Sunteți pe pagina 1din 42

Fingerprint based Locker System

Chapter 1 INTRODUCTION
1 . 1 . Biometrics:
What is Biometrics?
The study of automated identification, by use of physical or behavioral traits is called as biometrics.

Physical and Behavioral Traits Physical traits include: Fingerprint Iris Ear Face Retina Hands Behavioral traits include: Signature Walking gait Typing patterns Both Voice

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System 1.1.1. Why go for Biometrics?

Authentication The process of verifying that a user requesting a network resource is who he, she, or it claims to be, and vice versa. Conventional authentication methods something that you have key, magnetic card or smartcard something that you know PIN or password

Advantages:
Biometrics has no risk of: Forgetting Loosing Getting it stolen Getting it copied Being used by anyone else.

Essential Properties of a Biometric Universal Everyone should have the characteristic No two persons have the same characteristic Characteristic should be unchangeable Characteristic must be measurable Uniqueness Permanence Collectability

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

1.2. Biometric System Process Flow

Fig. 1.1 Biometric System Process Flow

1 . 3 . P at t e r n R e c o g n i t i o n
Description and classification of measurements taken from physical or mental processes Examination of pattern characteristics Formulation of the recognition system Important part of any biometric system

1 . 4 . W h y F i n g e r p r i n t b i om e t r i c s ?
High Universality A majority of the population have legible fingerprints. More than the number of people who possess passports, license and IDs High Distinctiveness Even identical twins have different fingerprints (most biometrics fail). Individuality of fingerprints established through empirical evidence. Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

High Permanence Fingerprints are formed in the fetal stage and remain structurally unchanged throughout life.

High Performance One of the most accurate forms of biometrics available Best tradeoff between convenience and security

High Acceptability Fingerprint acquisition is non intrusive. Requires no training.

1 . 5 . F i n g e r p r i n t P at t e r n s
Loops Ridge lines enter from one side and curve around to exit from the same side. 60-65% of population. Rounded or circular ridge pattern. 30-35% of population. Ridge lines enter from one side of print and exit out the other. 5% of population. Whorls

Arches

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System


Fig. 1.2 Fingerprint patterns

Chapter 2

LITERATURE REVIEW
Fingerprints have been used to secure commercial transactions since the days of ancient Babylon, where fingerprints have been found among the ruins on clay seals attached to business documents. Each fingerprint contains global features, which can be seen with the naked eye, and local features, also called minutia points, the tiny, unique characteristics of fingerprint ridges. Ridge patterns can be loops, arches, or whorls; minutia types associated with a ridge pattern include ridge endings, bifurcations, divergences (ridges so small that they appear as dots or islands), and enclosures (ridges that bifurcate and reunite around a ridge less area). While two or more fingerprints can have the same global features, no known pair, at least since the first criminal fingerprint identification was made in 1892, have the same minutia. Fingerprint scanners detect ridge patterns and minutia and then characterize the minutia based upon orientation (the direction the minutia are facing), spatial frequency (how far apart the ridges are around a particular mark), curvature (rate of orientation change), and position ( X,Y location relative to some fixed point). There are about 60 to 70 minutia points on each finger, and even identical twins have different minutia points. These data describing the minutia provide the essential components of the template computed from the enrolment and bid samples. Whereas police fingerprinting stores the entire image, fingerprint scanning systems store only the template. An original image cannot be constructed from its data template alone.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

2.1. PHYSIOLOGY OF FINGERS:

Fig.2.1 Physiology Of Fingers

The uniqueness of a configuration of pores depends on several factors, such as the number of pores involved, their respective shapes and sizes, the locations of these pores with respect to each other, and so on. These factors are all a function of morphology. Pores are formed where sweat glands in the subcutaneous layer of the skin generate sweat ducts. These sweat ducts grow through the subcutaneous layer and dermis to the epidermis, where the open duct on the skins surface presents itself as a pore. According to a 1973 study on skin ridge formation, sweat glands begin to form in the fifth month of gestation. The sweat gland ducts reach the surface of the epidermis in the sixth month, forming pores. The epidermal ridges are not formed until after the sixth month; then, the pattern which has been forming in the glandular fold region is transferred to the epidermis. Hirsch and Schweichel concluded that several forces affect the epidermal pattern formation; one of these forces is the stabilization that occurs when sweat gland secretion ducts open on to the surface, at regular intervals, in the papillary ridges. These openings of the ducts on the surface are the pores, and the regularity of their appearance plays a significant part in the uniqueness of pore configurations. Once these pores form on the ridge, they are fixed at that location. Considerable research has shown that pores do not disappear, move or spontaneously generate over time.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

