0% found this document useful (0 votes)
28 views

Bago Arduino Paynal

The document summarizes a fingerprint-based locker system using Arduino that aims to provide secure storage for possessions while reducing theft. The system works by capturing a user's fingerprint during enrollment and requiring a fingerprint match to unlock an electronic lock on the locker. The system uses an Arduino board, fingerprint scanner, LCD display, buzzer, and solenoid door lock. It aims to provide a more accurate and cost-effective security solution compared to traditional padlocks.

Uploaded by

Nicole Mariano
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

Bago Arduino Paynal

The document summarizes a fingerprint-based locker system using Arduino that aims to provide secure storage for possessions while reducing theft. The system works by capturing a user's fingerprint during enrollment and requiring a fingerprint match to unlock an electronic lock on the locker. The system uses an Arduino board, fingerprint scanner, LCD display, buzzer, and solenoid door lock. It aims to provide a more accurate and cost-effective security solution compared to traditional padlocks.

Uploaded by

Nicole Mariano
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 10

Fingerprint-Based Locker System studies on biometrics have

Using Arduino shown that compared to the


hand method, fingerprinting is
I. Introduction
a more accurate and cost-
One of the biggest issues effective incoming
in workplaces and institutions fingerprint. The duplication
is theft. In order to reduce of biometric fingerprint
these occurrences, several technology is virtually
security Documents and impossible, with only one in
possessions were completed one billion of a chance.
most colleges and Offices Biometric security guarantees
employ cabinets and lockers to a positive method of user
store and secure documents. identification with something
possessions and the privacy- that cannot be lost,
preserving storage of crucial replicated, or stolen.
documents also for security Fingerprint-based door lock
reasons. Nevertheless, some system can achieve all these
lockers utilized common shared features.
by two or more individuals
were padlocks. Common Lockers
do not ensure complete
property safety and security. According to Suhag (2016),
because a forceful opening of
a standard padlock is Fingerprint-based systems are
widely used in both forensic
possible.
and civilian applications.
A Fingerprint based When compared to other
locker system using Arduino is available biometric feature-
a process of verifying the matching systems,
fingerprint-based biometrics
fingerprint image to open the
are the most developed and
electronic lock. This project
have the biggest market
highlights the development of share.
fingerprint verification.
Verification is completed by Biometrics are rising as
comparing the data of the an advanced layer to many
authorized fingerprint image personal and enterprise
with the image. Then the security systems. With the
information of the incoming unique identifiers of your
fingerprint image will undergo biology and behaviors, this
the comparison process to may seem foolproof. However,
compare with the authorized biometric identity has made
fingerprint image. Recent
many cautious about its use as a fingerprint match to reopen
a standalone. the locker door, ensuring that
only the renter can open the
Modern cybersecurity is
locker door to remove its
focused on reducing the risks
contents. This system not only
for this powerful security
reduces the trouble for
solution traditional passwords
customers to bring the key but
have long been a point of
also increases the trust and
weakness for security systems.
security for customers. The
Biometrics aims to answer this
implementation process and
issue by linking proof-of-
system recognition rate for
identity to our bodies and
the storage locker system are
behavior patterns Human
examined in this study.
fingerprints are detailed,
nearly unique, difficult to
alter, and durable over the II. Conceptual Framework
life of an individual, making /Structure
them suitable as long-term
markers of human identity.
They may be employed by police
or other authorities to
identify individuals who wish
to conceal their identity or
to identify people who are
incapacitated or deceased and
thus unable to identify
themselves, as in the
aftermath of a natural
disaster.

According to Lay, Yang, and


Tsai (2011) entitled
“Biometric Locker System”
Storage locker system is for
temporarily keeping the goods.
The study implements a storage
locker system with the
technique of fingerprint
recognition as the way to open
and close the lock. The system
captures the fingerprint of
the locker renter and requires Whenever the enrolled print
matches the current
fingerprint, the scanner sends to provide a user interface.
those signals to the Arduino Liquid crystal displays (LCDs)
Uno. The Arduino in turn sends are commonly used to display
the signal to the solenoid door data in devices such as
lock to unlock if the calculators, microwave ovens,
fingerprint matches. and many other electronic
devices.

