Professional Documents
Culture Documents
Bachelor of Technology
in
Electronics and Communication Engineering
by
A. Leela Anuroop (12131A0404 )
COLLEGE OF ENGINEERING
(AUTONOMOUS)
April, 2016
CERTIFICATE
This is to certify that the project titled BIOMETRIC BASED DOOR LOCKING
SYSTEM is a bonafide record of the work done by A. Leela Anuroop (12131A0404 ),
Ch. Venkata Pradeep (12131A0433), D. Pavan Kumar (12131A0436), in partial
fulfillment of the requirements for the award of the degree of Bachelor of Technology in
Electronics and Communication Engineering of the Gayatri Vidya Parishad College of
Engineering (Autonomous) affiliated to Jawaharlal Nehru Technological University,
Kakinada during the year 2015-2016.
ABSTRACT
The abstract summarizes the content of the thesis, stating the problem being
examined, the procedure or methods used, and any conclusions that are drawn.
ACKNOWLEDGEMENTS
CONTENTS
Page No.
CERTIFICATE
ABSTRACT
II
ACKNOWLEDGEMENTS
II
CONTENTS
II
LIST OF TABLES
II
LIST OF FIGURES
II
II
CHAPTER 1
CHAPTER 2
APPENDIX
REFERENCES
lIST OF TABLE
TABLE1.
TABLE1.2
TABLE2.1
TABLE2.
LIST OF FIGURES
Figure 1.1.
Figure 1.2.
Figure 2.1.
Figure 2.2.
( z)
Description
2
= Wave number
Delta function
Roman Alphabet
AF
Array Factor
A P ( z ) , A P (z )
BDE
Ci(.)
Cosine integral
CR
Crossover constant
CHAPTER 1
PROJECT INTRODUCTION
1 Introduction
Authentication plays a very critical role in security-related applications like ecommerce.There are a number of methods and techniques for accomplishing this key
process. In thisregard, biometrics is gaining increasing attention these days. Security
systems, havingrealized the value of biometrics, use biometrics for two basic purposes: to
verify or identify users. There is a number of biometrics and different applications need
different biometrics. Biometric is the most secure and convenient authentication tool. It
can not be borrowed, stolen, or forgotten and forging one is practically impossible.
Biometrics measure individual's unique physical or behavioral characteristics to
recognize or authenticate their identity. Common physical biometrics includes
fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral
characterscharacteristics include signature, voice, keystroke pattern, and gait. Project deals
withIdentification, Authentication and Setup of Security System using FIM 3030
Biometricsand 8051 Microcontroller. Beside Biometrics and 8051 Microcontroller the
major components required are LCD, RTC Section (for real time clock updates), General
purpose PCB, Relay section (for opening and closing of security doors) and
PersonalComputer etc. The interfacing between 8051-LCD, 8051-RTC, 8051 - FIM
3030Biometrics Module (Thumb Geometry recognition) and FIM 3030 Biometric Module
Personal Computer is to be implemented. The details about each module are given in
nextsections of this report.
1.1.2.
CHAPTER 2
THE 8051
MICROCONTROLLER
2 Introduction
In this chapter, the 8051 family, 8051 assembly language programming, loop and
I/O port programming, 8051 addressing modes, arithmetic instructions, 8051 hardware
connectionand Intel hex file have been discussed.
2.1.
Thismicrocontroller had 128 bytes of RAM, 4K bytes of on-chip ROM, two timers, one
serial port, and four ports (each 8-bits wide) all on a single chip. The 8051 is an 8-bit
processor,meaning that the CPU can work on only 8 bits of data at a time. Data larger
than 8 bitshas to broken into 8-bit pieces to be processed by the CPU. The 8051 has a
total of four I/O ports, each 8 bits wide. Although the 8051 can have a maximum of 64K
bytes of on-chip ROM, many manufacturers have put only 4K bytes on the chip. There
are differentflavors of the 8051 in terms of speed and amount of on-chip ROM, but they
are allcompatible with the original 8051 as far as the instructions are concerned. The
various members of the 8051 family are 8051 microcontroller, 8052 microcontroller and
8031microcontroller.
Block Diagram:
2.2.
8051 Microcontroller
The 8051 is the original member of the 8051 family. Figure 2.1 shows the block
combining a versatile 8-bit CPUwith Flash on a monolithic chip, the Atmel AT89C51 is a
powerful microcomputer which5
continuefunctioning. The Power-down Mode saves the RAM contents but freezes the
oscillator disabling all other chip functions until the next hardware reset.
2.3.
Pin Description
VCC
Supply voltage.
GND
Ground.
Port 0
Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as
high-impedance inputs. Port 0 may also be configured to be the multiplexed loworder address/data bus during accesses to external program and data memory. In this
mode P0has internal pull-ups. Port 0 also receives the code bytes during Flash
programming, andoutputs the code bytes during program verification. External pull-ups
are required during program verification.
Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output
bufferscan sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that
areexternally being pulled low will source current (IIL) because of the internal pull-ups.