2.2. PORE EXTRACTION TECHNIQUE The method used to extract the pores as fingerprint features is critical to the matching routine. The pores position, size and shape are features which make it distinct from other objects in an image. Techniques used for the fingerprint data capture can be used to enhance the pore information. For example, high resolution scanning and manipulation of the gain and contrast camera controls can highlight the pores. The position of the pore is determined by processing the gray scale fingerprint image and transforming it to a skeleton representation. By applying models and processing routines to the skeleton to the skeleton of the fingerprint image, the pore locations can be extracted. Pores are transformed into isolated and connected short lines in the skeleton image. Given this information, the size of the pore can be determined by region growing routines operating on a binary version of the fingerprint image.

2.3. SCANNING RESOLUTION Some parameters become critical to the matching routine. For instance, the resolution at which the fingerprints are scanned determines the accuracy of feature location measurements. Inherently, there may be only one pore in a given 1 mm x 1 mm section of print, and at 1000 ppi (pixels per inch), this section is represented by approximately 40x40 (1600) pixels. In comparison, at a scanning resolution of 500 ppi, the same segment is represented by 20x20 (400) pixels. Therefore, the probability of another 1 mm 2 segment of print matching with respect to pore position is either 1/1600 or 1/400 depending on the scanning resolution. It can be seen that the false accept error rate will be reduced at a higher scanning resolution at the cost of an increased false reject error rate. 2.4. FINGER PLASTICITY The distance between two features can change significantly due to plasticity of the finger. This relative change of position is generally not significant for nearby features within small areas of print. Therefore, when measuring the position of small high density features such as pores, a local origin should be established. A minutia point can be used to establish a local origin.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

Chapter 3

COMPONENTS USED AND THEIR FUNCTIONS


3.1 Microcontroller-89S52:
Consists of a powerful CPU tightly coupled with memory. Various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip.

3 . 2 . F i n g e r P ri n t S e n s o r :
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. An optical sensor is used here. Optical fingerprint imaging involves capturing a digital image of the print using visible light. The top layer of the sensor, where the finger is placed, is known as the touch surface. Beneath this layer is a light-emitting phosphor layer which illuminates the surface of the finger. The light reflected from the finger passes through the phosphor layer to an array of solid state pixels (a chargecoupled device) which captures a visual image of the fingerprint. A disadvantage of this type of sensor is the fact that the imaging capabilities are affected by the quality of skin on the finger.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System

3.3. FIM30 Finger Print Scanner:


FIM30 is an evolutionary standalone fingerprint recognition module which consists of optic sensor and processing board. FIM 30 has functions of fingerprint enrollment, identification, partial and entire deletion and reset in a single board, it does not require connection with a separate PC. It has a memory capacity for upto 100 finger prints, uses ASCII protocol and has fast acquisition for difficult finger types also.

3 . 4 . RS-232:
To allow compatibility among data communication equipment made by various manufactures, an interfacing standard called RS232 was set by the Electronic Industries Association (EIA). However, the RS-232 input and output voltage levels are not TTL compatible. For this reason, to connect any RS-232 to a microcontroller system we must use voltage converters such as MAX232 to convert the TTL logic levels to the RS-232 voltage levels and vice versa. The MAX232 has two receivers (converts from RS-232 to TTL voltage levels) and two drivers (converts from TTL logic to RS-232 voltage levels). This means only two of the RS-232 signals can be converted in each direction. Hence, the connections from finger print scanner are: The transmission line is connected to RS-232 input section and the receiver line is connected to the RS-232 output section on the MAX-232 IC to convert these voltage levels into TTL standards. And the concerned TTL logic levels are connected to the microcontroller TXD and the RXD lines.

3.5. Keypad:
In this project we are using two types of keypads, one is the matrix keypad and the other is the normal key for selecting the mode of operation. Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

Fingerprint based Locker System Mode keys are concerned with locker, passport verification and ATM mode. The matrix key is used for entering the ATM password.

