You are on page 1of 25

BIOMETRIC BASED DOOR LOCKING SYSTEM

Project work submitted in partial fulfillment of the requirements


for the award of degree of

Bachelor of Technology
in
Electronics and Communication Engineering
by
A. Leela Anuroop (12131A0404 )

Ch. Venkata Pradeep (12131A0433)

D. Pavan Kumar (12131A0436)

Under the guidance of


Sri. T. Ravindra
Assistant Professor

COLLEGE OF ENGINEERING
(AUTONOMOUS)

Department of Electronics and Communication Engineering


GAYATRI VIDYA PARISHAD COLLEGE OF ENGINEERING (AUTONOMOUS)

(Affiliated to J.N.T University, Kakinada, A.P)


VISAKHAPATNAM- 530 048

April, 2016

CERTIFICATE

This is to certify that the project titled BIOMETRIC BASED DOOR LOCKING
SYSTEM is a bonafide record of the work done by A. Leela Anuroop (12131A0404 ),
Ch. Venkata Pradeep (12131A0433), D. Pavan Kumar (12131A0436), in partial
fulfillment of the requirements for the award of the degree of Bachelor of Technology in
Electronics and Communication Engineering of the Gayatri Vidya Parishad College of
Engineering (Autonomous) affiliated to Jawaharlal Nehru Technological University,
Kakinada during the year 2015-2016.

(Name & Signature of the Supervisor)

(Name & Signature of the HoD)

Project Viva-voce held on _____________________________

Signature of the External Examiner

ABSTRACT
The abstract summarizes the content of the thesis, stating the problem being
examined, the procedure or methods used, and any conclusions that are drawn.

ACKNOWLEDGEMENTS

CONTENTS
Page No.
CERTIFICATE

ABSTRACT

II

ACKNOWLEDGEMENTS

II

CONTENTS

II

LIST OF TABLES

II

LIST OF FIGURES

II

LIST OF SYMBOLS AND ABBREVATIONS

II

CHAPTER 1

CHAPTER TITLE(STYLE-PAPER TITLE)

1.1. Main headings (style -Heading 1)

CHAPTER TITLE(STYLE-PAPER TITLE)

2.1. Main headings (style -Heading 1)

CHAPTER 2

APPENDIX

REFERENCES

lIST OF TABLE

TABLE1.

Table heading (style- table head).............................................................2

TABLE1.2

Fggdghtf (style- table head).....................................................................2

TABLE2.1

Table heading (style- table head).............................................................2

TABLE2.

Fggdghtf (style- table head).....................................................................2

LIST OF FIGURES
Figure 1.1.

First figure caption (style-figure caption)................................................2

Figure 1.2.

figure caption(Style-figure caption)........................................................2

Figure 2.1.

First figure caption (style-figure caption)................................................2

Figure 2.2.

figure caption(Style-figure caption)........................................................2

LIST OF SYMBOLS AND ABBREVATIONS


Symbol
Greek alphabet

( z)

Description

Phase of ith element

2
= Wave number

Delta function

Roman Alphabet

AF

Array Factor

A P ( z ) , A P (z )

Position functions of the array elements

BDE

Boolean Differential Evolution

Ci(.)

Cosine integral

CR

Crossover constant

CHAPTER 1
PROJECT INTRODUCTION
1 Introduction
Authentication plays a very critical role in security-related applications like ecommerce.There are a number of methods and techniques for accomplishing this key
process. In thisregard, biometrics is gaining increasing attention these days. Security
systems, havingrealized the value of biometrics, use biometrics for two basic purposes: to
verify or identify users. There is a number of biometrics and different applications need
different biometrics. Biometric is the most secure and convenient authentication tool. It
can not be borrowed, stolen, or forgotten and forging one is practically impossible.
Biometrics measure individual's unique physical or behavioral characteristics to
recognize or authenticate their identity. Common physical biometrics includes
fingerprints, hand or palm geometry, retina, iris, and facial characteristics. Behavioral
characterscharacteristics include signature, voice, keystroke pattern, and gait. Project deals
withIdentification, Authentication and Setup of Security System using FIM 3030
Biometricsand 8051 Microcontroller. Beside Biometrics and 8051 Microcontroller the
major components required are LCD, RTC Section (for real time clock updates), General
purpose PCB, Relay section (for opening and closing of security doors) and
PersonalComputer etc. The interfacing between 8051-LCD, 8051-RTC, 8051 - FIM
3030Biometrics Module (Thumb Geometry recognition) and FIM 3030 Biometric Module
Personal Computer is to be implemented. The details about each module are given in
nextsections of this report.

