phonelogo+234 8146561114 or +2347015391124

FRAMEWORK OF FINGERPRINT AND PALM VEIN ON A LOCK SYSTEM

USER'S INSTRUCTIONS: The project work you are about to view is on "framework of fingerprint and palm vein on a lock system". Please, sit back and study the below research material carefully. This project topic "framework of fingerprint and palm vein on a lock system" have complete 5(five) Chapters. The complete Project Material/writeup include: Abstract + Introduction + etc + Literature Review + methodology + etc + Conclusion + Recommendation + References/Bibliography.Our aim of providing this "framework of fingerprint and palm vein on a lock system" project research material is to reduce the stress of moving from one school library to another all in the name of searching for "framework of fingerprint and palm vein on a lock system" research materials. We are not encouraging any form of plagiarism. This service is legal because, all institutions permit their students to read previous projects, books, articles or papers while developing their own works.


TITLE PAGE

 

BY

---
--/H2013/01430
DEPARTMENT OF ----
SCHOOL OF ---
INSTITUTE OF ---



APPROVAL PAGE

This is to certify that the research work, "XX" by ---, Reg. No. --/H2007/01430 submitted in partial fulfillment of the requirement award of a Higher National Diploma on --- has been approved.

By
---                                                     . ---
Supervisor                                                  Head of Department.
Signature……………….                           Signature……………….        

……………………………….
---
External Invigilator



DEDICATION
This project is dedicated to Almighty God for his protection, kindness, strength over my life throughout the period and also to my --- for his financial support and moral care towards me.Also to my mentor --- for her academic advice she often gives to me. May Almighty God shield them from the peril of this world and bless their entire endeavour Amen.



ACKNOWLEDGEMENT

The successful completion of this project work could not have been a reality without the encouragement of my --- and other people. My immensely appreciation goes to my humble and able supervisor mr. --- for his kindness in supervising this project.
My warmest gratitude goes to my parents for their moral, spiritual and financial support throughout my study in this institution.
My appreciation goes to some of my lecturers among whom are Mr. ---, and Dr. ---. I also recognize the support of some of the staff of --- among whom are: The General Manager, Deputy General manager, the internal Auditor Mr. --- and the ---. Finally, my appreciation goes to my elder sister ---, my lovely friends mercy ---, ---, --- and many others who were quite helpful.


PROJECT DESCRIPTION: This work "framework of fingerprint and palm vein on a lock system" research material is a complete and well researched project material strictly for academic purposes, which has been approved by different Lecturers from different higher institutions. We made Preliminary pages, Abstract and Chapter one of "framework of fingerprint and palm vein on a lock system" visible for everyone, then the complete material on "framework of fingerprint and palm vein on a lock system" is to be ordered for. Happy viewing!!!


ABSTRACT

Biometric technology is an efficient personal authentication and identification technique. This study proposes a survey of fingerprint and vein recognition techniques. This biometric lock is a lock that uses fingerprint and palm vein to grant genuine user an access to a building, an office, or a libratory. This device solve major problem faced by the conventional lock or electronic combination lock, by adding electronic technology as well as biological technology together, user is the key to the lock. So users do not have to memorize combination as it is in the electronic combination lock, or carry the key along all the time. The aim of this work is to carry out a research on the framework of the biometric using fingerprint and palm vein.

TABLE OF CONTENTS

 TITLE PAGE

APPROVAL PAGE
DEDICATION
ACKNOWELDGEMENT
ABSTRACT
TABLE OF CONTENT

CHAPTER ONE

    • INTRODUCTION
    • BACKGROUND OF THE PROJECT
    • PROBLEM STATEMENT
    • AIM/OBJECTIVE OF THE PROJECT
    • SCOPE OF THE PROJECT
    • SIGNIFICANCE OF THE PROJECT
    • PROJECT WORK ORGANISATION

CHAPTER TWO

2.0      LITERATURE REVIEW
2.1      REVIEW OF THE STUDY
2.2     EVOLVEMENTS OF LOCK

2.3    TODAY’S LOCK

2.4 GENERAL OVERVIEW OF BIOMETRIC RECOGNITION SYSTEMS

2.6   REVIEW OF RELATED WORK

CHAPTER THREE
3.0       DESIGN METHODOLOGY
3.1      FRAMEWORK OF FINGERPRINT LOCK SYSTEM
3.2     PRINCIPLE AND GENERAL FRAMEWORK OF VEIN RECOGNITION

CHAPTER FOUR

4.0     RESULTS
4.1     PERFORMANCE EVALUATION OF FINGERPRINT LOCK SYSTEM
4.2   PERFORMANCE EVALUATION OF A VEIN RECOGNITION
4.3     APPLICATIONS