3.6. LCD:
This is the widely used as output device to indicate the status. Here the transaction details are clearly displayed on the LCD. We are using a 16X2 LCD display here. The LCD requires 3 control signals from the microcontroller viz. enable (E), read/write(R/W), register select (RS).

3.7. Buzzer:
It is used to indicate unauthorized person or unauthorized transaction.

3.8. EEPROM:
This is the additional memory which we are using for the storage of the data for a particular person.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

10

Fingerprint based Locker System

Chapter 4

BLOCK DIAGRAM

LCD Display Power supply Micro controller Keypad


M A X 2 3 2

BUZZER

BANK LOCKER

Finger Print Module

EEPROM

Fig. 4.1 Block Diagram

4.1. Functions of each block:


4 . 1 . 1 . F i n g e r P ri n t S c a n n e r:
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of extracted features) which is stored and used for matching. Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

11

Fingerprint based Locker System It supports wide range of fingerprint sensor interoperability giving you a freedom to select suitable sensor that most fits to your application.

4 . 1 . 2 . R S - 2 3 2:
To allow compatibility among data communication equipment made by various manufactures, an interfacing standard called RS232 was set by the Electronic Industries Association (EIA).This RS-232 standard is used in PCs and numerous types of equipment .However, since the standard was set long before the advent of the TTL logic family, its input and output voltage levels are not TTL compatible. In RS-232 ,a 1 is represented by -3 to -25V,while a 0 bit is +3 to +25V,making -3 to +3 undefined. For this reason, to connect any RS232 to a microcontroller system we must use voltage converters such as MAX232 to convert the TTL logic levels to the RS-232 voltage levels and vice versa. So here we are using this MAX-232 to have compatibility between the Finger Print Scanner and microcontroller.

4.1.3. Microcontroller:
A Micro controller consists of a powerful CPU tightly coupled with memory RAM, ROM or EPROM), various I / O features such as Serial ports, Parallel Ports, Timer/Counters, Interrupt Controller, Data Acquisition interfaces-Analog to Digital Converter (ADC), Digital to Analog Converter (ADC), everything integrated onto a single Silicon Chip. It does not mean that any micro controller should have all the above said features on chip, Depending on the need and area of application for which it is designed, The ON-CHIP features present in it may or may not include all the individual section said above.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

12

Fingerprint based Locker System Any microcomputer system requires memory to store a sequence of instructions making up a program, parallel port or serial port for communicating with an external system, timer / counter for control purposes like generating time delays, Baud rate for the serial port, apart from the controlling unit called the Central Processing Unit.

4.1.4. Keypad:

In this project we are using two types of keypads, one is the matrix keypad and the other is the normal key for selecting the mode of operation. Here we are doing all the transactions regarding bank like deposit, withdraw, etc. for this transactions and for entering the password we are using the 4X4 Matrix keypad. Using the normal keypad we are going to select the mode which we are going to perform.

4.1.5. LCD:
This is the widely used output device to indicate the status. Here the transaction details are clearly displayed on the LCD.

4.1.6. Buzzer:
This is the output device which we are using to indicate the unauthorized person.

4.1.7. Locker system:


Here we are demonstrating a DC motor as the Locker for the authorized persons in the Locker system mode.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

13

Fingerprint based Locker System

4.1.8. EEPROM:

This is the additional memory which we are

using for the storage of the data for a particular person.

Chapter 5 CIRCUIT DIAGRAM

Fig. 5.1 Circuit Diagram

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

14

Fingerprint based Locker System

Chapter 6 SIMULATIONS
6.1. Visual Basic Simulation
Visual Basic (VB) is a third-generation event-driven programming language and integrated development environment (IDE) from Microsoft for its COM programming model first released in 1991. Visual Basic is designed to be relatively easy to learn and use. Visual Basic was derived from BASIC and enables the rapid application development (RAD) of graphical user interface (GUI) applications, access to databases using Data Access Objects, Remote Data Objects, or ActiveX Data Objects, and creation of ActiveX controls and objects. Scripting languages such as VBA and VBScript are syntactically similar to Visual Basic, but perform differently. A programmer can put together an application using the components provided with Visual Basic itself. Programs written in Visual Basic can also use the Windows API, but doing so requires external function declarations. Though the program has received criticism for its perceived faults, from version 3 Visual Basic was a runaway commercial success, and many companies offered third party controls greatly extending its functionality. The final release was version 6 in 1998. Microsoft's extended support ended in March 2008 and the designated successor was Visual Basic .NET (now known simply as Visual Basic).

