Sale!

DESIGN AND SIMULATION OF A SMART BIOMETRIC ACCESS CONTROL SYSTEM USING FINGERPRINT AUTHENTICATION

The aim of this work is to design and simulate a device that utilizes fingerprint recognition technology to allow access.

Original price was: ₦ 5,000.00.Current price is: ₦ 4,999.00.

Description

Authentication plays a very critical role in security-related applications like e-commerce. There are a number of methods and techniques for accomplishing this key process. In this regard, biometrics is gaining increasing attention these days. Security systems, having realized the value of biometrics, use biometrics for two basic purposes: to verify or identify users. There is a number of biometrics and different applications need different biometrics. Biometric is the most secure and convenient authentication tool. It cannot be borrowed, stolen, or forgotten and forging one is practically impossible. Biometrics measure individual’s unique physical or behavioral characteristics to recognize or authenticate their identity. Common physical biometrics includes fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral characters characteristics include signature, voice, keystroke pattern, and gait. Project deals with Identification, Authentication and Setup of Security System using SM 630 Biometrics and arduino Microcontroller. Beside Biometrics and arduino Microcontroller the major components required are LCD, Relay section (for opening and closing of security doors).

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENT

CHAPTER ONE

  • INTRODUCTION
  • BACKGROUND OF THE PROJECT
  • STATEMENT OF THE PROBLEM
  • AIM AND OBJECTIVES OF THE PROJECT
  • SIGNIFICANCE OF THE PROJECT
  • SCOPE OF THE PROJECT
  • APPLICATION OF THE PROJECT
  • DEFINITION OF TERMS
  • PROJECT ORGANISATION

CHAPTER TWO

LITERATURE REVIEW

2.0      LITERATURE REVIEW

2.1      REVIEW OF FINGER PRINT

2.2      THE HISTORICAL BACKGROUND OF FINGERPRINTS

2.3      FINGERPRINT RECOGNITION

2.4       PATTERNS OF FINGERPRINT

CHAPTER THREE

3.0      MATERIALS AND METHOD
3.1      MATERIALS USED

3.2      METHOD

3.3      SIMULATION

CHAPTER FOUR

4.0       RESULT ANALYSIS

4.1      RESULT

4.2      DISCUSSION

CHAPTER FIVE

  • CONCLUSIONS
  • RECOMMENDATION

5.3     REFERENCES

Appendix A: user’s guide

 

CHAPTER ONE

  • INTRODUCTION

1.1                                          BACKGROUND OF THE PROJECT

The general trend of human nature always longing for security Physically, Mentally and Socially. Fingerprint based security access control and time attendance systems are used for all kinds of office and service sector operations in the day today environment. Fingerprint System based access control is more secured as compared to the conventional swipe card or ID cards because of the exclusive fingerprint for every entity (Engert et al., 2024).

Fingerprint Security Systems have fascinated people for centuries. They have been used as a method of personal identification since ancient times. The two key aspects of most of the Fingerprint System biometric solutions are Finger Print identification and authentication. The process of identification tells you who an individual is, or in the negative sense tells you who they are not. Fingerprints Security is examined using two different sets of criteria. One way of looking at Fingerprint Security System is using their “Class Characteristics”.

Finger Print Security Systems can be used to get rid of so many issues such as Physical Access Control, Health care Biometrics, Fingerprint and Biometrics Locks, Biometric Sensors and Detectors, RFID Tags (Johnson et al., 2023).

RFID Readers, Road Barriers, RFID Smart Card, CCTV, Metal Detectors, LED Search Lights, Fire Alarm, Finger Print Movement Control, Physical Access Control, Optical Fingerprint Scanners, Optical Sensors, Card Locks Card Access Control Systems, Fingerprint Technology, Digital Fingerprint, USB Fingerprint Reader etc.

Fingerprint System Authentication is a simpler process. It involves affirming or rejecting a claimed identity by matching a live template with an existing one. Most of these identification/ authentications are done by using Smart Card. The large growth of ID – Card based Fingerprint system security is wildly used in Public service applications (Fiebig et al., 2024). These cards are used for multiple purpose applications such as Digital parking meters, telephone, vending machines, ATM Cards, Digital Fingerprint Security System Identity, Personal Identification Verification Number etc.

Another kind of Fingerprint System is the scanner using ultrasound. The process involves high frequency sound to identify a fingerprint. An advantage of ultrasound sensors is that they are not affected by external hindrances like dirt on a finger. Thermal Fingerprint Security System Scanners work by measuring temperature differences used for a variety of security and data-collection purposes, from identifying prisoners to allowing access to information or high-security areas (Ashbaugh etal., 2023).

1.2                                  PROBLEM STATEMENT

Problems with the convention lock are; they are easy to pick if intruders don not have a key. If intruders have the key then it is very easy to gain an access anytime which lead to the change of the lock. Furthermore it is very easy to duplicate. Having a combination door lock is a better idea; using this type of lock will eliminate the need of having a key but create other issues, like forgetting People use human characteristics to identify each other such as face, voice and, gait for thousand years. Alphonse Bertillon, chief of criminal identification division of the police department in Paris, came up with the idea of using a number of body measurements to spot criminal in the mid-19 century. This idea started to gain popularity and it led the discovery of the human fingerprint. Fingerprint or palm is part of the science known today as biometrics. Biometrics is identification of a person based on the person’s distinctive physiological, anatomical and or behavioral characteristics. Biometrics was invented to enhance security and reduce financial fraud [Jain, 2014].

