0% found this document useful (0 votes)
163 views81 pages

chp1 Blackbook

The document provides a project report on designing and developing a fingerprint door lock. It discusses the background and objectives of creating an affordable fingerprint door lock using basic components like Arduino, a servo motor, and a fingerprint scanner. The project aims to implement a keyless door lock system using fingerprint authentication for home and office security. It seeks to eliminate the need for keys and provide convenience through biometric identification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views81 pages

chp1 Blackbook

The document provides a project report on designing and developing a fingerprint door lock. It discusses the background and objectives of creating an affordable fingerprint door lock using basic components like Arduino, a servo motor, and a fingerprint scanner. The project aims to implement a keyless door lock system using fingerprint authentication for home and office security. It seeks to eliminate the need for keys and provide convenience through biometric identification.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 81

1

A
PROJECT REPORT
ON
(FINGERPRINT DOOR LOCK)
Designed & Developed by:
Muskaan Solkar & Divyanshu Soradiya
(Seat No: 2014438 & 2014439)
Guided by:
Miss. Smita Dalvi
Miss. Vaishali Kadam
Miss. Priya Singh
SUBMITTED IN PARTIAL FULFILLMENT OF
ACADEMIC PROJECT
BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY)

UNIVERSITY OF MUMBAI

DEPARTMENT OF INFORMATION TECHNOLOGY

SHANKAR NARAYAN COLLEGE


(Affiliated to University of Mumbai)
THANE 401105, MAHARASHTRA
2021-2022

2
3
ACKNOWLEDGEMENT

This project could not have been accomplished if not for the direct or indirect
contribution from many known and unknown individuals. We wish to take this
opportunity to express our profound gratitude to all of them.
I express my gratitude towards our internal guide Miss. PRIYA SINGH who gave
us unending support from the stage the project was initiated. A source of
inspiration, given by them constantly kept our spirits high. I would also like to
thank our H.O.D. Miss. SMITA DALVI.
We are very much thankful for being very much resourceful, kind and helpful.
Her positive attitude, unassailable optimism and unwiring faith in us assured
that we came out of problems whenever we encountered difficulties.
Finally, we wish to thank all my friends and IT department to directly or
indirectly helped us in the completion of this project. Last but not the least we
would thank our family without whose support, motivation and
encouragement this would not have been possible.

Muskaan Solkar
Divyanshu Soradiya

4
ABSTRACT

As we have seen that in today’s world the IOT technology is the


upcoming future. So to take part in this upcoming technology would be a great
choice. So we took the topic of Fingerprint Door lock as this is new tech and
upcoming future. Well many fingerprint door locks are prepared but they are
too expensive, so we have created a door lock which is affordable at price for
homes and small offices.

As we have make it affordable by using basic components and


combined them with technology. The technology we used to create this
project is Arduino, Servo Motor, Fingerprint Scanner and the software used is
C++. We created a good design which will lead it towards success that is a
fingerprint door lock with affordable price range.

Muskaan Solkar
Divyanshu Soradiya

5
DECLARATION

I hereby declare that the project entitled, “Finger Print Door lock” done
at home, has not been in any case duplicated to submit to any other university
for the award of any degree. To the best of my knowledge other than me, no
one has submitted to any other university.

The project is done in partial fulfilment of the requirements for the


award of degree of BACHELOR OF SCIENCE (INFORMATION TECHNOLOGY) to
be submitted as final semester project as part of our curriculum.

Muskaan Solkar
Divyanshu Soradiya
Name and Signature of the Student

6
TABLE OF CONTENTS
CHAPTER 1: INTRODUCTION

1.1 Background

1.2 Objectives

1.3 Purpose, Scope, and Applicability

1.3.1 Purpose

1.3.2 Scope

1.3.3 Applicability

1.4 Achievements

1.5 Organisation of Report

CHAPTER 2: SURVEY OF TECHNOLOGIES

CHAPTER 3: REQUIREMENTS AND ANALYSIS

3.1 Problem Definition

3.2 Requirements Specification

3.3 Planning and Scheduling

3.4 Software and Hardware Requirements

3.5 Conceptual Models

7
CHAPTER 4: SYSTEM DESIGN

4.1 Basic Modules

4.2 Data Design

4.2.1 Schema Design

4.3 Procedural Design

4.3.1 Algorithms Design

4.4 User interface design

4.5 Security Issues

4.6 Test Cases Design

CHAPTER 5: IMPLEMENTATION AND TESTING

5.1 Implementation Approaches

5.2 Coding Details and Code Efficiency

5.3 Testing Approach

5.3.1 Unit Testing

5.3.2 Integrated Testing

5.3.3 Beta Testing

5.4 Modifications and Improvements

5.5 Test Cases CHAPTER

CHAPTER 6: RESULTS AND DISCUSSION

6.1 Test Reports

6.2 User Documentation

CHAPTER 7: CONCLUSIONS

Project REFERENCES

8
Introduction
This project is based on IOT technology and Ubiquitous Computing to help
peoples with door security. It is made for home or mini office purposes. It
allow users to free themselves from all the key worries such as keys getting
stolen, misplacing them which consumes our precious time which we can’t
afford to waste. It opens up your door with your fingertip. It gives many
enrolment options for your fingerprint scanner you can allow number of
people as per your need. It is a step forward towards smart living and moving
with time.

In simple words, we can say that we are implementing a door access system
using Arduino which make use of fingerprints to identify whom to allow and
who not to allow inside our homes, offices, shops, etc. We are trying to
implement it using a normal and simple door lock which is fitted in every home
so as to minimize the cost of the device as a product.

This paper is about solving the problem regarding security of unauthorized


people trespassing in our home, shops or offices. Security issues can be fixed
using traditional locks but there is always possibility of someone opening the
lock even without breaking it with the use of duplicate key. Using these kinds
of locks also create problem if we lose keys and also we have to carry keys
along with us always. Again, using patterns in the locks can increase security
but again it can be opened if somehow the passwords or patterns are known.
So, leaving every system in this project we will implement a system using
biometrics. In case of biometrics, the pattern which will be used as key will be

9
unique. Here, to implement the project we will use fingerprint as the key. This
arduino project will make use of different devices for the implementation of
the security lock where there will be different features to increase the security
level.

10
Background

Various attempts are made for providing security for all domiciles. Up to date,
complete security is not discovered.

Lock and Key System: First step towards security was Lock and key system.
Security protocol followed in this system was “Single key for a single lock”.
Initially, this system was considered to provide at most security. But this belief
was soon proved wrong by the fact that multiple keys can be easily made for a
single lock. Hence this system is an out-dated system to provide security.

Password Authentication: Next level of Security used password as an


authenticating tool. This system stores password of authenticated users for the
purpose of validation. System using password authentication provides
considerable security to the users as it acts as a secret of authorized users. This
system also have a pitfall that password can be acquired by unauthorized user
by continuously trying all the possible combinations. This is also one among the
hundreds of attempt made for providing security.

Authentication by RFID card: Next level of technological development for


providing security was authentication by RFID card. This system enriched the
level of security. Access is granted only for the user whose RFID code matches
with the authorized code. This system also have disadvantage of duplication of
RFID card and anyone who possess this card can unlock the door.