III. Material Used


Alarm Sensor- The
Arduino buzzers
Arduino- Arduino
are most commonly
UNO is a low-
used as beepers
cost, flexible,
in any system,
and easy-to-use
Alarm devices,
programmable
timers, security
open-source
systems and to produce sound
microcontroller board that
on confirmation of user input
can be integrated into a
in many systems. The buzzers
variety of electronic
are of different types such as
projects. This board can be
Mechanical buzzers,
interfaced with other Arduino
Electromechanical buzzers and
boards, Arduino shields, and
Piezoelectric buzzers.
Raspberry Pi boards and can
control relays, LEDs, servos, Battery- A battery
and motors as an output. is a device that
stores chemical
Fingerprint
energy, and converts
Scanner- A it to electricity.
fingerprint This is known as
scanner can be electrochemistry and the
defined as a system that underpins a
biometric security battery is called an
device that identifies and electrochemical cell.
authenticates an individual's
fingerprint to identify them. Solenoid- A Solenoid
is a coil that when
LCD Display- You energized, produces a
can easily controlled magnetic
interface a field down through
liquid crystal its center. By
display (LCD) placing a magnetic
with an Arduino armature inside that field,
the armature can move in or 4. Future researchers. The
out of the coil. results of the study can be
utilized as a foundation of
reference for future research
initiatives regarding the
Fingerprint-based locker
system using Arduino.

IV. Significance of the Study V. Risk Factor


The significance of the study Power interruption/Power
about the fingerprint-based Failure – Arduino systems rely
locker system using Arduino on electricity to function. In
lies in its potential to the event of a power failure
revolutionize traditional or low battery, users might
security measures and provide face difficulties accessing
numerous advantages to users: the locker.

1. Teachers. This project will Hit by any hard, sharp objects


help teachers feel safe most – When the system got hit by
of the time when they are sharp objects there’s a chance
inside their offices. to damage the fingerprint.
Fingerprint based locker Technical Issue – When the
system using Arduino will also system can experience a
help the documents and other technical problem or sometimes
important things to be kept it can encounter some bugs.
safe and cannot be stolen
easily by intruders. Short circuit – when an
2. School. This output will be electric current flows down
beneficial to the school the wrong or unintended path
because of the knowledge about with little to no electrical
the enhancement of the resistance.
security system. Finger Print not readable – It
3. Students. This study will is possible for the lock to
assist students in deciding fail to recognize your
whether or not to use this as fingerprint. This can happen
a basic assembly, particularly due to oily fingers or in case
Information Technology the lock is dirty.
students.
False Acceptance/Rejection - and resulting in stronger and
Biometric systems, including more accurate matching of
fingerprint scanners, are not minutiae. For Fingerprint
perfect. There is a thinning, the Block Filter is
possibility of false used, which scans the image at
acceptance (allowing the boundary to preserve the
unauthorized access) or false quality of the image and
rejection (denying legitimate extract the minutiae from the
access). Factors like dirt, thinned image. The false
sweat, or changes in the matching ratio is better
user's fingerprint due to compared to the existing
injuries can impact accuracy. algorithm.
V. Review of Related Review
Local Literature Foreign Literature
According to Tod Abamonga, J. According to Bhatia, D.
S. Q. (2018). The security of (2019) high-security areas or
the fingerprint authentication locker rooms for banks,
system relies on the integrity traditional lock systems,
and authenticity of the passwords, etc., were
biometric information. employed. However, these
Therefore, careful evaluation systems were found to be not
must be done for the selection perfectly secure. After
of fingerprint authentication advancements in technology,
and good practices should be RFID cards were used. These
followed during the cards however were not much
implementation, enrollment, useful for the user due to
and administration of the chances of getting lost,
fingerprint authentication stolen, and forgotten. The
system. In this paper, we purpose of this study is to
intend to propose a high-speed provide high security for such
method for fingerprint high-end security
recognition based on minutiae applications. The aim of this
matching, which, unlike study is to design a smart
conventional minutiae matching door access system using a
algorithms, also takes into fingerprint module. The use of
account region and line this device is to provide
structures that exist between access to only authorized
minutiae pairs, allowing persons.
getting more structural
The use of biometric
information of the fingerprint
authentication systems for
access control has become system. This is the ideal
increasingly popular in recent option for avoiding the
years due to their high hassles of a stolen or lost
security and convenience. One key or illegal access. The
of the most widely used authorized user must register
biometric technologies is his or her fingerprint in the
fingerprint recognition, which system. The registered
is based on the unique pattern person's mobile number is then
of ridges and valleys on an added to GSM, and a permanent
individual's fingertip. image password is assigned to
Several studies have been this user. As a first step,
conducted on fingerprint the unauthorized individual
recognition systems, and must choose unauthorized as
various techniques have been the user type. The admin
developed to improve their receives a random picture.
accuracy and reliability. One
study by (Jain, Chen, &
Demirkus, 30 November 2006)
analyzed the performance of VI. Questionnaire
different fingerprint
recognition algorithms and Cost Analysis
found that the minutiae-based
approach, which extracts and The costs of each individual
matches minutiae points on the component are listed here:
fingerprint, is the most
reliable and accurate Components Quantity Price
technique. Arduino Uno 1 ₱177
Fingerprint 1 ₱382
Meenakshi et al. has proposed LCD Display 1 ₱149
an “Arduino” Based Smart Alarm 1 ₱60
Fingerprint Authentication Censor
System”. fingerprint locking Battery 1 ₱100
system is a locking system
Solenoid 1 ₱387
that uses a fingerprint sensor
Lock
module to secure the user's
Jumper wire 10 ₱49
fingerprint. The fingerprint
- Total: ₱1,304
sensor module uses an Arduino
or a Raspberry Pi to operate.
In the proposed system, there
is three-level security. Any
two levels of security users
have to face to unlock the
Name (Optional): ________________________________________________
Type of Respondents:

