2. Content
• Abstract
• Introduction
• Literature
• Proposed system
• Block diagram
• Working procedure
• Advantages
• Application
• Conclusion
• Referances
3. Abstract
• According ancient Greek scripts BIOMETRICS means study of life. Biometrics
studies commonly include fingerprint, face, iris, voice, signature, and hand
geometry recognition and verification.
• Among these available biometric traits Finger Print proves to be one of the best
traits providing good mismatch ratio and also reliable.
• To provide perfect security and to make our work easier, we are taking the help of
two different technologies viz. EMBEDDED SYSTEMS and BIOMETRICS
4. Introduction
• Fingerprint identification with a unique, reliable, in the security field has been
widely used. This paper introduces design of remote monitoring intelligent system
based on fingerprint lock.
• The system can accurately identify lively fingerprint, and sent unlock ID
information, the illegal burglary information to the owner by the GSM network or
to the monitoring center of property management office by the PSTN.
5. Literature
• Fredrick (2014) presented attendance
management system that uses fingerprint
technology. The developed system implanted in a
fingerprint acknowledgment/verification system
that is based on minutiae points. Extracts of the
local characteristic (minutiae points template) of
a fingerprint was used.
• Hitachi (2004) worked on finger-vein-
authentication as a method to ensure security to
life and property. Two applications were
demonstrated for door-access control. The
techniques require users who want to access the
door to have identity number. Finger-vein details
are verified and authorization takes place
6. • Akhtar (2016) presents an IoT based
autonomous alarm and access control system
that can automatically switch on the alarm
system when the last person leaves the
premises. The solution is a combination of
hardware and software components;
distributed alarm and access control modules,
mobile App and a central server with database
connecting every object in the system
7. Proposed system
• Whenever Finger print module detects Authorized/Unauthorized person’s
finger print, automatically an SMS will be sent to owner and the same information
will be displayed on the 16X2 LCD which is interfaced with the controller. If a
person is authorized then only the door lock gets opened.
• This project uses two power supplies, one is regulated 5V for modules and
other one is 3.3V for ARDUINO. 7805 three terminal voltage regulator is used for
voltage regulation. Bridge type full wave rectifier is used to rectify the ac out put of
secondary of 230/12V step down transformer.
9. Working procedure
• The project is implemented by using advanced processor ARDUINO which is a 32
bit microprocessor; Finger Print Module and GSM modem together interfaced to
ARDUINO controller by serial communication. ARDUINO is an advanced version of
microprocessors and forms the heart of the system. Our project aims to implement the
Finger print based Access control system. GSM modem can be controlled by standard
set of AT (Attention) commands. These commands can be used to control majority of the
functions of GSM modem.
• In this project we are using ARDUINO. The ARDUINO are based on a 16/32 bit
ARDUINO-S™ CPU with real-time emulation and embedded trace support, together
with 128/512 kilobytes of embedded high speed flash memory. With a wide range of
serial communications interfaces, they are also very well suited for communication
gateways, protocol converters and embedded soft modems as well as many other
general-purpose applications.
10. Advantages
• ADVANTAGES:
1. Sophisticated security
2. No manual errors
3. No false intrusion
4. Need not remember any password
5. Others cannot steel the user’s entry key
6. Ease of maintenance
7. Less power consumption
8. Very faster communication
12. Conclusion
• We have implemented a locker security
system using FINGERPRINT, PASSWORD and
GSM. It is a low cost, low in power conception,
compact in size and standalone system.
• Future work of this paper is planned to a
develop security system based on Iris scanner
for visual identification of the person.
13. Referances
• [1] Mary Lourde R and Dushyant Khosla, ”Fingerprint
Identification in Biometric Security Systems” ,International
Journal of Computer and Electrical Engineering, Vol. 2, No. 5,
October, 2010.
• [2] D. Vinod kumar, Prof.M R K Murthy, “ Fingerprint Based
ATM Security by using ARM7”, IOSR Journal of Electronics and
Communication Engineering (IOSRJECE) ISSN : 2278-2834.
• [3] Hugh Wimberly, Lorie M. Liebrock, “Using Fingerprint
Authentication to Reduce SystemSecurity: An Empirical
Study”, 2011 IEEE Symposium on Security and Privacy.
• [4] Kumar Chaturvedula, “ RFID Based Embedded System for
Vehicle Tracking and Prevention of Road Accidents”,
International Journal of Engineering Research & Technology
(IJERT), Vol. 1 Issue 6, August – 2012.
• [5] Gangi.Raghu Ram, N.Rajesh Babu, “ Tracking objects using
RFID and Wireless Sensor Networks”ijesat] International
Journal Of Engineering science & Advanced technology