International Journal of Engineering Applied Sciences and Technology, 2021
Vol. 6, Issue 4, ISSN No. 2455-2143, Pages 323-327
Published Online August 2021 in IJEAST (http://www.ijeast.com)
A DETAILED REVIEW ON FINGERPRINT DOOR
LOCK SYSTEM
Jatin Singh 1, Shubham Yadav 2, Mayank Chaudhary 3,
,
Abstract: Passwords and Tokens are extremely it possibly forestalls unapproved induction to get to control
vulnerable and are easily stolen or lost. A poor frameworks or deceitful utilization of ATMs, Time
password is one of the most common causes of Attendance Systems, PDAs, shrewd cards, work area PCs,
security and data breaches. Hacker attacks target Workstations, vehicles and computer networks. Biometric
even the strongest passwords. Resetting the acknowledgment frameworks offer more prominent security
password takes a long time and can cause the and comfort than customary techniques for individual
employee to lose productivity. Biometrics can be acknowledgment. Unique finger impression acknowledgment
used to solve the problem. It is the method of addresses the most seasoned technique for biometric
recognizing or confirming individuals based on distinguishing proof which is traced all the way back to 2200
BC. The utilization of fingerprints as an individual code has a
physiological or behavioral features such as the iris,
long custom and was at that point utilized.
fingerprints, facial pattern, DNA, speech patterns,
and so on. The concept of distinguishing individuals
II. LITERATURE REVIEW
based on their fingerprints goes back thousands of
years. It first became famous in the 1970’s. The
detection and authentication of fingerprints is the [1] Using radio-frequency identification (RFID) and
method of fingerprint identification. Fingerprint fingerprint recognition, we are going to present a dual lock.
identification is the most commonly used biometric. This locking system is so secure and reliable that it can be
This research paper explains the main implemented in home, offices, school and in also in kind of
characteristics of fingerprints and how the organizations. In case the user lost their RFID card, using
Automatic Minutiae Detection process works, as their fingerprints they are able to unlock the latches.
well as comparing 2D and 3D fingerprint Fingerprints and the RFID tags are accessible only to the
registered user. If an unauthorized person tries to access it, a
recognition
text message will be sent to the owner as short message
service (SMS) using global system for mobile
Keywords: Biometrics, Security
communications (GSM). It also captures the picture of the
person using the TTL camera and will be stored in the SD
I. INTRODUCTION card. The main component of the system is the Arduino Mega
2560 which is interfaced with a fingerprint scanner module,
RFID card reader module, TTL camera, SD card module,
Biometrics alludes to the programmed distinguishing proof of GSM shield, and liquid crystal display (LCD) and an electric
a living individual dependent on physiological or social door strike.
qualities for verification reason. Among the current biometric
advances are the face acknowledgment, finger impression
acknowledgment, finger-calculation, hand math, iris [2] An enhanced method of executing and designing of
acknowledgment, vein acknowledgment, voice a fingerprint door lock using GSM technology, alarm system,
acknowledgment and mark acknowledgment, Biometric monitoring camera and password system. This Security
strategy requires the actual presence of the individual to be system provides various security features like limiting
recognized. This stresses its inclination over the customary unauthorized people access and keeps a record who ever
strategy for recognizing what you have, for example, the passes through it. In case if any burglars try to break the door,
utilization of secret word, a smartcard and so on Additionally, an alarm system is set to alert the nearby people at that
surrounding. A GSM module is used to send SMS to the
owner and a web cam is used to take video of who tries to
323
International Journal of Engineering Applied Sciences and Technology, 2021
Vol. 6, Issue 4, ISSN No. 2455-2143, Pages 323-327
Published Online August 2021 in IJEAST (http://www.ijeast.com)
break the lock. A fingerprint scanner R305 is interfaced with Resetting the password requires a lot of time and may delay
Arduino microcontroller-ATMEGA328P to control the the productivity of the employee. It can be resolved by using
locking and unlocking process of a door. The LCD panel biometrics. It is a practice of identifying or verifying the
displays some basic commands to instruct the users. If any individuals based on their unique physiological or behavior
unregistered user places his finger in the sensor, then ral characters like the iris, fingerprints, facial pattern, DNA,
automatically their access will be denied. In places like home, Voice patterns, etc. The idea of identifying people on the
offices, banks, hospitals, and in other governmental and basis of fingerprints can be traced back to thousands of years.