4.4       MERITS AND DEMERITS

CHAPTER FIVE

5.1     CONCLUSIONS
5.2     RECOMMENDATION
5.2     REFERENCES

 

CHAPTER ONE
1.0                  INTRODUCTION
1.1     BACKGROUND OF THE STUDY
Door lock is a very important device; especially in the world we living in today that has a very high crime rate. So locking your door is not enough to secure your safety. According to a study conducted by California crime technological research foundation, it was found that most burglars enter the door. The intruders were asked for the reason of using the door; different answers were obtained but all agreed that conventional lock is easy to get around; either by kicking or picking the lock. Good door lock is one step of making your home or office more secure, so it is a small price to pay to ensure your family and your properties safety. Commercial locks available in the market are valued by their security, reliability and price as well. So the most important factor is security where, it only allows valid users .this is very hard to achieve with the mechanical lock available in the market, where the keyway makes the lock vulnerable to breaking in. When choosing a lock one very important factor is security ,when using a normal lock which operates using a key ,that is not very secure ,first because the key can be easily duplicated secondly this key has a keyway which also makes it susceptible to picking. So lock that operates with a key is not that secure .with the advancements of engineering now it is possible to control anything using the electric circuit .so it possible to have the loc that operate electronically[Grayson Robinson, 2014].
With the industrial revolution that led to the discovery of electricity and a general improvement in technology in the 19th century (Landes, 2019), following various experiments coupled with the advent of computers, saw a huge breakthrough in home security. This was because CCTV (closed-circuit television) systems in conjunction with stationed long focal length cameras were powered on to view home intruders. Though, this made possible to view remote ends for any non-confrontational crimes to get the offenders identified but it equally suffers a lot of hiccups as the intruders could get away with the valuable property without immediate arrest.
Thereafter, most crimes of burglary till date, which are non-confrontational property crimes, occur when we are not at home. The most common threat to our home is burglary. So, protection of home and family from criminal hit should be high on our list of priorities.
In correlation to the aforementioned security consciousness, one can emphatically say that security of homes and properties has been in existence for a long time, but the methods of applying and achieving it have been changing from time to time. Modern security approaches greatly rely on the activities of the intruders which may reveal their presence to a computer-controlled system. First of all, the intruder must enter the building; a door or window is the most logical means of criminal entry point. Sensors are set to detect use of these entrances, an alarm can be triggered when intruder passes or interacts with sensor devices such as microwave detectors, photo-electric beams, glass break detectors, magnetic field detection, electrostatic- field detectors, microwave barriers systems, ultrasonic sensors, and even infrared sensors. Most of these techniques are still in use but instant arrest of the burglars is hardly sometimes possible. The intruder or impostor action is detected through wrong fingerprint and this could prompt a signal to get to the home owner which possibly calls for an instant arrest of the burglars. However, the switch is never closed in the presence of the house occupant or visitor who simply gains access to the door if only his thumb print matches with that stored in the biometric device.
The report covers home security using biometric fingerprinting lock, which is a type of biometric device. The term “biometrics” is derived from the Greek words bio and metric, meaning life and to measure, respectively. Biometrics can be defined as the science of identifying or verifying individuals based on unique physiological or behavioural characteristics. Examples of human traits used for biometric recognition include fingerprints, hand geometry, speech, face, retina, iris, and handwritten signature (Wittich,2013). Biometrics can also be defined as the use of a person’s unique physiological, behavioral and morphological characteristic to provide positive personal identification (Tripathi, 2011). There are two distinct functions for biometric devices:

  • To prove you are who you say you are.
  • To prove you are not who you say you are not. (San Jose State University, 2010). Biometric identification systems are essentially pattern recognition systems. They use acquisition devices such as cameras and scanning devices to capture images, recordings, or measurements of an individual’s characteristics and computer hardware and software to extract, encode, store, and compare these characteristics (Emuoyibofarhe, 2011). Identification systems answer the question, “Who am I?” and do not require that a user claim an identity before biometric comparisons take place. The user provides his or her biometric data, which is compared to data from a number of users in order to find a match. The answer returned by the system is an identity such as a name or ID number (Nanavata et al, 2012) They establish the genuineness of physiological (e.g. face, fingerprint, iris, retina, hand geometry) and behavioural (e.g. signature, gait) characteristics of a person. Biometric recognition is an upcoming and promising field with great commercial magnitude. It is an extremely reliable source identification system as it is based on what we are rather than what we possess. Biometrics technology is without a doubt a more efficient way of authentication than the more common use of pass words, smart cards, or a combination of the two.

