminated.
78
A coder generally uses a Unit Test Framework to develop automated test
cases. Using an automation framework, the developer codes criteria into the
test to verify the correctness of the code. During execution of the test cases,
the framework logs failing test cases. Many frameworks will also automatically
flag and report, in summary, these failed test cases. Depending on the severity
of a failure, the framework may halt subsequent testing.
Beta testing is a type of User Acceptance Testing among the most crucial
testing, which performed before the release of the software. Beta Testing is a
type of Field Test. This testing performs at the end of the software testing life
cycle. This type of testing can be considered as external user acceptance
testing. It is a type of salient testing. Real users perform this testing. This
testing executed after the alpha testing. In this the new version, beta testing is
released to a limited audience to check the accessibility, usability, and
functionality, and more.
Beta testing is a type of User Acceptance Testing among the most crucial
testing, which performed before the release of the software. Beta Testing is a
type of Field Test. This testing performs at the end of the software testing life
cycle. This type of testing can be considered as external user acceptance
testing. It is a type of salient testing. Real users perform this testing. This
testing executed after the alpha testing. In this the new version, beta testing is
released to a limited audience to check the accessibility, usability, and
functionality, and more.
79
CONCLUCSION
Fingerprint door locks are great investment for home or business. It provides
great security by providing restrictions to unwanted access. This device
increases level of security by adding unique biological features of authorized
person. For anyone who wants more security to their homes, fingerprint door
locks are best choice.
In this paper, we have tried to solve the security matter in door by bringing the
concept of biometrics along with the door lock. So, for that purpose we are
using finger prints as unique key to implement a device so as to lock or unlock
a door. We have discussed about the different components using arduino we
would require to implement our project i.e. we have given the hardware and
software requirements in the project. We have gone through different
research papers and then given a brief about the papers and after studying the
papers we have come with an algorithm as to how our system will work
80
Reference
https://stackoverflow.com/
https://www.geeksforgeeks.org/
https://www.tutorialspoint.com/index.htm
https://pub.dev/
https://www.youtube.com/
https://www.guru99.com/integration-testing.html
https://www.tutorialspoint.com/index
https://medium.com/
https://github.com/
https://www.youtube.com/watch?v=dmZ9Tg9k13U
81