 Teachers
 School
 Students
Directions: For each statement in the survey, please indicate in the box how much you will rate
the acceptability of the product by putting a check () in the box on the right side of each
statement. There are no right or wrong answers. Your answers will be kept strictly confidential
and you will not be identified.

Scale:
5 – Extremely Acceptable
4 – Very Acceptable
3 – Somewhat Acceptable
2 – Slightly Acceptable
1 – Not Acceptable
A. Functional Suitability
Indicators 5 4 3 2 1
Completeness The sets of functions cover all the specified tasks
and user objectives.
Correctness The function generates the correct results with the
needed degree of precision.
Appropriateness The Function Facilities Accomplished specified tasks
and objectives.
B. Portability
Indicators 5 4 3 2 1
Install ability Is the locker system designed to be easily installed
and set up by individuals with basic technical
knowledge, without the need for specialized
expertise?
C. Usability
Indicators 5 4 3 2 1
Appropriateness Have you conducted recognition speed testing to
Recognizability ensure the system meets acceptable response times
for users?
Learnability Users can easily learn how the system works
with efficiency and effectiveness in
emergencies.

Operability Users can use it comfortably and effectively,


and the product aligns well with their needs and
intended tasks.
User Error The system can provide visual cues or
Protection notifications if they are about to perform an
action that could lead to an error.

D. Performance Efficiency
Indicators 5 4 3 2 1
Time Behavior The product or system is performing within the
specified or expected performance parameters
for these metrics.
Resource The product or system utilizes to carry out its
Utilization intended functions efficiently and effectively
while meeting specific performance
requirements.
Capacity The product or system has been designed,
developed, and tested in a way that it can
handle values up to those maximum limits
without experiencing critical failures,
performance degradation, or violating any
essential specifications.

E. Durability
Indicators 5 4 3 2 1
Durability The Fingerprint-Based Locker System Using
Arduino can still work even if it’s Blackout.

F. Cost-efficiency
Indicators 5 4 3 2 1
Affordability The Fingerprint-Based Locker System is
affordable to the users.
References
[1]. What are Biometrics? How is it used in security? (2023,
April 19).www.kaspersky.com.https://www.kaspersky.com/resource-
center/definitions/biometricsauthentication.
[2]. Wikipedia contributors. (2023). Fingerprint. Wikipedia.
https://en.wikipedia.org/wiki/Fingerprint.
[3]. Y. L. Lay, H. J. Yang, and C. H. Tsai, “Biometric locker
system,” in Proc. the World Congress on Engineering and Computer
Science, vol. 1, San Francisco, USA, October 2011.

[4]. Abamonga, J. S. Q. (2018). Fingerprint authentication using


minutiae score matching algorithm.
https://ejournals.ph/article.php?id=14016
[5]. Bhatia, D. (2019). A smart door access system using finger
print biometric system. International Journal of Medical
Engineering and Informatics, 6(3), 274.
https://doi.org/10.1504/ijmei.2014.063175
[6.] K. Jain, Y. Chen and M. Demirkus, "Pores and Ridges: High-
Resolution Fingerprints Matching Using Level 3 Features," in IEEE
Transactions on Pattern Analysis and Machine Intelligence, vol.
29, no. 1, pp. 15-27, Jan. 2007, Accessed 11.05.2023.
[7]. Meenakshi, N, M Monish, K J Dikshit, and S Bharath. “Arduino
Based Smart Fingerprint Authentication System.” In 2019 1st
International Conference on Innovations in Information and
Communication Technology (ICIICT), 1–7. CHENNAI, India: IEEE,
2019.
(8.) (n.d.). Scribd.
https://www.scribd.com/document/546238311/RRL-Biometric

You might also like