11
Objectives

Key-less door lock

One of the primary reasons for adopting this system is that it completely
eliminates the need of any key to operate door locks. This is a huge benefit for
most people and especially those who are in the habit of misplacing or
forgetting their keys. With this type of door lock, a big responsibility is
removed from the user’s shoulder as keeping the key securely is a must for
every home owner. There always comes a time when someone loses a key no
matter how careful they have been to keep all things at one place. Biometric
door locks are the perfect solution for such situations. These door locks are
simple in execution and come in a variety of shapes and sizes to fit any type of
door. Initially the designs were limited when this technology was newly
introduced to residential security systems. But today there are numerous door-
fingerprint combinations available in the market. These locks are mostly
designed for front doors or doors inside the garage and all they require is a
thumb-sized scanner fixed somewhere on the handle.

Other types also combine biometric identification and keypads for extra
security. Depending on the number of security layers and how advanced the
system is the prices can range from a couple hundred to several hundred
dollars. The most expensive sensors have the capability to remember the
history of fingerprints as well as hold many print profiles for friends and family.

12
Convenience

This system makes it unnecessary to carry around numerous keys for gaining
access. A simple swipe of the authorized fingerprint across the scanner is
sufficient for gaining access. Owners no longer need to worry about the safety
of their premises or valuables as their fingerprint is unique and virtually
impossible to copy.

Quicker access

It provides quicker access to individuals as it eliminates the need to manually


lock and unlock doors with keys. Moreover, these systems usually shut doors
automatically once the individual has entered his or her house thereby
ensuring that only authorized persons can enter.

Advanced security solution

Sometimes the traditional number lock on a home safe might not be sufficient.
Instead, a biometric solution is a better option as it provides highly
personalized safety by using fingerprint analysis scanners to protect the
contents. These systems can dissuade thieves who might steal an ordinary
home safe with the intention of breaking it later. Biometric solution also allows
the owner to limit access of the safe to only one or two individuals. In addition
to being highly useful for key documents and jeweller, this is also a valued
security feature for firearm safes and gun cabinets where contents can be
dangerous in the wrong hands.

13
Difficult to override

Unlike door locks with keys, a biometric system cannot be overridden by any
individual unless they have the home owner’s fingers to prove to the system
for authorized access. Conventional door locks are vulnerable to lock pickers.
But biometric systems are impossible to break and provide effective defense
against any kind of intrusion and is the best home security solution for areas
that are prone to robberies.

Cost-effective solution

Although this system might be a bit expensive in terms of the initial


investment, it proves to be a cost-effective option in the long run. In
comparison to other common types of locks, a fingerprint door lock does not
break down easily especially the ones that are constructed from quality
materials and manufactured by well-known companies.

User-friendly

This system does not need any complicated mechanism or things that might be
discouraging to new users as it is very intuitive and can be used in a simple
manner.

Scope

In future, alarm will be introduced. When intruder tries to break the door, the
vibration is sensed by sensor which makes an alarm. This will inform the
neighbours about intruders and this will help to take further action to prevent
intruder from entering. PROPOSED METHODOLOGY Our proposed system
14
overcomes all the security problems in existing system and provides high
security and efficiency. This is a perfect/optimal solution for saving/protecting
one from the hassle of stolen/lost key or an unauthorized entry.

Fingerprint is a boon solution for these problems which provides high level of
recognition accuracy. The skin on our palms and soles exhibits a flow like
pattern of ridges called friction ridges. The pattern of friction ridges on each
finger is unique and immutable. This makes fingerprint a unique identification
for everyone. Fingerprint door lock incorporates the proven technology.
Fingerprint scanner scans the fingerprints of users and used for ensuring
authentication. Fingerprint scanning is more accurate and cost effective
method and duplication is virtually impossible. A Fingerprint recognition
system can easily perform verification.

Purpose

Our main purpose for making this project is for the safety of middle class
people who can't afford costly locks with this advance technology.

It is better to keep finger lock instead of a door key along.

Security: We have provided excellent security towards this finger print door
lock, such as you can turn it off/on manually.

Cost: We have designed this project for home and small business at affordable
range

Time: This project is time effective as compared to our physical door lock.

15
Nothing to carry: We don’t have to carry any keys or remember any
passwords as it works on our fingerprints.

Uniqueness: It is unique and can never be same for two person.

Applicability

“Security” is a broad term. When it comes to door locks , there’s a diverse


brand of locks that falls under the umbrella of security. But the fingerprint
door locks make their way unique and top. Because it’s so user friendly and
unique once we have set it up we don’t have to worry about anything keys or
keeping them safe. With technology moving forward in leaps and bounds,
there is no reason why we should not take the lead as well. The sanctity of our
homes/offices is of utmost priority, and fingerprint-based lock systems will
surely deliver unto that goal.

“Arduino Based Smart Fingerprint Authentication System.”- In today’s world


Home, offices, shops, banks need excessive security measure for safety motive.
To supply security for these areas, smart lock system is initiated. There are
numerous innovational smart door locks are created to lock and unlock the
system. These types of locks has fingerprint, RFID card, pin, password or IOT by
unlocking the system using mobile phone. User using these kinds of bolting
system either utilize pin number or fingerprint or RFID card to unlock the
system.

16
Achievement

Biometric security today has overcome the limitations of earlier computing


days and people around the world prefer to use biometric recognition systems
as the go-to alternative to conventional password-based authentication
methods. Law enforcement agencies, border control, financial services, and
various consumer smart devices have opted for biometric recognition as it
eliminates the need to remember passwords, is much more accurate in
validating the identity of a person, and acts as a layer of protection against
unauthorized access, thereby catering to the need for security in the present
context. Recent advances in biometric recognition owe a great deal to
developments in the field of machine learning, and specifically its subset deep
learning. Because of the need for identification among millions of datasets it
makes sense to employ machine learning techniques in such ambitious tasks,
and the versatile nature of deep learning techniques for veridical identification
of data makes it the preeminent method among other traditional classification
algorithms. Moreover, machine learning algorithms are being progressively
employed in the domain of liveness detection and other deep learning
methodologies that safeguard template databases. We achieved a great
knowledge about IOT, embedded system.
We have gained knowledge about how fingerprint works, reads and takes
input from the user and how it stores and process for our door lock .We have
achieved the goal of making it available at affordable price range .

17
Organisation Of Report

The survey of technologies included the information of software and hardware


which use to make this project, there are so many technologies which function
same as other so we explain in that why we choose one of them and how it will
be the best among other alternatives. Also, we give information on all over
technologies which we use in this project.

The requirement analysis contains the specification of the overall requirement.


Also explains the hardware and the software which we use in this project. It
will also contain planning and scheduling of the project by using the PERT
technique & Gantt Chart .This project was well explained by helping the data
flow diagrams, ER diagram.
Also, we explain in this Schema Design, Data Design. We also explain the user
design interface.

18
Survey of technology

In these chapter we are going to study about which technologies are there
available in the market we are going to comparatively study the available
technologies and the reason we choose this technology.

History of fingerprint

A fingerprint is an impression left by the friction ridges of a human finger.


Moisture and grease on a finger result in fingerprints on surfaces such as glass
or metal. In about 200 BC fingerprints were used to sign written contracts in
Babylon. Fingerprints were used as signatures in ancient Babylon in the
second millennium BCE. By 246 BCE, Chinese offi cials were impressing
their fi ngerprints into the clay seals used to seal documents. By 650,
the Chinese historian Kia Kung-Yen stated that fingerprints could be
used as a means of authenti cati on. In fact, a Fingerprint Bureau was
set up in Kolkata, India, in 1897, in order to use fi ngerprints for the
classifi cati on of criminal records. Across the world, fingerprint
evidence is key to solving a crime. 

