Mult-Pattern Fingerprint Security System
Mult-Pattern Fingerprint Security System
serial output, serial plotter for tracking various data, board Particulars: A fingerprint sensor can store data in the form
manager for managing the various boards connected to the of a finger image, which is a 2D image, and it can save 127 print
uploading device, and debug for identifying and fixing issues in spots. Six pins make up a fingerprint sensor; the first pin is used
the sketch. for the power supply, and the second pin is used for the ground
signal.
B. Microsoft SQL Server Management Studio
This studio is specifically designed to manage databases VI. METHODOLOGY
for any server or collection of servers. The Microsoft SQL
Server Management Studio (SSMS) is an open-source A. Login Forms
integrated environment used to manage, access, configure, and We gather information from the user in this portion of the
develop all necessary components of a Microsoft SQL Server, login form, including their preferred password and username.
Azure database, Azure VM, and many more. SQL is a Through development, we were able to store user data in the
structured query language that is used to define, manipulate, server-created login database by using the SQL Server
and control database records. Embedded SQL, on the other Management Studio path. Additionally, we were able to
hand, combines the computational power of programming establish a link between the login function and database under
language, like C++ in this case, with SQL's ability to the login page, which is coded to gather user data. The user
manipulate, define, and control data. SQL statements can be cannot access the authentication area of the security panel until
written directly into the source program, or the corresponding their login is complete. Please refer to figure (1)
programming language. Additionally, SQL Server offers many
authentication prompts.The open-source integrated B. Registration Catalog
environment development tool Microsoft Visual Studio is used After logging in successfully, the user can access the
to create computer programs. In this instance, we are using registration catalog, which is divided into three main sections:
Visual Studio to create a registration page and form page for the task section, the database grid view, and the registration
user manipulation and data entry. We were able to develop a section. Each section has its own specifications and priority.
form page by windows form page application (.NET The user must enter his personal information from the
framework) with the aid of Visual Studio. It can collect data registration area of the page. After enrolling, the user's data will
from users and store it in the database we built. Additionally, it be visible in the database grid view, and the search bar can be
supports multiple languages and a wide range of project types, used to look up specific users' data. To add new data, the
including cloud desktop, games, IOT, and many more. Visual registration process requires adding a fingerprint combination
Studio also offers applets for every facet of projects. in relation to the user ID. There will be two buttons in the task
section: one to save and another to change where.
C. Hardware Requirements
There are various variations of the Arduino programmable C. Fingerprint Scan Form
circuit board; for this project, we chose the ARDUINO UNO The user will now be able to add his fingerprint to the
R3 board, which is built on an ATmega328 microprocessor and system using the optical fingerprint sensor once his registration
a detachable dual inline package (DIP). There are 20 digital with a unique ID is complete. The ID entered in the registration
input/output pins on the Arduino Uno R3 microcontroller, of form will be visible in the biometric data pallet here in the
which 6 are PWM and the remaining 6 are analog. The power fingerprint storing form. As stated, this is the combination and
source for this microcontroller can come from an AC/DC uniqueness of the security system, and the user will be
adapter or a battery that has a voltage between 6 and 20 volts. mentioning his unique number in various aspects below the
Redbox available. After entering data into the textbox, the user
The microcontroller Atmega328 uses a maximum of will be asked to enter his various combinations of fingerprints
80mA when it is writing. to complete his enrollment by clicking the scan button below
the textbox for each different biometric data. After the user
With a maximum CPU speed of 20MHz, the ATmega328 successfully enters his fingerprints, the Redbox will turn into
microcontroller is an 8-bit AVR RISC microcontroller with green boxes that resemble in.
32kb of flash memory and 2kb of SRAM. There are two distinct
ATmega328 variants: ATmega328p. D. Fingerprint Checking Form:
This form is primarily used in the section labeled "Data
D. Fingerprint Scanner Modification," where users can edit information that will be
The optical fingerprint scanner is a device that uses a mirrored into the database after first authenticating themselves
digital camera to take a 2D image of a fingerprint. The camera using their biometric data in accordance with combinations they
passes light over the area where the fingerprint is to be kept, provide. The manner of verification is akin to the storing
capturing the fingerprint in the 2D image and storing it in the procedure; for every biometric piece of information, the scan
designated storage medium. The scanner's good high resolution button must be pressed in order to confirm the user's biometric
is measured in dots per inch (DPI). combination and to authenticate subsequent operations,
including adding new data or removing old data. Please see figure (1)
A. Architectural Design
D. Fingerprint Scan:
Fig 3: Fingerprint
This fingerprint scan page allows the user to submit four E. Fingerprint Check
different biometric data points by clicking the scan button. The Check form used to identify user identity using previously
biometric data is gathered from the registration pages. This recorded biometric data patterns. Initially, the user fills in each
page is accessed after the user has registered their basic text field with their unique pin for fingerprint data. The
information. The unique ID they have provided will serve as fingerprint scanner receives the response from the user when
their biometric data ID. Every biometric piece of information they press the corresponding finger I.D. scan button, allowing
must be submitted by the user. Once the system has accepted it, it to identify biometric information. If all four biometric entries
the information is saved in the database in byte format using the are successfully reviewed and verified after a sequence of
biometrics the user entered. Thus, the administrator can see the entries, the user can access the submission and proceed with
data in the database as bytes and the data. additional processing. The form has an I-D box with the
corresponding I-D of the user's details in it. Here, I've used a
box to map an attribute to each of the four fingerprints I have in
my finger data table.
F. Arduino to Sensor Connectivity [4]. Mingxing, HE, HORNG, Shi-Jinn, FAN, Pingzhi, et al.
This connection shows that the Arduino board has14 Performance evaluation of score level fusion in
digital inputs/outputs (six of which can be used as PWM multimodal biometric systems. Pattern Recognition,
outputs), 6 analog inputs, and a 16 MHz ceramic resonator. We 2010, vol. 43, no 5, p. 1789-1800.
have connected a 5 volt sensor to its corresponding Arduino [5]. Meiru Mu, QiuQi Ruan and Yongsheng Shen,
socket, a ground pin from the sensor to the corresponding "Palmprint Recognition Based on Discriminative Local
Arduino Uno ground, a transfer data pin fingerprint to the Binary Patterns Statistic Feature," Signal Acquisition
corresponding Arduino receiving data pin, and a receiving data and Processing, 2010. ICSAP '10. International
pin from the sensor to the corresponding Arduino Uno transfer Conference on, pp. 193-197, 9-10 Feb. 2010.
data pin. [6]. Sanchez-Reillo.R ,Sanchez-Avila.C and Gonzalez-
Marcos.A, "Biometric identification through hand
VIII. RESULTS AND DISCUSSION geometry measurements," Pattern Analysis and
Machine Intelligence, IEEE Transactions on, vol. 22, no.
Future Works: 10, pp. 1168-1171, Oct2000
[7]. Saropourian.B, "A new approach of finger-print
Enhancing the UI and UX design recognition based on neuralnetwork," Computer Science
Including gestures that make the work of the user easy and and Information Technology, 2009. ICCSIT 2009.2nd
convenient. IEEE International Conference on, pp. 158- 161, 8-11
Optimizing the data collection much faster. Aug. 2009.
In the purpose of automation and the use of machine
learning is to predominantly reduce the time complexity
even more.
Surpassing the use of databases by cloud storage because
databases might cost large amounts of data.
Increase in use of this security system in various fields such
as home security and many more.
Enhancement of fingerprint scanner with high FAR (false
acceptance rate).
Development of mobile applications for different use cases.
Integrating the same methodology with other biometric
modalities.
IX. CONCLUSION
REFERENCES