Figure 1.1.1.1.1. First figure caption (style-figure caption)

1.1.2.

Working Of The Project


The working of the project is explained with the help of block diagram.
Block diagram:
Figure 1.1 Block diagram of the system

There are two modes


1. Registration mode
2. User mode
In first mode, i.e., the registration mode, system communicates with
personalcomputer for creating and maintenance of data base. This mode can be selected
usingmode switches available on system. In this mode scanner scans the image of
thumbimpression of the person and generates its bit pattern matrix according to the key
pointsin thumb geometry and than stores it in memory available in FIM 3030 Biometrics
Module known as users space. Only administrator has authority to register the new
person. In second mode, i.e., the user mode, system breaks contact with personal
computer. This mode can be selected with the same switches that are mode switches
onsystem. In this mode system again scans the thumb geometry of the person
makingcontact with scanner for identification and start matching with the existing data
basemaintained during registration mode. If system recognizes the person than it would
grantthe access through doors according to his/her designation else access denied
messagewould be shown on LCD and according to persons designation access through
doors will be provided.For a student only door number 1 gets open. For a teacher/staff
member door number 1 and 2 gets open. For an administrator all three doors i.e. door no.
1, 2 & 3 gets open for approximately 6seconds. As only single door lock is available, we
are using electrical bulbs for door no. 2 and 3.System also includes real time clock
updates, which updatesour system clock continuously. IC protocols are used to access real
time updates fromRTC (real time clock) section. Central control unit of system is
Microcontroller 8051,which is also interfaced with RTC Section. Codes for whole
procedure followed bysystem are retune in Embedded C programming language. Keil
MicroVision3 IntegratedDevelopment Environment is used to compile whole program and
Flash magic is used to burn the program code Hex file.Whole project is divided in 6
chapters. Second chapter describes the microcontroller 8051s architecture. Third chapter
describes the biometrics basics and the FIM system.Forth chapter describes the
fundamentals of serial communication. Fifth chapter describes the hardware description of
whole project.At last in appendix codes are shown related to the project.

CHAPTER 2
THE 8051
MICROCONTROLLER
2 Introduction
In this chapter, the 8051 family, 8051 assembly language programming, loop and
I/O port programming, 8051 addressing modes, arithmetic instructions, 8051 hardware
connectionand Intel hex file have been discussed.

2.1.

The 8051 Family


In 1981, Intel Corporation introduced an 8-bit microcontroller called the 8051.

Thismicrocontroller had 128 bytes of RAM, 4K bytes of on-chip ROM, two timers, one
serial port, and four ports (each 8-bits wide) all on a single chip. The 8051 is an 8-bit
processor,meaning that the CPU can work on only 8 bits of data at a time. Data larger
than 8 bitshas to broken into 8-bit pieces to be processed by the CPU. The 8051 has a
total of four I/O ports, each 8 bits wide. Although the 8051 can have a maximum of 64K
bytes of on-chip ROM, many manufacturers have put only 4K bytes on the chip. There
are differentflavors of the 8051 in terms of speed and amount of on-chip ROM, but they
are allcompatible with the original 8051 as far as the instructions are concerned. The
various members of the 8051 family are 8051 microcontroller, 8052 microcontroller and
8031microcontroller.
Block Diagram:

Figure 1.2 Block diagram of inside the microcontroller 8051

2.2.