Today, fi ngerprint scanners have become quite a secure alternati ve to


remembering several usernames and passwords.In 1880 Henry Faulds
suggested that fingerprints could be used to identify convicted criminals. He

19
wrote to Charles Darwin for advice, and the idea was referred on to Darwin's
cousin, Sir Francis Galton. The French scientist Paul-Jean Coulier developed a
method to transfer latent fingerprints on surfaces to paper using iodine
fuming. It allowed the London Scotland Yard to start fingerprinting individuals
and identify criminals using fingerprints in 1901.

When fingerprints came in, detectives would have to compare them manually
with the fingerprints on file for a specific criminal (that's if the person even had
a record). The process would take hours or even days and didn't always
produce a match. By the 1970s, computers were in existence, and the FBI knew
it had to automate the process of classifying, searching for and matching
fingerprints. The Japanese National Police Agency paved the way for this
automation, establishing the first electronic fingerprint matching system in the
1980s. Their Automated Fingerprint Identification Systems (AFIS), eventually
enabled law enforcement officials around the world to cross-check a print with
millions of fingerprint records almost instantaneously.

Fingerprints is one of the best way to identify people as it is unique for every
person that is sole purpose it is used in security systems. As fingerprint
uniqueness differs it from other security systems such as classic old locks which
are opened with keys or new password based locks.

20
What is fingerprint technology and how it works?

Fingerprint image acquisiti on is the most important step in an


automated fi ngerprint authenti cati on system, as it assesses the final
fi ngerprint image quality, which has a crucial impact on the overall
system performance. The questi on then is how is this fi ngerprint
assessed? The answer is: using fi ngerprint sensors that these scanners
come fi tt ed with.  

A fi ngerprint sensor is an electronic device used to capture a digital


image of the fingerprint patt ern. The captured image is called a live
scan. The live scan is digitally processed to come up with a unique
biometric template (a collecti on of extracted features) which is stored
and used for matching. Once this is done, there are matching
algorithms that are used to compare these previously stored
templates against candidate fingerprints for authenti cati on purposes.
In order to do this either the original image must be directly
compared with the candidate image or certain features must be
compared.

Fingerprints are classified in a three-way process: by the shapes and contours


of individual patterns, by noting the finger positions of the pattern types, and
by relative size, determined by counting the ridges in loops and by tracing the
ridges in whorls. Biometric Technologies are biological measurements that are
used to identify the individuals. Fingerprint scanning comes under
morphological biometrics. Biometrics scanners are hardware used to capture
the biometric for verification of identity.

21
Convenience Of Use

Biometrics are always with you and cannot be lost or forgotten.

Difficult to steal or impersonate: Biometrics can’t be stolen like a password or


key can.

Where fingerprints are being used to control access to something like a


computer system, the chances of a random person having just the right
fingerprint to gain entry are, generally speaking, too small to worry about—
and much less the chance of someone guessing the right password or being
able to break through a physical lock.

Fingerprints are essentially ridges and lines present at the end of the fingertips.
They provide users with a grip between the fingers and the object by creating
friction, to help them grip objects better and prevent it from dropping off of
their hand. Every individual has a unique fingerprint, and it is highly unlikely for
two people to possess the same fingerprint pattern. This uniqueness is what
makes fingerprints the preferred choice for biometric security on smartphones.

To be able to use fingerprints to authenticate yourself on the device, the entire


process involves two steps:

Enrolment – It is the initial step in the process and involves users registering
their fingerprint of the preferred finger, which would be used in the future to
authenticate them on the device. The process essentially includes scanning,
analyzing, and storing the fingerprints in coded form on a secure database, for
future reference.

22
Verification – Once a fingerprint is registered and saved, the same will be used
in the future to verify and authenticate users on the device every time they try
to gain access.

Types of fingerprint scanners

1. Optical Fingerprint Scanners

As the name suggests, an optical scanner involves the use of optics (light) to
capture and scan fingerprints on a device. Essentially, the scanner works by
capturing a digital photograph of the fingerprint and then using algorithms to
find unique patterns of lines and ridges, spread across the different lighter and
darker areas of the image. The quality of the image sensor plays a crucial role
in getting a high-definition and detailed image of the fingerprint, which would
make it easier to extract more data from the image, increasing security.

Optical Scanners have been prevalent in the early days of fingerprint


authentication technology, and are nowadays, rarely used on most
smartphones, except for a few budget-friendly ones. The possible reasons for a
fall in the adoption of optical scanners seem to be – the bulky circuitry design
that makes it difficult for manufacturers to fit it into a smaller form factor
design, or the low-level of security offered with the 2D picture of the
fingerprint, which can be easily tricked using prosthetics or high-resolution
pictures.

23
2. Capacitive Fingerprint Scanners

Going by the name, one can get an idea of the involvement of capacitors in
Capacitive Scanners. For those unaware, a capacitor is an electronic
component that stores electrical energy in an electric field. In case you’re
wondering about its role in Capacitive Scanners, it’s important to first
understand that unlike optical scanners, which capture a 2D image of the
fingerprint, capacitive scanners capture different details of the fingerprint
using just the electrical signals. For this, it uses a series of tiny capacitors
circuits, arranged in an array, to store data of the captured fingerprints. During
the process of enrolment, the change in fingerprint patterns (ridges and lines)
causes a change in the registration process, as the charge would be different
for a finger placed over the capacitive plate and different for the air gap
between the ridges and lines. This change, in the charge of the capacitor, is
further determined using an op-amp (Operational Amplifier), and then
recorded with the help of an ADC (Analogue-to-Digital Converter).

Once a fingerprint is captured, all its related data is further analyzed for unique
fingerprint information and then saved for comparison at the time of user
authentication, in the future. Since no 2D image capturing is involved in this
process, the fingerprint data is far more secure than the data from an Optical
Scanner. And therefore, a Capacitive Scanner cannot be easily tricked with the
help of prosthetics or photographs of the fingerprint, which is why these
scanners are more popular and widely used across a wide range of
smartphones currently in the market.

24
3. Ultrasonic Fingerprint Scanners

It is the newest fingerprint scanning technology that has started to appear in


smartphones, recently. Unlike the other two types of fingerprint scanners,
which involve the use of light or capacitor, an ultrasonic scanner, on the other
hand, utilizes a very high-frequency ultrasonic sound. Additionally, it also
requires the use of a combination of an ultrasonic transmitter and an
ultrasonic receiver. The process involves the use of an ultrasonic pulse, which
is sent through the ultrasonic transmitter towards the finger resting on the
scanner. As soon as this pulse strikes the finger, some part of it is transmitted,
while some part is reflected back. This reflected pulse is then picked up by an
ultrasonic receiver, which depending upon the intensity of the pulse, captures
a 3D depiction of the fingerprint. This change in the intensity of pulse is caused
due to the texture of the finger, which constitutes ridges and lines.

Awareness about the technology

Advantages and Disadvantages Of Fingerprint Scanning Technology

Fingerprint scanning technology has several advantages. For one, it


allows fast and easy one-fi nger access to unlock devices. As
menti oned earlier, it is a good way to identify unique individuals and
it is not easy to fake fi ngerprints and break the system. Also, unlike
your signature, you can’t forget your fi ngerprint.  But at the same
ti me, there are a few disadvantages. It is tough to crack the system
but fi ngerprint identi fi cati on is not completely fool proof.