Dim oXL As Excel.Application Dim oWB As Excel.Workbook Dim oSheet As Excel.Worksheet Dim oRng As Excel.Range Private Declare Sub PortOut Lib "IO.DLL" (ByVal Port As Integer, ByVal Data As Byte) Private Declare Sub PortWordOut Lib "IO.DLL" (ByVal Port As Integer, ByVal Data As Integer) Private Declare Sub PortDWordOut Lib "IO.DLL" (ByVal Port As Integer, ByVal Data As Long) Private Declare Function PortIn Lib "IO.DLL" (ByVal Port As Integer) As Byte Private Declare Function PortWordIn Lib "IO.DLL" (ByVal Port As Integer) As Integer

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

15

Fingerprint based Locker System Private Declare Function PortDWordIn Lib "IO.DLL" (ByVal Port As Integer) As Long Private Declare Sub SetPortBit Lib "IO.DLL" (ByVal Port As Integer, ByVal Bit As Byte) Private Declare Sub ClrPortBit Lib "IO.DLL" (ByVal Port As Integer, ByVal Bit As Byte) Private Declare Sub NotPortBit Lib "IO.DLL" (ByVal Port As Integer, ByVal Bit As Byte) Private Declare Function GetPortBit Lib "IO.DLL" (ByVal Port As Integer, ByVal Bit As Byte) As Boolean Private Declare Function RightPortShift Lib "IO.DLL" (ByVal Port As Integer, ByVal Val As Boolean) As Boolean Private Declare Function LeftPortShift Lib "IO.DLL" (ByVal Port As Integer, ByVal Val As Boolean) As Boolean Private Declare Function IsDriverInstalled Lib "IO.DLL" () As Boolean Dim n As Integer Dim m As Integer Dim shots As Integer Dim bit0 As Boolean Dim bit1 As Boolean Dim bit2 As Boolean Dim bit3 As Boolean Dim b As Integer Dim b1 As Integer Dim level As Integer Dim level1 As Integer Dim sec As Boolean Dim camloc As String Dim dump As Variant Dim chances As Integer Dim finger As Integer

Function init_chances() chances = 4 lblchanc.Caption = "Four" End Function Function chances1() chances = chances - 1 If chances = 3 Then lblchanc.Caption = "Three" PortOut &H378, &H40 Call vdelay(1) PortOut &H378, &H0 'Call vdelay(1.5) Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

16

Fingerprint based Locker System ElseIf chances = 2 Then lblchanc.Caption = "Two" PortOut &H378, &H50 Call vdelay(1) PortOut &H378, &H0 'Call vdelay(1.5) ElseIf chances = 1 Then lblchanc.Caption = "One" PortOut &H378, &H60 Call vdelay(1) PortOut &H378, &H0 ' Call vdelay(1.5) ElseIf chances = 0 Then lblchanc.Caption = "Nill" Call alert PortOut &H378, &H70 Call vdelay(1) PortOut &H378, &H0 'Call vdelay(1.5) Me.Caption = "Locker Security System. Unathorised access to locker." lblspk.Caption = "Alert!!! Alert!!! Unathorised access to locker." spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(10) lblspk.Caption = "Alert!!! Alert!!! Unathorised access to locker." spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(10) lblspk.Caption = "Alert!!! Alert!!! Unathorised access to locker." spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption timcam.Enabled = False End If End Function Function delay() Dim delaytime delaytime = Timer() While (Timer() - delaytime) < 0.5 'do nothing Wend End Function

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

17

Fingerprint based Locker System

Private Sub Form_Load() PortOut &H378, &H0

Set oXL = CreateObject("excel.application") oXL.Visible = True Set oWB = oXL.Workbooks.Open(App.Path & "\database.xls") Set oSheet = oWB.Worksheets("Sheet1") n1 = oSheet.Cells(3, 6).Value level = 0 sec = False timcam.Enabled = False shots = 1 finger = 0 End Sub