Security systems are vital for protection of information, property, and prevention from theft or crime. From data centers to banks; security systems have become a necessity. Home security systems are also or commercial security system. Lock protects the life and properties of everyone in today’s world. Where the rate of crime and theft are exponential increasing everyday everyone need to use the lock. Throughout history people used lock for the same reason people using it today, which is security. This work will discuss the framework of protection system using biometric – fingerprint, which came to solve the problem seen in other means of locking system.

1.3                                   AIM AND OBJECTIVES OF THE PROJECT

The aim of this work is to design and simulate a device that utilizes fingerprint recognition technology to allow access.

The objectives of the study are:

  1. To design and simulate the system prototype.
  2. To increase the security level to prevent anØ unauthorized unlocking of the door
  • To study the application and different types of biometric
  1. To give user more secure yet cost-efficient way of door locking system

1.4                                   SCOPE OF THE STUDY

The scope of this work covers the design and simulation of a smart access control system using finger print. Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of finger print door lock system.

1.5                            SIGNIFICANCE OF THE STUDY

This study will throw light on the uniqueness of biometric system used in the lock system. This study will expose and demonstrate evolvement of the lock form a very simple piece of wood to an electronic lock and brief introduction to biometrics-fingerprint. This study will enlighten the reader on how biometric technology can provide reliable user authentication, which plays an integral role in providing secure locking system.

1.6                                          APPLICATIONS OF THE PROJECT

  1. Industrial application: “Fingerprint based security system” project can be used by the employees, staff or workers in various industries like Automobile industries, manufacturing industries, Software development companies.
  2. Home or domestic application: This project can be used to automate the door locking process at our home, so the user need not to carry the door lock keys along with him, he can just use his/her finger to open the door.
  3. Bank Lockers or security safes: Many of the banks use key based or password based locks for their lockers or safes. We can implement Fingerprint based bank locker system using this project.

1.7                                                  DEFINITION OF TERMS

Algorithm A limited set of well-defined instructions to solve a task, which leads reliably from a given starting point to a corresponding identifiable end point. It can also be described as a systematic procedure for carrying out a calculation or solving a problem in a limited number of stages. Many algorithms can be implemented as computer programs. In biometric systems, specific algorithms are used, for example, to indicate how a smart card determines whether the input fingerprint matches the template stored on the card or in the database.

ANSI 378 Refers to interoperability standard for fingerprint templates developed by the American National Standards Institute (ANSI). The US governmental requires the use of ANSI 378 templates for Homeland Security Directive (HSPD-12) and Personal Identity Verification (PIV). The US Federal requirements for ANSI 378 are designed to ensure that all employees and contractors are able to use their badges for identification and access to all government facilities.

Automated Fingerprint Identification System (or AFIS) is a system to automatically match one or many unknown fingerprints against a database of known prints. This is done for miscellaneous reasons, not the least of which is because the person has committed a crime. With greater frequency in recent years, AFIS like systems have been used in civil identification projects. (Wikipedia.org)

Authentication Any systematic method of confirming the identity of an individual. Some methods are more secure than others. Simple authentication methods include user name and password, while more secure methods include token-based one-time passwords. The most secure authentication methods include layered or “multi-factor biometric procedures. This is independent of authorization.

Authorization The administration of person-specific rights, privileges, or access to data or corporate resources.

Biometrics The automatic recognition of persons based on unique combinations of measurable physical or behavioral characteristics. Examples include fingerprints, iris scanning, face and voice recognition, or hand geometry. All of these biometric techniques are differentiated by speed, durability, reliability, and cost effectiveness. Fingerprints are generally considered the most practical biometric identifier in use today.

1.8                                         PROJECT WORK ORGANISATION

The various stages involved in the development of this project have been properly put into five chapters to enhance comprehensive and concise reading. In this project thesis, the project is organized sequentially as follows:

Chapter one of this work is on the introduction to this study. In this chapter, the background, significance, objective limitation and application of the study were discussed.

Chapter two is on literature review of the study. In this chapter, all the literature pertaining to this work was reviewed.

Chapter three is on design methodology. In this chapter all the method involved during the design and construction were discussed.

Chapter four is on testing analysis. All testing that result accurate functionality was analyzed.

Chapter five is on conclusion, recommendation and references.

CHAPTER FIVE

5.1                                                           CONCLUSION

This study focused on smart biometric access control system using a simple biometric structure to protect homes from unauthorized access to their houses. The fingerprint sensor match will activate the relay that controls the opening and closing of the door. It provides authentication to users and only genuine users can be permitted to start the vehicle. The system can be a better substitute for Key, smartcard and password, which could not eliminate impersonation. The device was simulated, prototype was constructed, tested and obtained satisfactory results. The system’s performance was evaluated using a statistical measure for the performance of a binary classification test. Its future applications could be achieved in many areas for developing very high-security systems. These areas may include punch card system, ATM system, bank locker system, and vehicle’s electronic safe.

5.2                                                    RECOMMENDATION

This project can be used for security since it overcomes all the draw backs of ordinary security machine. It provides additional security. Its main advantage is that since fingerprints of every person is unique and hence this system completely reduces the chance of invalid votes. The system can be manufactured simply as well as cheap.

This work was built with quality wiring and contains many connections, I recommend that if failure occur, it should be troubleshoot by a qualify personnel along with the circuits diagram.

This project was built for Educational purposes. If one wants to use it for industrial or home applications, I recommend that a hook should be attached to the casing that would allow fixing the system on the wall.