[go: up one dir, main page]

0% found this document useful (0 votes)
59 views5 pages

Mult-Pattern Fingerprint Security System

To improve security measures, a multi-pattern fingerprint security system is proposed in this study. To offer sophisticated security features, the suggested system combines a database, an Arduino Uno board, and a fingerprint sensor. Because of the way the system is designed, it may keep multiple fingerprint patterns in the database, which adds to its adaptability and versatility.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views5 pages

Mult-Pattern Fingerprint Security System

To improve security measures, a multi-pattern fingerprint security system is proposed in this study. To offer sophisticated security features, the suggested system combines a database, an Arduino Uno board, and a fingerprint sensor. Because of the way the system is designed, it may keep multiple fingerprint patterns in the database, which adds to its adaptability and versatility.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR375

Mult-Pattern Fingerprint Security System


S. Mangalapriya1; Nithyanantham R2.; Arvindhan G.3
Assistant Professor 1; Research Scholar2,3
Veltech High-Tech, Engineering College, Avadi- 600028

Abstract:- To improve security measures, a multi-pattern III. EXISTING SYSTEM


fingerprint security system is proposed in this study. To
offer sophisticated security features, the suggested system Fingerprint security systems provide numerous services
combines a database, an Arduino Uno board, and a and benefits, including biometric door locks, time and
fingerprint sensor. Because of the way the system is attendance systems, mobile devices, payment systems, and
designed, it may keep multiple fingerprint patterns in the border control. These systems are long-term and continuously
database, which adds to its adaptability and versatility. used for specific security and purpose-related purposes;
however, they also have many drawbacks, including limited
The Arduino Uno board functions as the client in the applications, privacy and hygiene concerns, and accuracy
proposed system's client-server architecture, while the issues. We tended to develop the suggested system in order to
database serves as the server. The user's fingerprints are address every problem.
captured by the fingerprint sensor, which then transmits
the information to the Arduino Uno board for processing.  Disadvantages
After that, the Arduino Uno board transmits the fingerprint
information to the database for authentication and storage.  Absence of variety and originality
Additionally, the system has a graphical user interface  Minimal confirmation of safety or security
(GUI) that.  Security can be readily compromised or skewed by
employing well-known methods like master prints, brute-
Keyword:- Fingerprint, Arduino, SQL, Multi-Pattern, Security force attacks, etc.
System.
IV. PROPOSED SYSTEM
I. INTRODUCTION
The "Multi-pattern fingerprint security system" that is
An inventive way to improve security measures is the being suggested improvises the fingerprint recognition process
multi-pattern fingerprint security system. For enhanced security by combining many fingerprints to create a complicated pattern.
features, this system combines a database, an Arduino Uno Consequently, the system makes use of an Arduino UNO board
board, and a fingerprint sensor. Multiple fingerprint patterns to access the data. Data is gathered from a fingerprint scanner
can be kept in the system's database thanks to its design, which by the user of several fingers in succession, applied, or saved
boosts the system's adaptability and versatility. The suggested onto the data in a SQL server database, allowing for the
technique is affordable and simple to include into the security modification of The accompanying pictures and code provide a
systems that are already in place. It can be applied in a number brief explanation of the suggested system. Finger data requires
of settings, such as government buildings, banks, and medical authentication of the individual who has been the user in this
facilities, where cutting-edge security measures are crucial. instance. Thus, accessibility, cost-effectiveness, and data
security are all favored by this breakthrough. Additionally, the
II. PROBLEM STATEMENT system distinguishes the security system greatly from the
customary or current system.
The numeric security system, or pin-based security
system, that is now in use in lockers, ATMs, and other types of V. REQUIREMENT ANALYSIS
protection lacks uniqueness in its digit pattern, making it readily
cracked by brute force attack, dictionary search, and other A. Software Requirements
methods. By entering the possibility 1234, we are able to carry An open-source program called the Arduino integrated
out 10% of the possibilities to crack a pin-based security pin, development environment (IDE) is used to upload programs to
making the possibilities easily crackable and the values of pins any programmable circuit board that can perform a certain
not unique. In contrast, the probability of a number between 0 function. The IDE is useful for developing programmable code
and 9 is increased when 0.01% of 100 people select the same because it has several layouts, such as a sketchbook for writing
number, indicating that the pin-based system is not unique and programs in text using a C++ variant, library management for
is easily crackable. With security system advancements, managing, finding, and updating internal and external libraries
biometric security. to be included in the sketches, serial monitor for monitoring