Private Sub vdelay(ByVal HowLong As Date) Dim endDate As Date endDate = DateAdd("s", HowLong, Now) While endDate > Now DoEvents 'Allows windows to handle other stuff Wend End Sub Function datain() bit3 = GetPortBit(&H379, bit2 = GetPortBit(&H379, bit0 = GetPortBit(&H379, bit1 = GetPortBit(&H379, bit1 = Not bit1 4) 5) 6) 7)

b = (bit3 * (2 ^ 3)) + (bit2 * (2 ^ 2)) + (bit1 * (2 ^ 1)) + (bit0 * (2 ^ 0)) b = -b b1 = b Call vdelay(0.1) bit3 = GetPortBit(&H379, 4) Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

18

Fingerprint based Locker System bit2 bit0 bit1 bit1 = = = = GetPortBit(&H379, 5) GetPortBit(&H379, 6) GetPortBit(&H379, 7) Not bit1

b = (bit3 * (2 ^ 3)) + (bit2 * (2 ^ 2)) + (bit1 * (2 ^ 1)) + (bit0 * (2 ^ 0)) b = -b If b = b1 Then Else b = 0 End If If b = 10 Then b = 0 End If End Function

Private Sub Form_Unload(Cancel As Integer) oWB.Save oXL.Quit Set oRng = Nothing Set oSheet = Nothing Set oWB = Nothing Set oXL = Nothing End End Sub Function message() 'If sec = False Then End Function Function alert() End Function Function delay1() Dim delaytime delaytime = Timer() While (Timer() - delaytime) < 0.3 'do nothing Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

19

Fingerprint based Locker System Wend End Function Function vdelay1() Dim delaytime delaytime = Timer() While (Timer() - delaytime) 'do nothing Wend End Function Function vdelay2() Dim delaytime delaytime = Timer() While (Timer() - delaytime) 'do nothing Wend End Function Function vdelay25() Dim delaytime delaytime = Timer() While (Timer() - delaytime) 'do nothing Wend End Function Function vdelay3() Dim delaytime delaytime = Timer() While (Timer() - delaytime) 'do nothing Wend End Function Function vdelay15() Dim delaytime delaytime = Timer() While (Timer() - delaytime) 'do nothing Wend End Function

< 1

< 2

< 2.5

< 3

< 1.5

Private Sub timcam_Timer() 'camloc = "\cam" & "\" & lblname.Caption & " " & shots ' ezVidCap1.SaveDIB App.Path & camloc & ".dib" ''ezVidCap1.SaveDIB App.Path & "\cam\shots.dib" ' shots = shots + 1 End Sub Private Sub Timer1_Timer() Call datain If b = 8 Then Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

20

Fingerprint based Locker System Call delay Call datain If b = 1 Then Me.Caption = "Locker Security System. Entering account number..." sec = False Call init_chances Call vdelay(1) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 level = 1 level1 = 1 lblno.Caption = "" lblpass.Caption = "" lblname.Caption = "" lblrfid.Caption = "" lblmobile.Caption = "" lblspeech.Caption = "" lblsms.Caption = "" lbldump.Caption = "" ElseIf b = 2 Then Me.Caption = "Locker Security System. Entering account password..." Call vdelay(1) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 level = 2 level1 = 2 lblpass.Caption = "" lbldump.Caption = "" 'ezVidCap1.CaptureEnd timcam.Enabled = True ElseIf b = 3 Then Me.Caption = "Locker Security System. Enter Your Finger print ..." Call vdelay(1) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 level = 3 level1 = 3 lblrfid.Caption = "" Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

21

Fingerprint based Locker System Timer5.Enabled = True ElseIf b = 4 Then lblrfid.Caption = "Correct" Me.Caption = "Locker Security System. Speaking the code..." 'Call speechcode Call vdelay(1) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 level = 4 level1 = 4 lblspeech.Caption = "" Call init_speech ElseIf b = 5 Then Me.Caption = "Locker Security System. Entering sms code..." Randomize lblrandom.Caption = Int(Rnd * 10000000000#) Call message Call vdelay(1) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 level = 5 level1 = 5 lblsms.Caption = "" lbldump.Caption = "" End If End If End Sub Private Sub Timer2_Timer() bit3 = GetPortBit(&H379, 4) bit2 = GetPortBit(&H379, 5) bit0 = GetPortBit(&H379, 6) bit1 = GetPortBit(&H379, 7) bit1 = Not bit1 b = (bit3 * (2 ^ 3)) + (bit2 * (2 ^ 2)) + (bit1 * (2 ^ 1)) + (bit0 * (2 ^ 0)) b = -b b1 = b Call vdelay(0.1)