8051 Microcontroller
The 8051 is the original member of the 8051 family. Figure 2.1 shows the block

diagramof the 8051 microcontroller. The AT89C51 is a low-power, high-performance


CMOS 8- bit microcomputer with 4K bytes of Flash programmable and erasable read
only memory(PEROM). The device is manufactured using Atmels high-density
nonvolatile memorytechnology and is compatible with the industry-standard MCS-51
instruction set and pinout. The on-chip Flash allows the program memory to be
reprogrammed in-system or bya conventional nonvolatile memory programmer. By
4

combining a versatile 8-bit CPUwith Flash on a monolithic chip, the Atmel AT89C51 is a
powerful microcomputer which5

provides a highly-flexible and cost-effective solution to many embedded controlapplicati


ons. The AT89C51 provides the following standard features: 4Kbytes of Flash,128 bytes
of RAM, 32 I/O lines, two 16-bittimer/counters, five vector two-level interrupt
architecture, a full duplex serial port, and on-chip oscillator and clock circuitry. Inadditio
n, the AT89C51 is designed with static logic for operation down to zero frequencyand
supports two software selectable power saving modes. The Idle Mode stops the
CPUwhile allowing the RAM, timer/counters, serial port and interrupt system to

continuefunctioning. The Power-down Mode saves the RAM contents but freezes the
oscillator disabling all other chip functions until the next hardware reset.

2.3.

Pin Description

VCC
Supply voltage.
GND
Ground.
Port 0
Port 0 is an 8-bit open-drain bi-directional I/O port. As an output port, each pin
can sink eight TTL inputs. When 1s are written to port 0 pins, the pins can be used as
high-impedance inputs. Port 0 may also be configured to be the multiplexed loworder address/data bus during accesses to external program and data memory. In this
mode P0has internal pull-ups. Port 0 also receives the code bytes during Flash
programming, andoutputs the code bytes during program verification. External pull-ups
are required during program verification.

Figure 2.2 Pin diagram for microcontroller 8051


Port 1
Port 1 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 1 output
bufferscan sink/source four TTL inputs. When 1s are written to Port 1 pins they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 1 pins that
areexternally being pulled low will source current (IIL) because of the internal pull-ups.
Port1 also receives the low-order address bytes during Flash programming and
verification.
7

Port 2
Port 2 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 2 output
bufferscan sink/source four TTL inputs. When 1s are written to Port 2 pins they are pulled
high by the internal pull-ups and can be used as inputs. As inputs, Port 2 pins that
areexternally being pulled low will source current (IIL) because of the internal pull-ups.
Port2 emits the high-order address byte during fetches from external program memory
andduring accesses to external data memory that uses 16-bit addresses (MOVX
@DPTR). Inthis application, it uses strong internal pull-ups when emitting 1s. During
accesses toexternal data memory that uses 8-bit addresses (MOVX @ RI), Port 2 emits
the contentsof the P2 Special Function Register. Port 2 also receives the high-order
address bits andsome control signals during Flash programming and verification.
Port 3
Port 3 is an 8-bit bi-directional I/O port with internal pull-ups. The Port 3 output
buffer scan sink/source four TTL inputs. When 1s are written to Port 3 pins they are
pulled high by the internal pull-ups and can be used as inputs. As inputs, Port 3 pins that
areexternally being pulled low will source current (IIL) because of the pull-ups. Port 3
alsoserves the functions of various special features of the AT89C51 as listed below:Table
2.1function of port 38

Port 3 also receives some control signals for Flash programming and verification.
8

RST
Reset input. A high on this pin for two machine cycles while the oscillator is
runningresets the device.
ALE/PROG
Address Latch Enable output pulse for latching the low byte of the address
duringaccesses to external memory. This pin is also the program pulse input (PROG)
duringFlash programming. In normal operation ALE is emitted at a constant rate of 1/6
theoscillator frequency, and may be used for external timing or clocking purposes.
Note,however, that one ALE pulse is skipped during each access to external Data
Memory. If desired, ALE operation can be disabled by setting bit 0 of SFR location 8EH.
With the bitset, ALE is active only during a MOVX or MOVC instruction. Otherwise, the
pin isweakly pulled high. Setting the ALE-disable bit has no effect if the microcontroller
is inexternal execution mode.
PSEN
Program Store Enable is the read strobe to external program memory. When the
AT89C51is executing code from external program memory, PSEN is activated twice each
machinecycle, except that two PSEN activations are skipped during each access to
external datamemory.
EA/VPP
External Access Enable. EA must be strapped to GND in order to enable the
device tofetch code from external program memory locations starting at 0000H up to
FFFFH. Note, however, that if lock bit 1 is programmed, EA will be internally latched on
reset.EA should be strapped to VCC for internal program executions. This pin also
receives the12-volt programming enable voltage (VPP) during Flash programming, for
parts that require 12-volt VPP.
XTAL1
Input to the inverting oscillator amplifier and input to the internal clock operating
circuit.