IJISRT24MAR375 www.ijisrt.com 849


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR375

serial output, serial plotter for tracking various data, board Particulars: A fingerprint sensor can store data in the form
manager for managing the various boards connected to the of a finger image, which is a 2D image, and it can save 127 print
uploading device, and debug for identifying and fixing issues in spots. Six pins make up a fingerprint sensor; the first pin is used
the sketch. for the power supply, and the second pin is used for the ground
signal.
B. Microsoft SQL Server Management Studio
This studio is specifically designed to manage databases VI. METHODOLOGY
for any server or collection of servers. The Microsoft SQL
Server Management Studio (SSMS) is an open-source A. Login Forms
integrated environment used to manage, access, configure, and We gather information from the user in this portion of the
develop all necessary components of a Microsoft SQL Server, login form, including their preferred password and username.
Azure database, Azure VM, and many more. SQL is a Through development, we were able to store user data in the
structured query language that is used to define, manipulate, server-created login database by using the SQL Server
and control database records. Embedded SQL, on the other Management Studio path. Additionally, we were able to
hand, combines the computational power of programming establish a link between the login function and database under
language, like C++ in this case, with SQL's ability to the login page, which is coded to gather user data. The user
manipulate, define, and control data. SQL statements can be cannot access the authentication area of the security panel until
written directly into the source program, or the corresponding their login is complete. Please refer to figure (1)
programming language. Additionally, SQL Server offers many
authentication prompts.The open-source integrated B. Registration Catalog
environment development tool Microsoft Visual Studio is used After logging in successfully, the user can access the
to create computer programs. In this instance, we are using registration catalog, which is divided into three main sections:
Visual Studio to create a registration page and form page for the task section, the database grid view, and the registration
user manipulation and data entry. We were able to develop a section. Each section has its own specifications and priority.
form page by windows form page application (.NET The user must enter his personal information from the
framework) with the aid of Visual Studio. It can collect data registration area of the page. After enrolling, the user's data will
from users and store it in the database we built. Additionally, it be visible in the database grid view, and the search bar can be
supports multiple languages and a wide range of project types, used to look up specific users' data. To add new data, the
including cloud desktop, games, IOT, and many more. Visual registration process requires adding a fingerprint combination
Studio also offers applets for every facet of projects. in relation to the user ID. There will be two buttons in the task
section: one to save and another to change where.
C. Hardware Requirements
There are various variations of the Arduino programmable C. Fingerprint Scan Form
circuit board; for this project, we chose the ARDUINO UNO The user will now be able to add his fingerprint to the
R3 board, which is built on an ATmega328 microprocessor and system using the optical fingerprint sensor once his registration
a detachable dual inline package (DIP). There are 20 digital with a unique ID is complete. The ID entered in the registration
input/output pins on the Arduino Uno R3 microcontroller, of form will be visible in the biometric data pallet here in the
which 6 are PWM and the remaining 6 are analog. The power fingerprint storing form. As stated, this is the combination and
source for this microcontroller can come from an AC/DC uniqueness of the security system, and the user will be
adapter or a battery that has a voltage between 6 and 20 volts. mentioning his unique number in various aspects below the
Redbox available. After entering data into the textbox, the user
The microcontroller Atmega328 uses a maximum of will be asked to enter his various combinations of fingerprints
80mA when it is writing. to complete his enrollment by clicking the scan button below
the textbox for each different biometric data. After the user
With a maximum CPU speed of 20MHz, the ATmega328 successfully enters his fingerprints, the Redbox will turn into
microcontroller is an 8-bit AVR RISC microcontroller with green boxes that resemble in.
32kb of flash memory and 2kb of SRAM. There are two distinct
ATmega328 variants: ATmega328p. D. Fingerprint Checking Form:
This form is primarily used in the section labeled "Data
D. Fingerprint Scanner Modification," where users can edit information that will be
The optical fingerprint scanner is a device that uses a mirrored into the database after first authenticating themselves
digital camera to take a 2D image of a fingerprint. The camera using their biometric data in accordance with combinations they
passes light over the area where the fingerprint is to be kept, provide. The manner of verification is akin to the storing
capturing the fingerprint in the 2D image and storing it in the procedure; for every biometric piece of information, the scan
designated storage medium. The scanner's good high resolution button must be pressed in order to confirm the user's biometric
is measured in dots per inch (DPI). combination and to authenticate subsequent operations,

IJISRT24MAR375 www.ijisrt.com 850


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR375

including adding new data or removing old data. Please see figure (1)

VII. SYSTEM DESIGN

A. Architectural Design

Fig 1: Workflow of the System

This is the project's architectural or model design. This is B. Login Form


similar to the process workflow, in which the user provides This is the login form, where the user needs to enter the
fingerprint data, which is processed by an Arduino board. The correct password and username in order to log in. This is the
data is then stored in a database for each process, including login page where the system identifies any users that have been
updating and deleting information. The process then opens up allocated to it. As a result, the user's information (username and
to verify the user's identity by going back to the earlier step, password) is saved in the database, which is displayed on page
where the form application interface carries out all of the 26 (picture 2).
instructions given to the user.
These programs are created using Visual Studio, which is
referred to as a Windows application because each page is
created with a specific function in mind.
C. Registration Form