25
Also, if someone has got fi nger injuries, then they can interrupt
successful fingerprint scanning and can deny access and cause
confusion among authorized users. Dirty fingers (and germs) can
interfere with the scanning of the fi ngerprint. Especially in the
manual labour industry where employees work with their hands, their
fi ngers may get rough or scratched which could lead to a
misinterpretati on/ misreading. Opti cal scanners can’t always tell the
diff erence between a picture of a fi nger and the finger itself, and
capaciti ve scanners can be fooled by a mold of a person’s finger. Even
the scanners that have additi onal pulse and heat sensors to verify if
the person who the finger belongs to is alive, can be fooled by a
gelati n print mold over a real fi nger. To make these security systems
more reliable, it is recommended to combine the biometric analysis
with a conventi onal means of identi fi cati on, such as a password (in
the same way an ATM requires a bank card and a PIN code). 

Another factor is if your prints get stolen. Now if we lose our credit
card or accidentally tell somebody our secret PIN number, we can sti ll
get a new card or change our code. But if somebody steals our
fi ngerprints, it’s trickier than that. For one, we wouldn't be able to
use our prints as a form of identi fi cati on unti l we have made sure all
copies have been destroyed. This is parti cularly true when it comes to
offi cial / government records. 

26
Comparative study about these technologies

As we can see that there are three types of scanning tech that can be used to
scan fingerprint.

They are Optical Fingerprint Scanner, Capacitive Fingerprint Scanner and


Ultrasonic Fingerprint Scanner.

Optical fingerprint sensors have been around for a while. The way an
optical scanner works is by shining a bright light over your fingerprint and
taking a digital photo. The light-sensitive microchip makes the digital
image by looking at the ridges and valleys of the fingerprint, turning them
into 1’s and 0’s, and creates the user’s own personal code.

Capacitive Fingerprint Scanner measures your finger by using human


conductivity, creating an electrostatic field, and creating a digital image
based on the electrostatic field.

Vulnerability of optical and capacitive scanners to fingerprint


sensor attacks

Optical sensors can be fooled by latent prints i.e. the print left behind when a
real finger touches the sensor plate. Latent prints are usually produced by
sweat, skin debris or other sebaceous excretions that cover up the palmar
surface of the fingertips. If a latent print is on the glass platen of the optical
sensor and light is directed on it, this print can fool the optical scanner. This
happens because the light that is directed on the latent print gets optically
scattered and the sensor detects it as a fingerprint image.

27
Capacitive sensors can be spoofed by using gelatin based soft artificial fingers.
This material can mimic the physical characteristics of the skin and hence are
able to deceive capacitive sensors.

What is multispectral imaging sensor and how they work?

Multispectral imaging is an optical sensor that has been introduced to reduce


the vulnerability of fingerprint sensors to spoof attacks. The specialty of
multispectral sensors is that it can capture the features of the tissue that lie
below the skin surface as well as the usual features on the finger surface. The
features under the skin surface are able to provide a second representation of
the pattern on the fingerprint surface. This enables the MSI sensor to collect
good quality fingerprint images under a variety of conditions.

In cases where the surface features are worn out or the sampling conditions
are adverse, the MSI sensor is still able to capture a fingerprint image. The MSI
sensor is strongly able to distinguish between a live finger and other soft
materials. The tissue features under the skin surface provide a great amount of
information to the MSI sensor about the material that is being imaged and
thus makes it less vulnerable to fingerprint sensor attacks.

Why we used Optical Fingerprint Scanner

Optical fingerprint sensors or optical scanners have become a common


solution to implementing in-display fingerprint scanning. The technology works
by capturing a two-dimensional optical image of the fingerprint and analysing
ridges and valleys.

28
The following are the pros or advantages of optical scanners:

• They can be placed within a capacitive display screen, thus enabling in-
display fingerprint scanning and allowing manufacturers to develop devices
with larger screen real estate and minimal to zero bezels.

• Compared with ultrasonic fingerprint scanners, implementing an optical


fingerprint scanning technology is less costly. This allows manufacturers to use
optical scanning on mid-level devices.

• The entire system is still considerably small. The optical module can occupy
an area footprint of less than one millimetre.

Requirements and Analysis

Many Software Project Fails

We start implementing the software system without understanding the


requirement of user and product.

So we need requirement analysis and specification to understand the system’s


requirement in documented form.

This is a phase of SDLC.

Requirement Analysis and Requirement Specification these are two activities.

We use requirement analysis and specification technique to understand the


requirement and prepare the specification document.

29
Problem Definition

As there are many fingerprint door lock systems already available in the
market. But due to their high cost they’ll never reach to the middle-class
people house. No one would busy such expensive locks instead they’ll prefer
the classic lock system with lock and key.

Let’s clearly define the problem and sub-problems we tried to solve through
our project.

 The first and the most important is getting a fingerprint door lock at a
affordable price.
 Encouraging People to walk towards the road of Technology and Smart
Living.

The common sub problems that other fingerprint scanner provides too are :-

 More Security
 No key worries

Let’s briefly see how these problems are going to be solved and what way we
are going to use

To solve our problem we just take inspirations from life hacks we can put a lot
effort on design to make it simple and minimal while satisfying our
requirements.

30
So what does IOT design mean?
As you can see, the Internet of Things brings about a range of entirely new
experiences. All of these experiences will require new modes of interaction.
And those will have to be designed carefully. 
For example, the rise of IOT devices means that gestures and physical body
motion will become a new and far more natural way of interacting with the
digital world that surrounds us. 
The IOT space is now a great topic of exploration for designers who investigate
the potential human-machine interaction models. They ask themselves
questions about unlocking the value of these interactions through design. 
IOT design means that the focus is on singular experiences and no longer but
about design principles that represent a broader ecosystem within which IOT
devices function.

Why is IOT design important?

Designing an IOT solution comes with a set of totally new design challenges.
Consider that IOT systems usually consist of multiple elements such as physical
device sensors, actuators, and interactive devices, the network that connects
these devices, as well as the data gathered and then analysed to create a
meaningful experience. 

31
6 principles of IOT design
 
1. Do your research

When designing IOT-enabled products, designers might make the mistake of


forgetting why customers value these products in the first place. That’s why it’s
a good idea to think about the value an IOT offering should deliver at the initial
phase of your design. 

When getting into IOT design, you’re not building products anymore. You’re
building services and experiences that improve people’s lives. That’s why in-
depth qualitative research is the key to figuring out how you can do that. 

Assume the perspective of your customers to understand what they need and
how your IoT implementation can solve their pain points. Research your target
audience deeply to see what
their existing experiences are and what they wish was different about them.

2. Concentrate on value

Early adopters are eager to try out new technologies. But the rest of your
customer base might be reluctant to put a new solution to use. They may not
feel confident with it and are likely to be cautious about using it. 

32
If you want your IOT solution to become widely adopted, you need to focus on
the actual tangible value it’s going to deliver to your target audience. 
What is the real end-user value of your solution? What might be the barriers to
adopting new technology? How can your solution address them specifically? 
Note that the features the early tech adopters might find valuable might turn
out to be completely uninteresting for the majority of users. That’s why you
need to carefully plan which features to include and in what order, always
concentrating on the actual value they provide. 

3. Don’t forget about the bigger picture

One characteristic trait of IOT solutions is that they typically include multiple
devices that come with different capabilities and consist of both digital and
physical touch points. Your solution might also be delivered to users in
cooperation with service providers. 