XTAL2
9

Output from the inverting oscillator amplifier. Oscillator Characteristics XTAL1


andXTAL2 are the input and output, respectively, of an inverting amplifier which can
beconfigured for use as an on-chip oscillator, as shown in Figure 1. Either a quartz
crystalor ceramic resonator may be used. To drive the device from an external clock
source,XTAL2 should be left unconnected while XTAL1 is driven as shown.Figure 2.3
Crystal Oscillator ConnectionsThere are no requirements on the duty cycle of the external
clock signal, since theinput to the internal clocking circuitry is through a divide-by-two
flip-flop, but minimumand maximum voltage high and low time specifications must be
observed.

Figure 2.3 Crystal Oscillator Connections


There are no requirements on the duty cycle of the external clock signal, since
theinput to the internal clocking circuitry is through a divide-by-two flip-flop, but
minimumand maximum voltage high and low time specifications must be observed.

2.4.

Programming of Microcontroller 8051


We are using embedded C programming language to program the central unit i.e.
microcontroller 8051, so that it performs the specific task according to the
requirement.

Need of C:

10

Compiler produces hex file that we download into ROM of microcontroller. The
size of hex file produced by compiler is one of the main concerns of
microcontroller programmers for two reasons:1.Microcontroller has limited on
-chip ROM2.The code space for 8051 is limited to 64 KBProgramming in
assembly language is tedious and time consuming. C is a high level programming
language that is portable across many hardware architectures.
So for following reasons we use C:
1. It is easier and less time consuming to write in C than assembly.
2. C is easier to modify and update.
3. You can use code available in function libraries.
4. C code is portable to other microcontrollers with little or no modification.
We use reg51.h as a header file as #include <reg51.h>. These files
contain all thedefinitions of the 80C51 registers. This file is included in your
project and will beassembled together with the compiled output of your C
program.
C data types for 8051:
1. Unsigned char is 8-bit data type ranging 0-255 (0-FFH)
2. Signed char is 8-bit data type that uses most significant bit to represent the or
+value. We have only 7-bits for the magnitude of the signed numbers giving
usvalues from -128 to +127.11
3. Unsigned int is 16-bit data type ranging 0-65535(0-FFFFH).
4. Signed int is 16-bit data type that uses most significant bit to represent the or
+value. We have only 15-bits for the magnitude of the signed numbers giving
usvalues from -32768 to +32767.
Sbit is a keyword designed to access single bit addressable registers. It allows to
thesingle bits of the SFR registers. We can use sbit to access the individual bits of
the portsas Sbit mybit=P1^0. This controls the D0 of port P1.Bit data type
allows access to thesingle bits of bit - addressable memory spaces 20-2FH.Sfr,
The bit data type is used for the bit addressable section of RAM space 20-2FH.

11

Bitwise operators are AND (&), OR (|), EX-OR (^), Inverter (~), Shift Right (>>)
and Shift left (<<).

CHAPTER 3
12

BIOMETRICS
3.1. INTRODUCTION
Humans recognize each other according to their various characteristics for ages.
Werecognize others by their face when we meet them and by their voice as we speak
tothem. Identity verication (authentication) in computer systems has been traditionally
based on something that (key, magnetic or chip card) or (PIN, password). Things likekeys
or cards, however, tend to get stolen or lost and passwords are often forgotten or
disclosed.To achieve more reliable verication or identication we should use something
thatreally characterizes the given person. Biometrics offer automated methods of
identityverication or identication on the principle of measurable physiological or
behavioralcharacteristics such as a ngerprint or a voice sample. The characteristics are
measurableand unique. These characteristics should not be duplicable, but it is
unfortunately often possible to create a copy that is accepted by the biometric system as a
true sample. This isa typical situation where the level of security provided is given as the
amount of moneythe impostor needs to gain an unauthorized access. We have seen
biometric systemswhere the estimated amount required is as low as $100 as well as
systems where at least afew thousand dollars are necessary.Biometric systems can be
used in two different modes. Identity occurs when the user claims to be already enrolled
in the system (presents an ID card or login name); in thiscase the biometric data obtained
from the user is compared to the users data alreadystored in the database. Identication
occurs when the identity of the user is a prioriunknown. In this case the users biometric
data is matched against all the records in thedatabase as the user can be anywhere in the
database or he/she actually does not have to be there at all.13