Fig 2: Registration Interface

IJISRT24MAR375 www.ijisrt.com 851


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR375

D. Fingerprint Scan:

Fig 3: Fingerprint

This fingerprint scan page allows the user to submit four E. Fingerprint Check
different biometric data points by clicking the scan button. The Check form used to identify user identity using previously
biometric data is gathered from the registration pages. This recorded biometric data patterns. Initially, the user fills in each
page is accessed after the user has registered their basic text field with their unique pin for fingerprint data. The
information. The unique ID they have provided will serve as fingerprint scanner receives the response from the user when
their biometric data ID. Every biometric piece of information they press the corresponding finger I.D. scan button, allowing
must be submitted by the user. Once the system has accepted it, it to identify biometric information. If all four biometric entries
the information is saved in the database in byte format using the are successfully reviewed and verified after a sequence of
biometrics the user entered. Thus, the administrator can see the entries, the user can access the submission and proceed with
data in the database as bytes and the data. additional processing. The form has an I-D box with the
corresponding I-D of the user's details in it. Here, I've used a
box to map an attribute to each of the four fingerprints I have in
my finger data table.

Fig 4: Workflow Diagram

IJISRT24MAR375 www.ijisrt.com 852


Volume 9, Issue 3, March – 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24MAR375

F. Arduino to Sensor Connectivity [4]. Mingxing, HE, HORNG, Shi-Jinn, FAN, Pingzhi, et al.
This connection shows that the Arduino board has14 Performance evaluation of score level fusion in
digital inputs/outputs (six of which can be used as PWM multimodal biometric systems. Pattern Recognition,
outputs), 6 analog inputs, and a 16 MHz ceramic resonator. We 2010, vol. 43, no 5, p. 1789-1800.
have connected a 5 volt sensor to its corresponding Arduino [5]. Meiru Mu, QiuQi Ruan and Yongsheng Shen,
socket, a ground pin from the sensor to the corresponding "Palmprint Recognition Based on Discriminative Local
Arduino Uno ground, a transfer data pin fingerprint to the Binary Patterns Statistic Feature," Signal Acquisition
corresponding Arduino receiving data pin, and a receiving data and Processing, 2010. ICSAP '10. International
pin from the sensor to the corresponding Arduino Uno transfer Conference on, pp. 193-197, 9-10 Feb. 2010.
data pin. [6]. Sanchez-Reillo.R ,Sanchez-Avila.C and Gonzalez-
Marcos.A, "Biometric identification through hand
VIII. RESULTS AND DISCUSSION geometry measurements," Pattern Analysis and
Machine Intelligence, IEEE Transactions on, vol. 22, no.
 Future Works: 10, pp. 1168-1171, Oct2000
[7]. Saropourian.B, "A new approach of finger-print
 Enhancing the UI and UX design recognition based on neuralnetwork," Computer Science
 Including gestures that make the work of the user easy and and Information Technology, 2009. ICCSIT 2009.2nd
convenient. IEEE International Conference on, pp. 158- 161, 8-11
 Optimizing the data collection much faster. Aug. 2009.
 In the purpose of automation and the use of machine
learning is to predominantly reduce the time complexity
even more.
 Surpassing the use of databases by cloud storage because
databases might cost large amounts of data.
 Increase in use of this security system in various fields such
as home security and many more.
 Enhancement of fingerprint scanner with high FAR (false
acceptance rate).
 Development of mobile applications for different use cases.
 Integrating the same methodology with other biometric
modalities.

IX. CONCLUSION

In this highly technologically advanced world, even with


numerous security mechanisms in place, an individual's data
can be transferred via a network relatively readily. However,
these security measures all have certain limitations and are
susceptible to bias, which can result in data leakage. As a result,
we worked together to acquire information on improving data
protection and created a multi-pattern fingerprint security
system that can act as a firewall for data stored in any type of
database. This is the improved, makeshift security system we
provide for a single person's privacy.

REFERENCES

[1]. Finger-Vein Patterns Using Maximum Curvature Points


in Image Profiles”
[2]. IEICE Transactions on Information and Systems ,
2007,90(8):1185-1194.
[3]. Li.W, D. Zhang and Xu.Z, "Palmprint Identification by
Fourier Transform," International Journal of Pattern
Recognition and Artificial Intelligence, vol. 16, no. 4,
pp. 417-432, Jun. 2002.

IJISRT24MAR375 www.ijisrt.com 853

You might also like