private sectors, the above proposed door lock security system It first came into practice in around 1970. The Fingerprint
can be used. When compared to other projects like RFI and identification process is of identifying and verifying the
password, this security system has shown competitive results fingerprints. Fingerprints identification is more popular than
when tested. any other biometrics. This research paper elaborates the key
features of fingerprints and the working of Automatic
Minutiae Detection process and also compares the 2D
[3] In recent years, Fingerprint based authentication
fingerprint identification with 3D fingerprint identification.
systems have developed rapidly. At present fingerprint based
biometric system are exposed to severe attacks. When
compared to different fingerprint sensors and spoofing [6] In the security field, Fingerprint identification which
materials, the single feature based static approach does not is unique and reliable is being used. Based on fingerprint
perform equally.We propose a static software approach to door lock, we have introduced the design of remote
combine low level gradient features from Speeded-Up Robust monitoring intelligent system. This system identifies
Features (SURF), texture features from Gabor wavelet using accurately lively fingerprint, when an illegal burglary is
dynamic score level integration and, pyramid extension of the happened and sent the unlock ID information to the owner or
Histograms of Oriented Gradient (PHOG) in this paper. To the monitoring center of management office by the GSM
overcome the issues faced in dynamic software approaches network or by PSTN.
which require user cooperation and longer computational
time, we extract these features from a single fingerprint. By
[7] Traditional door locking methods, such as smart and
the experimental analysis done on LivDet 2011 data had
manual, are visible from the outside, and there is a risk of
resulted an average Equal Error Rate (EER) of 3.95% over
burglary. The proposed solution includes a special internal
four databases, while the existing best average ERR was
locking mechanism that is hidden within the main door and is
9.62%. Experiments were performed with Livdet 2013 and
enabled after two stages of security verification are
achieved an average classification error of 2.27%.
completed. One of the security stages of the mains key of
finger print sensor to operate internal locking mechanism is
[4] Due to easy access Fingerprints are considered as a held inside a primary (preliminary) door and is hidden from
unique identification of a person and one of the best and the view until the primary door is opened. When the primary
fastest method used in biometric identification systems. They door is successfully checked, it can be opened with either one
are so secure and reliable to use as they are so unique and of the RFID-based primary keys or Bluetooth-based master
doesn’t change for one in a lifetime. Fingerprint recognition keys.
using minutiae matching technique is cheap, reliable and
accurate up to adequate limits. Fingerprint matching based on
[8] Traditional lock systems, passwords, and other
minutiae matching is used in this thesis work. Our algorithm
security measures were previously used in high-security areas
also takes into account region and line structures that exist
or bank locker rooms. These devices, however, were
between minutiae pairs unlike other conventional minutiae
discovered to be insecure. RFID cards were introduced as a
matching algorithm. For resulting in stronger certainty of
result of technological advances. These cards, on the other
matching minutiae, more structural information of the
hand, were of little use to the consumer due to the risk of
fingerprint is to be accounted. Since most of the region
being misplaced, stolen, or forgotten. The aim of this research
analysis is preprocessed, it doesn’t result in making the
is to develop high-security solutions for such high-end
algorithm slower.
security applications. The aim of this research is to create a
smart door access system that incorporates a finger print
[5] Passwords and Tokens are highly vulnerable and are module. This system is used to limit access to only those who
at high risk of being stolen or lost. One of the main reasons are approved. It is built using both hardware and software
for security and data breaches is a weak password. Even technologies.
strong passwords are being attacked by hacker attacks.
324
International Journal of Engineering Applied Sciences and Technology, 2021
Vol. 6, Issue 4, ISSN No. 2455-2143, Pages 323-327
Published Online August 2021 in IJEAST (http://www.ijeast.com)
[9] To enter through our finger print, a finger print controlled access to all of the system's areas. control over
recognition device is a security issue. A finger print scanner, access to specific areas (rooms). It allows for the collection
such as Microsoft Fingerprint Reader, is used to identify the of data on arrival and departure times, as well as a view of
finger print. The most effective and accurate biometric people's movement between different areas and controlled
identification method available is finger print recognition. access to all of the system's areas. The computerized
Every individual is identified by their unique finger prints, admittance control system is globally composed of
which are used to open the lock. It's being researched the monitoring computer, interface between RS232 and CAN
most as a biometric technology. The problems of fingerprint bus, CAN bus and microcontroller interface, which
identification are known as fingerprint verification and manages a contactless card reader, controls electric
identification. In areas such as security lock door systems, keylock and other light and acoustic signals.
house entries, mobile screen locks, and so on, the finger print
pattern matching is commonly used.