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

22

Fingerprint based Locker System

bit3 bit2 bit0 bit1 bit1

= = = = =

GetPortBit(&H379, GetPortBit(&H379, GetPortBit(&H379, GetPortBit(&H379, Not bit1

4) 5) 6) 7)

b = (bit3 * (2 ^ 3)) + (bit2 * (2 ^ 2)) + (bit1 * (2 ^ 1)) + (bit0 * (2 ^ 0)) b = -b If b = b1 Then Else b = 0 End If

lblin.Caption = b If b = 15 Then 'level = 0 End If End Sub Function init_speech() Dim SpeechGrammer As String lblspk.Caption = "Enter your voice code" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption SpeechGrammer = "[Grammar]" & vbCrLf & _ "langid = 1033" & vbCrLf & _ "type=cfg" & vbCrLf & _ "[<Start>]" & vbCrLf & _ "<start>=" & oSheet.Cells(n, 7).Value lblgrammar.Caption = SpeechGrammer VR.GrammarFromString SpeechGrammer VR.Activate End Function Private Sub Timer3_Timer() If lblin.Caption <> 0 And lblin.Caption <> 12 Then If level = 1 Then If lblin.Caption = 10 Then Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

23

Fingerprint based Locker System lblin.Caption = 0 End If lblno.Caption = lblno.Caption + lblin.Caption Call vdelay(2) ElseIf level = 2 Then If lblin.Caption = 10 Then lblin.Caption = 0 End If lbldump.Caption = lbldump.Caption + lblin.Caption Call vdelay(2) ElseIf level = 3 Then lbldump.Caption = lblin.Caption ElseIf level = 5 Then If lblin.Caption = 10 Then lblin.Caption = 0 End If lbldump.Caption = lbldump.Caption + lblin.Caption Call vdelay(2) End If End If End Sub Private Sub Timer4_Timer() lbllevel.Caption = level Call datain If b = 12 Then If level = 1 Then For n = 4 To 18 If n = 18 Then Me.Caption = "Locker Security System. Account number entered is incorrect" lblspk.Caption = " Account number Entered is incorrect" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(2) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H20 Call vdelay(1) PortOut &H378, &H0 lblno.Caption = "" Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

24

Fingerprint based Locker System lblpass.Caption = "" lblname.Caption = "" lblrfid.Caption = "" lblmobile.Caption = "" lblspeech.Caption = "" lblsms.Caption = "" Exit For End If If oSheet.Cells(n, 4).Value = lblno.Caption Then lblname.Caption = oSheet.Cells(n, 2).Value lblmobile.Caption = oSheet.Cells(n, 3).Value lblno.Caption = oSheet.Cells(n, 4).Value level = 0 Call init_chances lbln.Caption = n Call vdelay(3) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.5) PortOut &H378, &H10 Call vdelay(1) PortOut &H378, &H0 'Call vdelay(2) Me.Caption = "Locker Security System. Account number entered is correct" lblspk.Caption = " Account number Entered is correct" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption

Exit For End If Next ElseIf level = 2 Then If oSheet.Cells(n, 5).Value = lbldump.Caption Then lblpass.Caption = "Correct" level = 0 lbldump.Caption = ""

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

25

Fingerprint based Locker System Me.Caption = "Locker Security System. Account password entered is correct" Call vdelay(2.5) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H10 Call vdelay(1) PortOut &H378, &H0 lblspk.Caption = "Account password Entered is correct" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption 'Call init_chances lblname.Caption = oSheet.Cells(n, 2).Value lblmobile.Caption = oSheet.Cells(n, 3).Value lblno.Caption = oSheet.Cells(n, 4).Value m = n m = m - 3 If m = 1 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H10 Call vdelay(2) ElseIf m = 2 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H20 Call vdelay(2) ElseIf m = 3 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H30 Call vdelay(2) ElseIf m = 4 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H40 Call vdelay(2) ElseIf m = 5 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H50 Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

26

Fingerprint based Locker System Call vdelay(2) ElseIf m = 6 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H60 Call vdelay(2) ElseIf m = 7 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H70 Call vdelay(2) ElseIf m = 8 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H80 Call vdelay(2) ElseIf m = 9 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &H90 Call vdelay(2) ElseIf m = 10 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &HA0 Call vdelay(2) ElseIf m = 11 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &HB0 Call vdelay(2) ElseIf m = 12 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &HC0 Call vdelay(2) ElseIf m = 13 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &HD0 Call vdelay(2) Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