That’s why it’s not enough to design a single touch point well. Instead, you
need to take the bigger picture into account and treat your IOT system
holistically.
 
Delineate the role of every device and service. Develop a conceptual model of
how users will perceive and understand the system. All the parts of your
system need to work seamlessly together. Only then you’ll be able to create a
meaningful experience for your end-users.

33
4. Remember about the security

Don’t forget that IOT solutions aren’t purely digital. They’re located in the real-
world context, and the consequences of their actions might be serious if
something goes wrong. At the same time, building trust in IOT solutions should
be one of your main design drivers. 

Make sure that every interaction with your product builds consumer trust
rather than breaking it. In practice, it means that you should understand all the
possible error situations that may be related to the context of its use. Then try
to design your product in a way to prevent them. If error situations occur,
make sure that the user is informed appropriately and provided with help. 
Also, consider data security and privacy as a key aspect of your
implementation. Users need to feel that their data is safe, and objects located
in their workspaces or home can’t be hacked. That’s why quality assurance and
testing the system in the real-world context are so important.

5. Build with the context in mind

And speaking of context, it pays to remember that IoT solutions are located at
the intersection of the physical and digital world. The commands you give
through digital interfaces produce real-world effects. Unlike digital commands,
these actions may not be easily undone. 
In a real-world context, many unexpected things may happen. That’s why you
need to make sure that the design of your solution enables users to feel safe
and in control at all times. 

34
The context itself is a crucial consideration during IoT design. Depending on the
physical context of your solution, you might have different goals in mind. For
example, you might want to minimize user distraction or design devices that
will be resistant to the changing weather conditions. 
The social context is an important factor, as well. Don’t forget that the devices
you design for workspaces or homes will be used by multiple users. 

6. Make good use of prototypes

IoT solutions are often difficult to upgrade. Once the user places the connected
object somewhere, it might be hard to replace it with a new version –
especially if the user would have to pay for the upgrade. 
Even the software within the object might be hard to update because of
security and privacy reasons. Make sure that your design practices help to
avoid costly hardware iterations. Get your solution right from the start. From
the design perspective, it means that prototyping and rapid iteration will
become critical in the early stages of the project.

Requirements Specification:

Non-functional requirements:

35
A non-functional requirement (NFR) is a requirement that specifies criteria
that can be used to judge the operation of a system, rather than specific
behaviours. They are contrasted with functional requirements that define
specific behaviour or functions. The plan for implementing functional
requirements is detailed in the system design. The plan for implementing non-
functional requirements is detailed in the system architecture, because they
are usually architecturally significant requirements.

Functional Requirements:

Functional requirements may involve calculations, technical details, data


manipulation and processing and other specific functionality that define what a
system is supposed to accomplish. Behavioural requirements describe all the
cases where the system uses the functional requirements; these are captured
in use cases

36
Planning and scheduling

Planning is the process of deciding the objectives to be achieved and selecting


the ways and means of achieving the pre-decided objectives.
We can say that it is a process of decision-making regarding what to do, how to
do, when to do.
After choosing the topic Fingerprint Door lock . We started planning which
mainly three things
 What To Do
 How To Do
 When To Do

Before starting these steps we have to analyse the situation:-


For creating fingerprint door lock we have a specific time in which we have to
research about the fingerprint technology how it records the fingerprint, about
the scanner what design we are going to use for creating a door lock while
keeping our goal in mind, researching and learning about the different ways in
which these project can be created and choosing one of the optimal way to
create these project.

About fingerprint technology and how it works:

37
What Is a Fingerprint?

Before we delve into this subject, let’s start by looking at what is a


fi ngerprint.  

A fi ngerprint refers to an impression left by the fricti on ridges of a


human finger. They are easily deposited on surfaces like glass or
metal or polished stone by the natural secreti ons of sweat from the
eccrine glands that are present in epidermal ridges. Deliberate
impressions of fingerprints can be formed by ink or other substances
and passed on to a relati vely smooth surface such as a fingerprint
card. Usually, fi ngerprint records contain impressions from the pad on
the last joint of fingers and thumbs, though fi ngerprint cards also
typically record porti ons of lower joint areas of the fi ngers.  

What is a fi ngerprint scanner?

Broadly speaking, fi ngerprint scanners are security systems of


biometrics (the fi eld of study which aims to identi fy or recognise
people based on traits they have). As menti oned above, fingerprints
are rather unique and hence, they are used to unlock doors and in
other security applicati ons where access is controlled and monitored
closely. During the 2010s, fingerprint scanners became a common
feature on mobile phones. Nowadays, they are also being used in
laptops. 

How fi ngerprint scanning technology works

38
Fingerprint image acquisiti on is the most important step in an
automated fi ngerprint authenti cati on system, as it assesses the final
fi ngerprint image quality, which has a crucial impact on the overall
system performance. The questi on then is how is this fi ngerprint
assessed? The answer is: using fi ngerprint sensors that these scanners
come fi tt ed with.  

A fi ngerprint sensor is an electronic device used to capture a digital


image of the fi ngerprint patt ern. The captured image is called a live
scan. Today, there are diff erent types of fi ngerprint readers in the
market, but the basic idea behind each is to measure the physical
diff erence between ridges and valleys of the fi ngerprint and thus
ascertain an individual’s identi ty.

We have explained about 3 fingerprint scanner from which we are


going to use the opti cal fi ngerprint

To achieve our goal of creati ng a fingerprint door lock at aff ordable


price, we have created a simple design for which many components
are needed such as Arduino Uno which is a microcontroller , the
opti cal fingerprint scanner , the servo motor , a stopper and learning
about these components and aligning them creating a good design .
Well of this is done on paper yet.

We’ll then buy the necessary components and then we will execute
the design we have created for the project and we’ll solve any error
that we will face while creati ng the project.
39
Hardware Requirements

Arduino
Arduino is an open-source electronic platform based on easy-to-use hardware
and software. Arduino boards are able to read inputs – light on sensor, a finger
on a button, or a Twitter message – and turn it into an output – activating a
motor, turning on an LED, publishing something online. You can tell your board
what to do by sending a set of instructions to the microcontroller on the board.
To do so you use the Arduino programming language (based on writing), and
the arduino software (IDE), based on processing.

Arduino was born at the ivrea interaction design institute as an easy tool for
fast prototyping, aimed at students without a background in electronics and
programming. All Arduino boards are completely open-source, empowering
users to build them independently and eventually adapt them to their

40
particular needs. The software, too, is open – source, and it is growing through
the contributions of users worldwide.

Operating Voltage                                                    5V

Input Voltage (recommended)                                 7-12V

Input Voltage (limits)                                               6-20V

Digital I/O Pins                                                        54 (of which 14 provides PWM output)

Analog Input Pins                                                     16

DC Current per I/P Pin                                             40mA

DC Current for 3.3V Pin                                          50mA

Flash Memory                                                           256 KB of which 8 KB used by boot loader

SRAM                                                                      8 KB

EEPROM                                                                  4 KB

Clock Speed                                                              16 MHz

41
It is the heart of our project. It is a micro-controller based open source
electronic prototyping with an easy to use IDE.

The major components of UNO are:-

 USB Connector
 Power Port
 Microcontroller
 Analog Input Pins
 Digital Pins
 Reset Switch
 Crystal Oscillator
 USB Interface Chip
 TX RX LEDs

The power pins description

+VIN:-  The input voltage to the Arduino board when it’s using an external

power source (as opposed to  volt from the USB connector or other regulated
power source). You can supply voltage through this pin, or, if supplying voltage
via the power jack, access through this pin.