[13] The usage of conventional door locks became less
[10] The creation and implementation of a Biometric practical currently as they can be duplicated easily. A
Based Door Lock System is described in this paper, which company or an agency should be made a restricted area in
will automatically unlock a door when a registered fingerprint order to maintain office security. It is because only the
is detected. To achieve this, a fingerprint scannerR305 is used authorized people can access the respective rooms such as
in conjunction with an ATMEGA 328 Arduino server room. In order to overcome these problems, a
microcontroller to monitor the locking and unlocking process fingerprint door lock is designed as a replacement for the
of a door. Access is given to the user after a recorded finger regular safety conventional door locks. Fingerprint errors can
print is put on the sensor, the door slides open, and it closes also be detected by this device as well as shooting with a
after five seconds. The 16x2 Liquid Crystal Display (LCD) camera simultaneously so that the device helps to enhance the
shows the individual's name along with the registered office security to its maximum level. The data obtained with
fingerprint during this process. Access is refused if an an error percentage below 5% in testing the door lock tool
unregistered fingerprint is detected. and the data obtained error percentage 100% for the
fingerprints which are not registered.
[11] In our everyday lives, home and building security
are major concerns, and wireless smart door locks (DSDL) [14] This door locking system project suggest the way of
have become an integral part of these systems. The aim of unlocking a door using fingerprint. Most of the door lock
this paper is to develop and implement a safe DSDL that can systems have many loopholes which could be easily broke
grant access to a home using a fingerprint. For the down and it creates a concern for a proper working
lock/unlock door based on finger print, an Arduino Nano environment and secure lifestyle. One of the most reliable
microcontroller module, finger print sensor, and servo motor biometric features having a wide range of applications is
were used. The DSDL is a user authentication and validation fingerprint. It provides tools to enforce reliable system
system that automatically authenticates and validates users transaction logs as well as protect an individual’s privacy. In
for safe access. In comparison to existing systems on the order to provide access to the facility which is used by
domestic market, the implemented framework aims to build a multiple users, fingerprints of the authorized users are
cost-effective DSDL based on low-cost components. The enrolled and verified. A new user can be enrolled as well and
DSDL is a good rival to the di because of its ease of use and an old user can also be removed in the system.
cost effectiveness.
[15] Nowadays security has been a major issue in many
[12] In admittance control systems,identifications applications like banks, home security, institutions,
are the most basic operations. They are seperated into supermarkets etc., so that many research are focused to
contact and contactless procedures, as well as provide security for application. We can use biometrics to
identifying instruments such as PIN codes, magnet storage provide a high level security which includes fingerprint
media, fingerprints, and speech. Contactless smart cards scanner, voice recognition, face recognition, hand gesture
are used in the admittance control system because etc., Among these we are using fingerprint scanner to lock
the contactless memory medium has many advantages. and unlock the door because each person has their unique
Apart from keeping track of working hours, the computerized fingerprints. Two modes are enrolled in this technology
admittance management system often grants complete named master mode and user mode. The master mode has
control over access to specific areas (rooms).It allows for main key to register new fingerprint in which the user mode
the collection of data on arrival and departure times, as well compares the stored template to provide access to new users.
as a view of people's movement between different areas and
325
International Journal of Engineering Applied Sciences and Technology, 2021
Vol. 6, Issue 4, ISSN No. 2455-2143, Pages 323-327
Published Online August 2021 in IJEAST (http://www.ijeast.com)
Biometrics and embedded systems are the two technologies
we use to provide security in which the authorized users
biometrics is sensed through fingerprint sensor.
III. CONCLUSION
The fingerprint module scans the fingerprint and send the
microcontroller and verifies the scanned fingerprint with
stored fingerprint. When the fingerprint gets matched the
solenoid lock gets unlocked. The performed research allows
to draw a conclusion about the finger print door lock and thus
following conclusions are concluded by studying the review
papers
326