Port2 emits the high-order address byte during fetches from external program memory
andduring accesses to external data memory that uses 16-bit addresses (MOVX
@DPTR). Inthis application, it uses strong internal pull-ups when emitting 1s. During
accesses toexternal data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits
the contentsof the P2 Special Function Register. Port 2 also receives the high-order
address bits andsome control signals during Flash programming and verification.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output
buffer scan sink/source four TTL inputs. When 1s are written to Port 3 pins they are
pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that
areexternally being pulled low will source current (IIL) because of the pull-ups. Port 3
alsoserves the functions of various special features of the AT89C51 as listed below:Table
2.1function of port 38
Port 3 also receives some control signals for Flash programming and verification.
8
RST
Reset input. A high on this pin for two machine cycles while the oscillator is
runningresets the device.
ALE/PROG
Address Latch Enable output pulse for latching the low byte of the address
duringaccesses to external memory. This pin is also the program pulse input (PROG)
duringFlash programming. In normal operation ALE is emitted at a constant rate of 1/6
theoscillator frequency, and may be used for external timing or clocking purposes.
Note,however, that one ALE pulse is skipped during each access to external Data
Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH.
With the bitset, ALE is active only during a MOVX or MOVC instruction. Otherwise, the
pin isweakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller
is inexternal execution mode.
PSEN
Program Store Enable is the read strobe to external program memory. When the
AT89C51is executing code from external program memory, PSEN is activated twice each
machinecycle, except that two PSEN activations are skipped during each access to
external datamemory.
EA/VPP
External Access Enable. EA must be strapped to GND in order to enable the
device tofetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on
reset.EA should be strapped to VCC for internal program executions. This pin also
receives the12-volt programming enable voltage (VPP) during Flash programming, for
parts that require 12-volt VPP.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock operating
circuit.
XTAL2
9
2.4.
Need of C:
10
Compiler produces hex file that we download into ROM of microcontroller. The
size of hex file produced by compiler is one of the main concerns of
microcontroller programmers for two reasons:1.Microcontroller has limited on
-chip ROM2.The code space for 8051 is limited to 64 KBProgramming in
assembly language is tedious and time consuming. C is a high level programming
language that is portable across many hardware architectures.
So for following reasons we use C:
1. It is easier and less time consuming to write in C than assembly.
2. C is easier to modify and update.
3. You can use code available in function libraries.
4. C code is portable to other microcontrollers with little or no modification.
We use reg51.h as a header file as #include <reg51.h>. These files
contain all thedefinitions of the 80C51 registers. This file is included in your
project and will beassembled together with the compiled output of your C
program.
C data types for 8051:
1. Unsigned char is 8-bit data type ranging 0-255 (0-FFH)
2. Signed char is 8-bit data type that uses most significant bit to represent the or
+value. We have only 7-bits for the magnitude of the signed numbers giving
usvalues from -128 to +127.11
3. Unsigned int is 16-bit data type ranging 0-65535(0-FFFFH).
4. Signed int is 16-bit data type that uses most significant bit to represent the or
+value. We have only 15-bits for the magnitude of the signed numbers giving
usvalues from -32768 to +32767.
Sbit is a keyword designed to access single bit addressable registers. It allows to
thesingle bits of the SFR registers. We can use sbit to access the individual bits of
the portsas Sbit mybit=P1^0. This controls the D0 of port P1.Bit data type
allows access to thesingle bits of bit - addressable memory spaces 20-2FH.Sfr,
The bit data type is used for the bit addressable section of RAM space 20-2FH.
11
Bitwise operators are AND (&), OR (|), EX-OR (^), Inverter (~), Shift Right (>>)
and Shift left (<<).
CHAPTER 3
12
BIOMETRICS
3.1. INTRODUCTION
Humans recognize each other according to their various characteristics for ages.
Werecognize others by their face when we meet them and by their voice as we speak
tothem. Identity verication (authentication) in computer systems has been traditionally
based on something that (key, magnetic or chip card) or (PIN, password). Things likekeys
or cards, however, tend to get stolen or lost and passwords are often forgotten or
disclosed.To achieve more reliable verication or identication we should use something
thatreally characterizes the given person. Biometrics offer automated methods of
identityverication or identication on the principle of measurable physiological or
behavioralcharacteristics such as a ngerprint or a voice sample. The characteristics are
measurableand unique. These characteristics should not be duplicable, but it is
unfortunately often possible to create a copy that is accepted by the biometric system as a
true sample. This isa typical situation where the level of security provided is given as the
amount of moneythe impostor needs to gain an unauthorized access. We have seen
biometric systemswhere the estimated amount required is as low as $100 as well as
systems where at least afew thousand dollars are necessary.Biometric systems can be
used in two different modes. Identity occurs when the user claims to be already enrolled
in the system (presents an ID card or login name); in thiscase the biometric data obtained
from the user is compared to the users data alreadystored in the database. Identication
occurs when the identity of the user is a prioriunknown. In this case the users biometric
data is matched against all the records in thedatabase as the user can be anywhere in the
database or he/she actually does not have to be there at all.13
of this stored biometric data is crucial for further authentications,there are often several
(usually 3 or 5) biometric samples used to create users master template. The process of
the users registration with the biometric system is calledenrollment.
Loop
Arch
Whorl
14
15
APPENDIX
16
REFERENCES
(Style-references)
Format for journal paper shall be:
[1] Nakamara, Y., and Ghodoussi, M., Dynamic computation of closed-link robot mechanisms
with non-redundant and redundant actuators, IEEE Transactions on Robotics and Automation,
1989, Vol. 5, No. 3, pp. 294-302.
17
18