42
+5V:- The regulated power supply used to power the microcontroller and other

components on the board. This can come either from VIN an on-board
regulator, or be supplied but USB or another 5V supply.

+3V3:- A 3.3 volt supply generated by the on-board regulator. Maximum

current draw is 50mA.

GND:-  Ground pins.

Input and Output 


Each of the 54 digital pins on the Mega can be used as an input or output,
using pin Mode(), digital Write(), and digital Read() functions. They operate at
5 volts. Each pin can provide or receive a maximum of 40 mA and has an
internal pull-up resistor (disconnected by default) of 20-50 k Ohms. In adding,
some pins have specialized functions:

Serial:-0 (RX) and 1 (TX); Serial 1:19 (RX) and 18 (TX); Serial 2:17 (RX) and 16
(TX); Serial 3:15 (RX) and 14 (TX). Used to receive (RX) and transmit (TX) TTL
serial data. Pins 0 and 1 are also connected to the corresponding pins of the
ATmega8U2 USB-to-TTL Serial chip.

External Interrupts: 2 (interrupt 0), 3 (interrupt 1), 18 (interrupt 5), 19


(interrupt 4), 20 (interrupt 3), and 21 (interrupt 2). These pins can be
configured to trigger an interrupt on a low value, a rising or falling edge, or a
change in value. See attach interrupt() function for details.

43
PWM: 0 to 13. Provide 8-bit PWM output with the analog write () function.SPI:
50 (MISO), 51 (MOSI), 52 (SCK), 53 (SS). These pins support SPI communication
using the SPI library.

The SPI pins also broken out on the ICSP header, which is physically
compatible with the Uno, Duemilanove and Diecimila.

LED: 13. There is a built-in LED connected to digital pin 13. When the pin is
HIGH value, the LED is on, when the pin is LOW, it’s off.

I2C: 20 (SDA) and 21 (SCL). Support I2C (TWI) communication using the Wire
library(documentation on the Wiring website). Note that these pins are not in
the same location as the I2C pins on the Duemilanove or Decimal.
There are a couple of other pins on the board:

AREF. Reference voltage for the analog inputs. Used with analog Reference ().

Reset. Bring this line LOW to reset the microcontroller. Typically used to add a
reset button to shields which block the one on the board.
Communication The Arduino Mega2560 has a number of facilities for
communicating with a computer, another Arduino, or other microcontrollers.
The ATmega2560 provides four hardware UARTs for TTL (5V) serial

Power Port

 The arduino port can be connected to AC to DC adaptor or a battery.

44
 The power source can be connected by plugging in a 21mm center
positive plug into the power jack of the board.
 The arduino uno board operates at the a voltage of 5 volts but it can
withstand the voltage of 20 volts.
 If the board is supplied with a higher voltage, ther is a voltage regulator
it sits between power point and USB connector that protects the board
from burning out.

Micro controller

 It is the most prominently visible black rectangular chip with 28 chips


think of it as the brain of arduino. The micro controller used on the UNO
is AT mega 328p by Atmel.
 ATmega 328p has the following components in it.
 Flash memory of 32KB the program loaded from arduino IDE is stored
here.
 Ram of 2KB this is runtime memory.

CPU

It controls everything that goes on within the device it fetches the program
instruction from flash memory and runs it with the help of RAM.

EEPROM

 Electrically Erasable Programmable Read Only Memory of 1KB .This is a


type of non volatile memory and it keeps the data even after device
restart and reset.

45
 ATmega328p is pre-programmed with bootloader. This allows you to
directly upload a new arduino program into the device, without using
any external hardware programmer making the arduino UNO board easy
to use.

SERVO MOTOR

A servomotor is a rotary actuator or linear actuator that allows for precise


control of angular or linear position, velocity and acceleration. It consists of a
suitable motor coupled to a sensor for position feedback. It also requires a
relatively sophisticated controller, often a dedicated module designed
specifically for use with servomotors.
Servomotors are not a specific class of motor although the term servomotor is
often used to refer to a motor suitable for use in a closed–loop control system.

46
FINGERPRINT SENSOR
A fingerprint is an impression left by the friction ridges of a human finger. The
recovery of partial fingerprints from a crime scene is an important method
of forensic science. Moisture and grease on a finger result in fingerprints on
surfaces such as glass or metal. Deliberate impressions of entire fingerprints
can be obtained by ink or other substances transferred from the peaks of
friction ridges on the skin to a smooth surface such as paper. Fingerprint
records normally contain impressions from the pad on the last joint of fingers
and thumbs, although fingerprint cards also typically record portions of lower
joint areas of the fingers.

47
BATTERY
The nine-volt battery, or 9-volt battery, is a common size of battery that was
introduced for the early transistor radios. It has a rectangular prism shape with
rounded edges and a polarized snap connector at the top. This type is
commonly used in walkie–talkies, clocks and smoke detectors.
The nine-volt battery format is commonly available in primary carbon-zinc and
alkaline chemistry, in primary lithium iron disulfide, and in rechargeable form
in nickel-cadmium, nickel-metal hydride and lithium-ion. Mercury-oxide
batteries of this format, once common, have not been manufactured in many
years due to their mercury content. Designations for this format include NEDA
1604 and IEC 6F22 (for zinc-carbon) or MN1604 6LR61 (for alkaline). The size,
regardless of chemistry, is commonly designated PP3—a designation originally
reserved solely for carbon-zinc, or in some countries, E or E-block.

48
JUMPER WIRE
A jump wire is an electrical wire, or group of them in a cable, with a connector
or pin at each end, which is normally used to interconnect the components of a
breadboard or other prototype or test circuit, internally or with other
equipment or components, without soldering.

SOFTWEAR DESCRIPTION
ARDUINO IDE (R3)

The open-source Arduino software (IDE) makes is easy to write code and
upload it to the board. It runs on windows, MAX OS X, and Linux. The
environment is written in java and based on processing and other open-source
software. The Arduino integrate Development Environment or Arduino
software (IDE) contains a text editor for writing code, a message area, a text
console, a toolbar with buttons for common function and a series of menus. It
connects to the Arduino and Genuine hardware to upload the program and
communication with them. 

49
Gantt Chart

Date Task No Of Days

18-09-21 Introduction 05

23-09-21 Survey Of Technologies 10

03-10-21 Requirement and Analysis 08

11-10-21 Design 14

Gantt Chart : A Gantt chart, or harmonogram, is a type of bar chart that


illustrates a project schedule. This chart lists the tasks to be performed on the
vertical axis, and time intervals on the horizontal axis. The width of the

50
horizontal bars in the graph shows the duration of each activity. Gantt charts
illustrate the start and finish dates of the terminal elements and summary
elements of a project. Terminal elements and summary elements constitute
the work breakdown structure of the project. Modern Gantt charts also show
the dependency (i.e., precedence network) relationships between activities.

Date 18 – 23 Sept 23 Sept – 03 Oct 03 Oct – 11 Oct 11 Oct – 22 Oct

Task 1 Setting a goal and


aim for project.
Describing
purpose scope
and Applicability
for project.