27

Fingerprint based Locker System

ElseIf m = 14 Then PortOut &H378, &H30 Call vdelay(1) PortOut &H378, &HE0 Call vdelay(2) End If Else lblpass.Caption = "Incorrect" Me.Caption = "Locker Security System. Account password entered is incorrect" lblspk.Caption = " Account password Entered is Incorrect" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(2) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H20 Call vdelay(1) PortOut &H378, &H0 Call vdelay(1) lbldump.Caption = "" Call chances1

End If ElseIf level = 3 Then If finger = 1 Then lblrfid.Caption = "Correct" Me.Caption = "Locker Security System. Finger Print is correct" level = 0 lbldump.Caption = "" lblspk.Caption = " Finger Print is correct" Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

28

Fingerprint based Locker System spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(3.5) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H10 Call vdelay(1) PortOut &H378, &H0 Timer5.Enabled = False 'Call init_chances lblname.Caption = oSheet.Cells(n, 2).Value lblmobile.Caption = oSheet.Cells(n, 3).Value lblno.Caption = oSheet.Cells(n, 4).Value ElseIf finger = 2 Then lblrfid.Caption = "Incorrect" Me.Caption = "Locker Security System. Finger Print is incorrect" level = 0 lbldump.Caption = "" lblspk.Caption = " Finger print is incorrect" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(2) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H20 Call vdelay(1) PortOut &H378, &H0 Call vdelay(1) Call chances1 End If ElseIf level = 5 Then If finger = 1 Then lblsms.Caption = "Correct" Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

29

Fingerprint based Locker System Me.Caption = "Locker Security System. S.M.S password entered is correct" level = 0 lbldump.Caption = "" lblspk.Caption = "S.M.S password Entered is correct" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(2) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H10 Call vdelay(1) PortOut &H378, &H0 'Call init_chances Call vdelay(2) Me.Caption = "Locker Security System. User can open the locker" lblspk.Caption = "All security levels passed. User can open the locker." spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption timcam.Enabled = False Timer5.Enabled = False ElseIf finger = 2 Then level = 0 lblpass.Caption = "Incorrect" Me.Caption = "Locker Security System. S.M.S password entered is incorrect" lblspk.Caption = " S.M.S password Entered is Incorrect" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(2) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 Call vdelay(0.25) PortOut &H378, &H20 Call vdelay(1) PortOut &H378, &H0 Call vdelay(1) lbldump.Caption = "" Call chances1

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

30

Fingerprint based Locker System

End If End If End If End Sub Private Sub Timer5_Timer() kj = PortIn(&H378) If kj = &HE0 Then Call vdelay(1#) kj = PortIn(&H378) If kj = &H10 Then finger = 1 Else finger = 2 End If End If End Sub Private Sub VR_PhraseFinish(ByVal flags As Long, ByVal beginhi As Long, ByVal beginlo As Long, ByVal endhi As Long, ByVal endlo As Long, ByVal Phrase As String, ByVal parsed As String, ByVal results As Long) If level = 4 Then If Trim$(Phrase) = oSheet.Cells(n, 7).Value Then lblspeech.Caption = "Correct" Me.Caption = "Locker Security System. Voice entered is correct" 'level = 0 lbldump.Caption = "" VR.Deactivate Call vdelay(3.5) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 lblspk.Caption = "Voice entered is correct" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption 'Call vdelay(1.5) PortOut &H378, &H10 Call vdelay(1) PortOut &H378, &H0 Call vdelay(2) Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

31

Fingerprint based Locker System Me.Caption = "Locker Security System. User can open the locker" lblspk.Caption = "All security levels passed. User can open the locker." spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption 'Call init_chances Else lblspeech.Caption = "Incorrect" Me.Caption = "Locker Security System. Voice entered is incorrect" VR.Deactivate 'level = 0 lbldump.Caption = "" Call vdelay(3) PortOut &H378, &HE0 Call vdelay(1) PortOut &H378, &H0 lblspk.Caption = "Voice entered is incorrect" spkSpeak.AudioReset spkSpeak.Speak lblspk.Caption Call vdelay(0.25) PortOut &H378, &H20 Call vdelay(1) PortOut &H378, &H0 Call chances1

