CHAPTER 2 LITERATUREREVIEW 2.1 IntroductionThis chapter which is Literaturereview will explain the concept and theory of the project as a whole project.In this chapter, it’s is the important part of the report project.
Thischapter will explain a detail about history of security, type of security,history about biometric and type of biometrics. Since this project is relatedwith security and biometrics. This chapter also discusses about the previousrelated works as well as a guidance and reference just to get an idea toimprove and idealized our project. In this process, the source of material wasgathered in the most of the literatures are from the related articles,journals, Internet which is web surfing and also got the information from supervisors.These literatures are then compiled and use as a guidance and reference to makethis research and complete of this project. 2.2History2.
2.1 History about securitySecurity is the degree of resistance to, or protection from, harm. Itwill applies to any range of people. As noted by the institute for security andopen methodologies (ISECOM), security provides “a form of protection where aseparation is created between the assets and the threat.” Security is veryimportant for the enterprises and organizations of all citizens and in allindustries.2.2.
2 Type of securityThereare many categories of security which is physical security, informationsecurity, IT and computing security, identity management and access control,procedural security and personnel security. In the research there are twoimportant type of security which is physical realm and IT and computing realm.This project which is Fingerprint safety briefcase is basically onphysical security which describe a security measures that this project isdesign to deny unauthorized access to facilities, equipment and resources, andto protect personnel and property from damage or harm.
The example of harm istheft or terrorist attacks. Fingerprint safety briefcase can give a highsecurity and privacy to the owner and also can be used at many placeindustries, offices and colleges or even at home. Security is very importantand especially in this competitive world, human cannot find ways to providesecurity to their confidential belongings manually. Because of this problem,personal identification technology, which can distinguish between registeredlegitimate users and imposters, is now generating interest.
2.2.3 History about biometricBiometrics is very greater security and conveniencethan traditional methods of personal recognition.
In some applications,biometrics can replace or supplement the existing technology. In others, it isthe only viable approach. One emerging technology thatis becoming more widespread in such organizations is biometrics is automaticpersonal recognition based on physiological or behavioral characteristics.However, this biometric is the accountable, responsible use of biometricsystems can in fact protect individual privacy. 2.2.
4 Type of biometrics Table 2.1: Type of biometrics Physical Behavioral Face Keystroke Fingerprint Signature Iris Voice Deoxyribonucleic acid (DNA) 2.3 Previous related works 1) Fingerprint Based AttendanceSystem Using Microcontroller and LabView. Summary Inthe case of study, Devendra Kumar Yadav, Sumit Singh, Prof. Shashank Pujari(2015) developed student 1) Fingerprint Based Attendance System UsingMicrocontroller and LabView by using 8051 microcontroller. A fingerprint recognition system can be usedfor both verification and identification.
In verification, the system comparesan input fingerprint to the “enrolled” fingerprint of a specific user todetermine if they are from the same finger (1:1 match). Inidentification, the system compares an input fingerprint with the prints of allenrolled users in the database to determine if the person is already knownunder a duplicate or false identity (1:N match). Figure2.
1 shows the block diagram of the Microcontroller based attendance system.This design combines the Microcontroller with the Fingerprint Module, display,and communication interfaces. This integration accelerates development whilemaintaining design flexibility and simplifies testing. Figure 2.1 shows theblock diagram top level system that used the same fingerprint device like ourproject but in different purposed.Figure 2.
1Top system diagram.Basedon this project, the project uses the same main input as the fingerprint safetybriefcase. The main input is biometric fingerprint sensor that the mostimportant sensor in our project. The functions of the biometric fingerprintsensor is to scan the fingerprint pattern from the users and send it to PICmicrocontroller to process the input and identify either it a right user orwrong user. 2) Biometric lock boxes SummaryIn this study, this project which is Biometric locks box is much relatedwith our project which is Fingerprint safety briefcase. The Biometric lock Boxuses the Adafruit Fingerprint Sensor as well as a numeric password or code anda mechanical key-lock to provide triple-security. This project the main component is Arduino Uno andfingerprint sensor Figure2.2 The circuit of biometric lock boxBased on this project use same input which isfingerprint device but the different is the process of the input and output.
This biometric lock box using a Arduino Uno as a process of input and output bygiving the command. Next this project is made by box. The different betweenthis project and our project is the input. This biometric box is using apassword or code and mechanical key-lock to access the lock box. While ourproject just using a fingerprint sensor to open the briefcase, if wrong accessfingerprint the briefcase will not open.3) Water level indicator with alarmusing pic microcontroller. In the nextstudy, the project has been presented to show It provides high identificationperformance, low power consumption, and can easily be integrated into a widenumber of applications such as a door lock system, safe box, simple accesscontroller, vehicle control, and ATM. This project will differ from otherdevices out on the market due to our systems ability to be interfaced with a PCvia the USB cable.
This feature will make setting up and securing the systemeasy. An Atmega324 will be used to interface all of the components in oursystem. The fingerprint scanner is controlled using RS-232 serial communicationso this device will be connected via its UART pins to the microcontrollerUART0.
An FTDI serial-to-USB chip will be used to interface the microcontrollerto the PC again using the UART1 pins on the microcontroller. It appears thatinterfacing the microcontroller with the PC will be the most challenging aspectof our design.In this studythis project uses Atmega324 in order to act as main system that controls allthe command. Next, this project design also use metal box to prove thepotential of security. The different between our projects are, we use woodenbriefcase as a prototype to show that everyone can use it everywhere at anytime. 2.4 Chapter SummaryAt the end of this chapter, the previous project that hadbeen developed is being discussed and research comprehensive had been donesuccessfully.
The improvement towards the project could be done. The discussionhad covered the similarity and differences of the project fingerprint safetybriefcase.