Task 2 Understanding
about
Technologies
needed to
create the
project

Acquiring
knowledge and
skills needed
to create the
project.
Task 3 Defining the
overall
problem and

51
solving it .
Also acquiring
hardware and
software
resources and
creating
models.
Task 4 Creating Design
For the project
Describing
features
making logic
diagrams
implementing
algorithms .

Conceptuial Model

A conceptual diagram is a visual representation of the ways in which abstract


concepts are related. It is used as an aid in visualizing processes or systems at a
high level through a series of unique lines and shapes. Conceptual diagrams
are widely employed in fields as diverse as business, science, and
manufacturing, and they may be created in a variety of ways to suit the
project’s needs.

52
Different Conceptual Model for Fingerprint Scanner

53
54
55
System Design

What is System Design?


The System Design Document is a required document for every project. It
should include a high level description of why the System Design Document
has been created, provide what the new system is intended for or I s intended
to replace and contain detailed descriptions of the architecture and system
components.

Basic Module
In Basic Module we divide our project into different types of modules which
helps us to create our project in a structure.

We create different modules and integrate them into our project.

Planning Module
Under this model, we have planned the entire project in detail, what
technology will we use in this?

How will be the design of the project, which method will we use, what will be
our design to complete the project within the time period.

We first started by learning the technologies we needed to create the project


then we focused on the learning about the equipment that are needed for the
project.

Then we created a design we needed for the project.

Afterwards comes the coding module.

We need some components for making this:

56
Coding Module:
Our coding module covers the important part of our project. It includes the
library needed for our fingerprint scanner to work and the source code of our
app which is required to turn on and off the scanner . This app will also contain
the details about our project how it is made and what’s the idea behind the
project.

Adafruit-Fingerprint-Sensor-Library

Connect to any microcontroller or system with TTL serial, and send packets of
data to take photos, detect prints, hash and search. Using this library we can
enrol new fingerprint record fingerprint, we can update or delete fingerprint.
This library consist code in c++ in Arduino IDE.

Next is the source code for our app. We are going to use Python Language for
creating the app. In python we are going to use KIVY framework + MySQL for
database.

Implementation Module:

After learning about all the necessary knowledge and skills required for the
project we theorize in the book first then implemented physically.
Then we implement our design that we created for fingerprint door lock. We
have to connect all our components as per the design while implementing
coding module to create the working fingerprint door lock.

Testing Module:
Here we test our project checking it’s functionality if there are any bugs in
code or any mechanical problem we remove them.

57
Data Design
The data we are going to manage includes fingerprint data and application
data.

Fingerprint Data
First we are going to explain the technological flow of data.

When the user enrols for the fingerprint: - The Fingerprint data flows from the
Optical Scanner to Arduino (Microcontroller).

When user uses the fingerprint door lock: - The Fingerprint data flows from the
Optical Scanner to Arduino (Microcontroller) then data flows to server motor.

Physical Flow of data: - User to Fingerprint door lock.

The Fingerprint data is organized and managed by the microcontroller. The


Arduino IDE is used to enrol, update and delete the fingerprint scans.

58
Application Data
59
In this paper finger print processing includes two parts finger point enrolment
and finger print matching. when enrolling, user needs to enter the finger image
two time. The system will process the finger images, generate a template of
the finger images based on processing results and store the template. When
matching user enters the finger through optical sensor and system will
generate a template of the finger image and compare it with templates
present in the finger library. 2.4 “On securing a door with finger print biometric
technique” - In this paper, the project was constructed done in three different
stages, the writing of the code (driver) which controls the Microcontroller
using C language, the implementation of the whole project on a solder-less
experiment board, the soldering of the circuits on Vero-boards and the
coupling of the entire project to the casing. The implementation of this project
was done on the breadboard as a prototype, the power supply was first
derived from a bench power supply in the electronics laboratory, in all the
development guaranteed security for illegal intrusion of illegal entity to room,
the mechanism can be implemented in a broader sense on a door where a
there is restriction of access.

The design of security door lock using the finger print technology was built
around a Microcontroller Unit (MCU), PIC16F628A, which reads in finger prints
from finger print scanner and grant access, to a protected compartment, only
to pre-registered finger prints. The finger print scanner serves as the main
input into this embedded security system. Finger prints read are compared to
those ones pre-programmed into the memory of the microcontroller. When a
match is made, the microcontroller outputs a HIGH which activates the
transistor-relay switching stage that controls opening and closing of the
modelled motorized door granting access into the protected building. An
alphanumeric liquid crystal display (LCD) is used in this design to show the
operating status of this embedded security system. By default it displays a
welcome message requesting that the user should enter a finger print. And
when a match is made it displays “ACCESS GRANTED” otherwise it displays
“ACCESS DENIED”.

60
“Implementation of biometric security in a smartphone based domotics.” - In
this paper a cost effective Home Automation System which is secured by a
biometric system is proposed. The circuit design, simulation and experimental
analysis of the proposed system are discussed. This work proposes a home
automation system in which the home appliances can be controlled remotely
using the Bluetooth technology through an android app, installed in the
Smartphone.

The proposed work focuses on the development of a system in which the


home appliances are wirelessly controlled within a range using Bluetooth
technology. A biometric Security System is also developed which uses the
fingerprint authentication for accessing the home automation circuitry and
door lock of the smart home. Broadly dividing the whole concept in two parts:

Home automation using microcontroller AT89S52. Biometric access to the door


lock and automation circuitry using Arduino Uno and R305 fingerprint sensor.

“Design and Implementation of a Fingerprint Based


Lock System for Shared Access.”-

Nowadays office/corporate territory security is a vital problem faced by


everyone when far from home or at the home. When it comes to the security
systems, it is one of the key worries in this occupied-merciless world, where
people cannot get ways to provide security to their important possessions
manually. Instead, they finds a different solution that provides better,
dependable and atomized security.

61
This is a time, where everything is attached through network, where anyone
can get hands on information from anyplace around the globe. Thus
possibilities of one’s information being hacked are a serious affair. Due to
these chances, it’s very crucial to have some kind of personal recognition to
enter one’s own information. These days personal identification is becoming a
principle affair all around. Our fingerprint based lock system has high
correctness rate and is also rapid to identify fingerprints which authorize
flawless combination with the users and gives away tighter security.

1. The fingerprint is scanned.

2. The fingerprint is put in a condition where it scans for the match of the
fingerprint. If match is found, it moves to step 3. Else it moves to step 6.

3. The information of the person is recorded like name, time of entry/exit, etc.

62
4. The servo motor is started and accordingly the hook lock connected to the
servo motor does its work of locking or unlocking.

5. A welcome message is displayed.

6. It will check if the unrecognized fingerprint is tried more than 3 times. If such
attempt is made, it will move to step 7. Else, it will move to step 10.

7. Store the unrecognized fingerprint. 8. Store photograph of unauthorized


user. 9. Send message to the owner.

10. Display error message.

11. Repeat step 9. 4

1. Fingerprint Scanner- This scans the finger for fingerprint.

2. Servo Motor- Used to lock or unlock the door.

3. Adapter- To provide power source to the system.

4. Jumper Wires- To connect all devices with each other

Also, along with the hardware devices we are using Arduino IDE as software to
program the functioning of the hardware devices. Note- Before any procedure
we must first register/store the fingerprints using the Arduino IDE which will
work as unlocking fingerprints. The main connection of the servo motor and
fingerprint which are the main component of our project are done in the
following ways. The arduino is connected to servo motor where red wire is
connected to 5V, brown wire is connected to point 8 and orange wire is
connected to GND.