It is evident that identication is technically more challenging and costly.Identication


accuracy generally decreases as the size of the database grows. For thisreason records in
large databases are categorized according to a sufficientlydiscriminating characteristic in
the biometric data. Subsequent searches for a particular record are searched within a
small subset only. This lowers the number of relevantrecords per search and increases the
accuracy (if the discriminating characteristic was properly chosen).Before the user can be
successfully veried or identied by the system, he/she must beregistered with the
biometric system. Users biometric data is captured, processed andstored. As the quality
13

of this stored biometric data is crucial for further authentications,there are often several
(usually 3 or 5) biometric samples used to create users master template. The process of
the users registration with the biometric system is calledenrollment.

3.2. Biometric techniques


There are lots of biometric techniques available nowadays. A few of them are in
the stageof the research only (e.g. the odor analysis), but a signicant number of
technologies isalready mature and commercially available (at least ten different types of
biometrics arecommercially available nowadays: ngerprint, nger geometry, hand
geometry, palm print, iris pattern, retina pattern, facial recognition, voice comparison,
signature dynamicsand typing rhythm)

3.3. Fingerprint technologies


Fingerprint identication is perhaps the oldest of all the biometric
techniques.Fingerprints were used already in the Old China as a means of positively
identifying a person as an author of the document. Their use in law enforcement since the
last centuryis well known and actually let to an association ngerprint = crime. This
caused someworries about the user acceptance of ngerprint-based systems. The situation
improves asthese systems spread around and become more common. Fingerprint readers
before we can proceed any further we need to obtain the digitalized ngerprint. The
traditionalmethod uses the ink to get the ngerprint onto a piece of paper. This piece of
paper isthen scanned using a traditional scanner. This method is used only rarely today
when anold paper-based database is being digitalized, scanning a ngerprint found on a
scene of acrime is being processed or in law enforcement AFIS systems. Otherwise
modern livengerprint readers are used. They do not require the ink anymore. These live
ngerprintreaders are most commonly based on optical, thermal, silicon or ultrasonic
principles.

Loop

Arch

Whorl
14

Figure 3.4 Loop, Arch& Whorl


The loop is the most common type of ngerprint pattern and accounts for about
65%of all prints. The arch pattern is a more open curve than the loop. There are two types
of arch patterns: the plain arch and the tented arch. Whorl patterns occur in about 30% of
allngerprint and are defined by at least one ridge that makes a complete circle.The
readability of a ngerprint depends on a variety of work and environmentalfactors. These
include age, gender, occupation and race. A young, female, Asian mine-worker is seen as
the most difficult subject. A surprisingly high proportion of the populations have missing
nger, with the left forenger having the highest percentage at0.62%. There are about 30
minutiae within a typical ngerprint image obtained by a livengerprint reader. The
number and spatial distribution of minutiae varies according to thequality of the
ngerprint image, nger pressure, moisture and placement. In the decision process, the
biometric system tries to find minutiae transformation between the currentdistribution and
the stored template. The matching decision is then based on the possibility and complexity
of the necessary transformation. The decision usually takesfrom 5 milliseconds to 2
seconds.
Figure 2.4.1.1.1.

15

APPENDIX

16

REFERENCES
(Style-references)
Format for journal paper shall be:
[1] Nakamara, Y., and Ghodoussi, M., Dynamic computation of closed-link robot mechanisms
with non-redundant and redundant actuators, IEEE Transactions on Robotics and Automation,
1989, Vol. 5, No. 3, pp. 294-302.

Format for conference paper shall be:


[2] Codourey, A. and Burdet, E., A body oriented method for finding a linear form of the dynamic
equations of fully parallel robot, in Proceedings of IEEE International Conference on Robotics
and Automation, Albuquerque, 1997, pp. 16121618.

Format for text book shall be:


[3] Hibbeler R. C., Mechanics of Materials, 8th Edition, Prentice Hall, Delhi, 2011.

Format for website shall be:


[4] www.

17

18

You might also like