End If End If End Sub

6.2. Matlab Simulation


MATLAB is a numerical computing and fourth generation programming language. Develepoed by Mathworks, MATLAB allows matrix manipulations,plotting of functions And data, implementation of algorithm,creartion of user interface an interfacing with programs written in other languages. Although MATLAB is intended primarily for numerical computing, an option toolbox uses the Mu PAD symbolic engine allowing access to symbolic computing capabilities. An Additional package,simulink adds graphical multi domain simulation and model based design for dynamic and embedded systems. Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

32

Fingerprint based Locker System In 2004 MATLAB had around 1 million users across industry and academia. MATLAB users come from various backgrounds of engineering,science and economics. MATLAB is widely used in academic and research institutions as well as industrial enterprise.

clc, close all, clear all parport=digitalio('parallel','LPT1'); % to initialise your parallel port in parport variable addline(parport,0:7,'out'); % to select LPT1 as output imagen=imread('1 (1).tif');%Read Binary Image %imshow(imagen);%title('INPUT IMAGE WITH NOISE') %*-*-*Filter Image Noise*-*-*-* if length(size(imagen))==3 %RGB image imagen=rgb2gray(imagen); end img_r = roicolor(imagen,100,150); %imview(img_r) person = read_letter(img_r)%img to text %word=[word letter]; if strcmp(person,'1') data = 224; putvalue(parport,data); pause(1) data = 16; putvalue(parport,data); pause(1) data = 0; putvalue(parport,data); else data = 224; putvalue(parport,data); pause(1) data = 32; putvalue(parport,data); pause(1) data = 0; putvalue(parport,data); end

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

33

Fingerprint based Locker System

Chapter 7

TESTING

Fig.7.1 Internal Hardware Of The Project

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

34

Fingerprint based Locker System

Fig. 7.2 Setup Of The Project

Fig. 7.3 Welcome Screen Fig. 7.7 Three Chances for authentication

Fig. 7.4 Authenticating Account no. Fig.7.5 Authentication Password

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

35

Fingerprint based Locker System

Fig. 7.6 Authentication Failure

Fig.7.11 Voice Authentication Successful

Fig. 7.13 Thank You Display At End Fig.7.8 Voice Code Authentication

Fig.7.9 Voice Authentication Failure Fig. 7.10 Two Chances For Voice Code

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

36

Fingerprint based Locker System

Fig. 7.12 Locker Locked Due To Authentication Failure

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

37

Fingerprint based Locker System

Fig. 7.14 Visual Basic 6.0 Simulation

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

38

Fingerprint based Locker System

Fig. 7.15 Matlab Simulation

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

39

Fingerprint based Locker System

Chapter 8

CONCLUSION
By the use of finger print Biometrics, it is more secure and purely authentic technology for protection of user data an all essential material for the user. Thus the Finger Print Based Locker System is a added security to the normal way of securing the data/material.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

40

Fingerprint based Locker System

Chapter 9

FUTURE SCOPE
The performance of the system can be further improved in terms of operating speed, memory capacity by using the advanced controllers. The device can be made to perform better by providing the power supply with the help of Battery to reduce the requirement of main AC supply. A speaking voice alarm used to indicate the unauthorized person accessing the ATM and the Locker system and to indicate the wrong password. The system can be made to communicate with modems or mobile phones to alert the user on every transaction in the ATM mode and to alert the authorities in the Passport verification mode.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

41

Fingerprint based Locker System

REFERENCES
Websites:
www.howstuffworks.com www.biometrics.com www.eceprojects.com www.wikipedia.com www.fingerprintindia.com www.atmel.com www.ieeeprojects.com http://www.electro_tech_online.com

Books:
1. The 8051 Micro controller and Embedded Systems Muhammad Ali Mazidi, Janice Gillispie Mazidi. 2. The 8051 Micro controller Architecture, Programming & Applications by Kenneth J.Ayala. 3. Fingerprint Analysis and Pattern Recognition by Huang D.S., Andrea Rowdy . 4. Pattern recognition by Richard.O.Dooda & Peter.E.Harts. 5. Biometric Template Security by Jain K.A. Ross and Jolene Ayer kenos Lama 6. Digital Image Processing by ANIL.K.JAIN.

Department Of Electronics And Telecommunication MPSTME-NMIMS, Shirpur Campus

42

S-ar putea să vă placă și