63
Implementation Approaches
Coding Details

void Enroll()

int count=0;

lcd.clear();

lcd.print("Enroll Finger ");

lcd.setCursor(0,1);

lcd.print("Location:");

while(1)

lcd.setCursor(9,1);

lcd.print(count);

if(digitalRead(up) == 0)

count++;

if(count>25)

count=0;

delay(500);

64
else if(digitalRead(down) == 0)

count--;

if(count<0) count=25; delay(500); } else if(digitalRead(del) == 0) { id=count;


getFingerprintEnroll(); return; } else if(digitalRead(enroll) == 0) { return; } } } void delet()
{ int count=0; lcd.clear(); lcd.print("Delete Finger "); lcd.setCursor(0,1);
lcd.print("Location:"); while(1) { lcd.setCursor(9,1); lcd.print(count); if(digitalRead(up) ==
0) { count++; if(count>25)

count=0;

delay(500);

else if(digitalRead(down) == 0)

count--;

if(count<0)

count=25;

delay(500);

else if(digitalRead(del) == 0)

id=count;

deleteFingerprint(id);

65
return;

else if(digitalRead(enroll) == 0)

return;

uint8_t getFingerprintEnroll()

int p = -1;

lcd.clear();

lcd.print("Finger ID:");

lcd.print(id);

lcd.setCursor(0,1);

lcd.print("Place Finger");

delay(2000);

while (p != FINGERPRINT_OK)

p = finger.getImage();

switch (p)

66
case FINGERPRINT_OK:

Serial.println("Image taken");

lcd.clear();

lcd.print("Image taken");

break;

case FINGERPRINT_NOFINGER:

Serial.println("No Finger");

lcd.clear();

lcd.print("No Finger");

break;

case FINGERPRINT_PACKETRECIEVEERR:

Serial.println("Communication error");

lcd.clear();

lcd.print("Comm Error");

break;

case FINGERPRINT_IMAGEFAIL:

Serial.println("Imaging error");

lcd.clear();

lcd.print("Imaging Error");

break;

default:

Serial.println("Unknown error");

67
lcd.clear();

lcd.print("Unknown Error");

break;

68
Code For Unlocking Door
void unlockdoor()

delay(900);

lcd.setCursor(0,0);

lcd.println(" ");

lcd.setCursor(1,0);

lcd.print("Access Granted");

lcd.setCursor(4,1);

lcd.println("WELCOME!!");

lcd.setCursor(15,1);

lcd.println(" ");

lcd.setCursor(16,1);

lcd.println(" ");

lcd.setCursor(14,1);

lcd.println(" ");

lcd.setCursor(13,1);

lcd.println(" ");

unlockbuzz();

69
for(pos = 180; pos>=0; pos-=5) // goes from 180 degrees to 0 degrees

myservo.write(pos); // tell servo to go to position in variable 'pos'

delay(5); // waits 15ms for the servo to reach the position

delay(2000);

delay(1000);

counterbeep();

delay(1000);

for(pos = 0; pos <= 180; pos +=5) // goes from 0 degrees to 180 degrees

{ // in steps of 1 degree

myservo.write(pos); // tell servo to go to position in variable 'pos'

delay(15);

int currentposition=0;

lcd.clear();

displayscreen();

70
Physically Implementing Project

 We will take a wooden board with approximate size to fit in


every components.

71
 Then we will take a stopper and drill it to the board.

72
 Then we will apply bond set and stick the bolt to the stopper.

 Then we will cut a small piece of wooden board and stick it


applying glue stick.

73
 We will stuck it’s end with the grip of pen.

74
 We will stick the fingerprint scanner to the wooden board
using the double tap.

 This is how our setup looks like.

75
Connections:

Fingerprint:

Green - 2

White - 3

Red – 5V

Black –GND

Servo Motor:

Orange – 8

Brown – GND

Red – 5V

76
 Then arduino is connected to the laptop and code is uploaded.

Unit Testing

UNIT TESTING is a type of software testing where individual units or


components of a software are tested. The purpose is to validate that each unit
of the software code performs as expected. Unit Testing is done during the
development (coding phase) of an application by the developers. Unit Tests
isolate a section of code and verify its correctness. A unit may be an individual
function, method, procedure, module, or object.

77
In SDLC, STLC, V Model, Unit testing is first level of testing done before
integration testing. Unit testing is a White Box testing technique that is usually
performed by the developer. Though, in a practical world due to time crunch
or reluctance of developers to tests, QA engineers also do unit testing.

Unit Testing is of two types

 Manual
 Automated

Unit testing is commonly automated but may still be performed manually.


Software Engineering does not favour one over the other but automation is
preferred. A manual approach to unit testing may employ a step-by-step
instructional document.

Under the automated approach-

A developer writes a section of code in the application just to test the function.
They would later comment out and finally remove the test code when the
application is deployed.

A developer could also isolate the function to test it more rigorously. This is a
more thorough unit testing practice that involves copy and paste of code to its
own testing environment than its natural environment. Isolating the code
helps in revealing unnecessary dependencies between the code being tested
and other units or data spaces in the product. These dependencies can then be
eliminated.

78
A coder generally uses a Unit Test Framework to develop automated test
cases. Using an automation framework, the developer codes criteria into the
test to verify the correctness of the code. During execution of the test cases,
the framework logs failing test cases. Many frameworks will also automatically
flag and report, in summary, these failed test cases. Depending on the severity
of a failure, the framework may halt subsequent testing.

The workflow of Unit Testing is 1) Create Test Cases 2) Review/Rework 3)


Baseline 4) Execute Test Cases.

Beta testing is a type of User Acceptance Testing among the most crucial
testing, which performed before the release of the software. Beta Testing is a
type of Field Test. This testing performs at the end of the software testing life
cycle. This type of testing can be considered as external user acceptance
testing. It is a type of salient testing. Real users perform this testing. This
testing executed after the alpha testing. In this the new version, beta testing is
released to a limited audience to check the accessibility, usability, and
functionality, and more.

Beta testing is a type of User Acceptance Testing among the most crucial
testing, which performed before the release of the software. Beta Testing is a
type of Field Test. This testing performs at the end of the software testing life
cycle. This type of testing can be considered as external user acceptance
testing. It is a type of salient testing. Real users perform this testing. This
testing executed after the alpha testing. In this the new version, beta testing is
released to a limited audience to check the accessibility, usability, and
functionality, and more.

79
CONCLUCSION

Fingerprint door locks are great investment for home or business. It provides
great security by providing restrictions to unwanted access. This device
increases level of security by adding unique biological features of authorized
person. For anyone who wants more security to their homes, fingerprint door
locks are best choice.

In this paper, we have tried to solve the security matter in door by bringing the
concept of biometrics along with the door lock. So, for that purpose we are
using finger prints as unique key to implement a device so as to lock or unlock
a door. We have discussed about the different components using arduino we
would require to implement our project i.e. we have given the hardware and
software requirements in the project. We have gone through different
research papers and then given a brief about the papers and after studying the
papers we have come with an algorithm as to how our system will work

80
Reference

https://stackoverflow.com/

https://www.geeksforgeeks.org/

https://www.tutorialspoint.com/index.htm

https://pub.dev/

https://www.youtube.com/

https://www.guru99.com/integration-testing.html

https://www.tutorialspoint.com/index

https://medium.com/

https://github.com/

https://www.youtube.com/watch?v=dmZ9Tg9k13U

81

You might also like