This study proposes a survey of fingerprint and vein recognition techniques used in locking system.
1.2                                PROBLEM STATEMENT
Problems with the convention lock are; they are easy to pick if intruders do not have a key. If intruders have the key then it is very easy to gain an access anytime which lead to the change of the lock .further more it is very easy to duplicate. Having a combination door lock is a better idea; using this type of lock will eliminate the need of having a key but create other issues, like forgetting People use human characteristics to identify each other such as face, voice and, gait for thousand years. Alphonse Bertillon, chief of criminal identification division of the police department in Paris, came up with the idea of using a number of body measurements to spot criminal in the mid-19 century .this idea started to gain popularity and it led the discovery of the human fingerprint. Fingerprint or palm is part of the science known today as biometrics. Biometrics is identification of a person based on the person’s distinctive physiological, anatomical and or behavioral characteristics. Biometrics was invented to enhance security and reduce financial fraud [Jain, 2014].
Security systems are vital for protection of information, property, and prevention from theft or crime. From data centers to banks; security systems have become a necessity. Home security systems are also or commercial security system. Lock protects the life and properties of everyone in today’s world. Where the rate of crime and theft are exponential increasing everyday everyone need to use the lock. Throughout history people used lock for the same reason people using it today, which is security. This work will discuss the framework of protection system using biometric – fingerprint and palm, which came to solve the problem seen in other means of locking system.

1.2                     AIM AND OBJECTIVE OF THE WORK
The objective of this paper is to develop a biometrics lock device, which is able to acquire the paper focuses on having a secure lock .where only users with valid fingerprint can gain access.
The objectives are:

  • To increase the security level to prevent an unauthorized unlocking of the door
  • To study the application and different types of biometric
  • To give user more secure yet cost-efficient way of door locking system

1.4                                  SCOPE OF THE STUDY
Biometric technology is an efficient personal authentication and identification technique. As one of the main-stream branches, vein recognition has drawn much attention among researchers and diverse users. This study proposes a survey of finger print and vein recognition techniques. The basic principle, key techniques, performance evaluation metrics, application fields and future trends are extensively analyzed.

1.5                           SIGNIFICANCE OF THE STUDY

This study will throw light on the uniqueness of biometric system used in the lock system. This study will expose and demonstrate evolvement of the lock form a very simple piece of wood to an electronic lock and brief introduction to biometrics-fingerprint and palm vein. This study will enlighten the reader on how biometric technology can provide reliable user authentication, which plays an integral role in providing secure locking system.

CHAPTER TWO: The chapter one of this work has been displayed above. The complete chapter two of "framework of fingerprint and palm vein on a lock system" is also available. Order full work to download. Chapter two of "framework of fingerprint and palm vein on a lock system" consists of the literature review. In this chapter all the related work on "framework of fingerprint and palm vein on a lock system" was reviewed.

CHAPTER THREE: The complete chapter three of "framework of fingerprint and palm vein on a lock system" is available. Order full work to download. Chapter three of "framework of fingerprint and palm vein on a lock system" consists of the methodology. In this chapter all the method used in carrying out this work was discussed.

CHAPTER FOUR: The complete chapter four of "framework of fingerprint and palm vein on a lock system" is available. Order full work to download. Chapter four of "framework of fingerprint and palm vein on a lock system" consists of all the test conducted during the work and the result gotten after the whole work

CHAPTER FIVE: The complete chapter five of "framework of fingerprint and palm vein on a lock system" is available. Order full work to download. Chapter five of "framework of fingerprint and palm vein on a lock system" consist of conclusion, recommendation and references.

CLICK HERE FOR MORE RELATED TOPICS/MATERIAL


To "DOWNLOAD" the complete material on this particular topic above click "HERE"

Do you want our Bank Accounts? please click HERE

To view other related topics click HERE

To "SUMMIT" new topic(s), develop a new topic OR you did not see your topic on our site but want to confirm the availiability of your topic click HERE

Do you want us to research your new topic? if yes, click "HERE"

Do you have any question concerning our post/services? click HERE for answers to your questions


For more information contact us through any of the following means:

Mobile No phonelogo:+2348146561114 or +2347015391124 [Mr. Innocent]

Email address emailus:engr4project@gmail.com

Watsapp No whatsapp.html :+2348146561114


COUNTRIES THAT FOUND OUR SERVICES USEFUL

Australia, Botswana, Canada, Europe, Ghana, Ireland, India, Kenya, Liberia, Malaysia, Namibia, New Zealand, Nigeria, Pakistan, Philippines, Singapore, Sierra Leone, South Africa, Uganda, United States, United Kindom, Zambia, Zimbabwe, etc
Support: +234 8146561114 or +2347015391124

Watsapp Nowhatsapp.html
:+2348146561114


E
mail Address emailus:engr4project@gmail.com


FOLLOW / VISIT US VIA:

tweeter instagram.htmlfacebook logomyyoutubelogo.html