Performance of Secure Door Access System Using Identification Numbers, Fingerprints, and Facial Recognition

Layered door security systems are increasingly essential in enhancing safety and convenience for people in their daily lives. Features such as ID number technology, fingerprints, and facial recognition can be employed in the security system. This study aims to develop and validate a system that authenticates the user’s identity as they pass through a doorway. The sensors utilized include of PN 532 as an ID number detection sensor, FPM10A as a fingerprint detection sensor, and ESP32CAM as a facial image detection sensor. The system is structured hierarchically and linked to the Internet of Things (IoT) in order to enable remote monitoring through the utilization of the Blynk application. This gadget employs a servo motor for door access control and incorporates an RFID module in its use. This study employs an Atmega328 microcontroller for the purpose of data processing. The PN532 test yielded a sensitivity rate of 100% and successfully detected and read RFID data from E-KTP chips. The testing of the FPM10A sensor demonstrated a sensitivity level of 90%. In addition, the testing of ESP32CAM demonstrates a sensitivity rate of 85%. Based on the test findings, the overall system achieved a tool performance score of 91.6%, indicating that the system is functioning effectively.


Introduction
A layered door security system is one way to increase the security of a room or building.This system usually uses locks with more than one layer or locking, making it difficult to be opened by people who do not have keys or access rights.More sophisticated layered door security systems can be equipped with technologies such as facial recognition, fingerprinting, or E-KTP.With these technologies, the user's identity can be accurately verified before granting access to the room [1].
The digital door lock is a recently popularized device that is being utilized in both residential and commercial settings because to its dependable nature and user-friendly interface [2].Nevertheless, even with the use of digital locks, security remains a significant problem.Oftentimes, unfamiliar individuals attempt to gain access by circumventing such safeguards.A home security system utilizing a Raspberry Pi has been created for the purpose of door lock control.The designed system is integrated with the owner's Twitter and Gmail accounts, transmitting visitor information.The authors suggest a cloud-based solution for smart homes employing IoT, which utilizes cloud-based technologies and architecture such as SaaS, PaaS, and IaaS.Furthermore, a home control device based on the Android operating system is now being developed [3].This device utilizes web services, specifically REST, to facilitate communication between the device and its owner.In addition, the author in [4] introduces the utilization of Bluetooth devices to control the lock through an Android application.However, the utilization of Bluetooth-based system is subject to some constraints.In contrast, a home management system based on SOAP and XML, as proposed in [5], introduces the additional challenge of parsing complexity and suffers from sluggish response times.
Layered door lock security using IoT and biometric technologies such as E-KTP, fingerprint, and Face ID is an interesting research topic in today's digital era.This technology provides better security and increases the efficiency of controlling access to buildings.Increasing the security of layered door locks using biometrics and IoT technology can reduce the risk of crime and intrusion, as well as provide comfort and convenience for its users.Layered door lock security using IoT, and biometrics technology can replace the use of conventional locks that are vulnerable to damage and manipulation by irresponsible parties.In addition, this technology can also enable real-time access control into the building and facilitate door access control [6], [7].Facial recognition technology is one of the technologies used in security systems.This technology makes it possible to identify or verify a person's identity through unique facial features.The process of facial recognition involves capturing facial images, extracting facial features, and comparing with a database to determine the identity of the user.The advantage of this technology is that it can be done without the need for physical contact, making it more hygienic and secure [8].A layered door security system is a door security technology used to increase the security of a home or building.This technology uses layers of security on the door, such as layered door locks, E-KTP, fingerprint, and face ID.According to an international journal entitled "Development of Multi-layer Security Door System based on Internet of Things (IoT) technology", this layered door security technology can be integrated with IoT technology to facilitate its use and security monitoring remotely [9]- [11].

Research Method 2.1. Research Design
The block diagram of the system that has been designed is shown in Figure 1.

Figure 1. Block Diagram System
Figure 1 is a system block diagram which explained that the tool uses three layered securities, the first stage is the RFID sensor, namely access using E KTP, fingerprinting access using fingerprints and the third stage access using a camera or face ID. the three sensors are connected to the microcontroller so they can communicate.If the three accesses are fulfilled the microcontroller gives a sign to the servo to pull the lock on the door so that the door can be opened.Every access that occurs on the door is controlled via IoT remotely using the Blynk application.The functions of each block diagram are as follows: 1. Module Charger, to charge the battery by controlling the current and voltage applied to the battery.2. RFID PN532, to read the RFID card data.3. Push Button, to connect two or more points when the button is pressed.If it is not pressed, it will disconnect two or more points in an electronic circuit.4. Fingerprint, to take a picture of the user's fingerprint and then convert it into digital data that can be processed by a biometric recognition system. 5. Battery, to provide or supplies electrical energy for electronic devices without having to be connected to the mains.6. Esp32, to take pictures and videos and transmit them via Wi-Fi.7. LCD, for displaying characters, numbers and letters.8. Servo, to drive or rotate objects with high-precision control in terms of angular position, acceleration and speed, a capability that ordinary motors do not have.Figure 2 depicts the creation and design of the system.It also shows the design of the manufacture of a layered door lock security device using E-KTP, fingerprint and IoT-based Face ID using ESP32CAM, Servo, RFID PN532, LM7805, fingerprint, Tp5100 and 18650 battery, LDC 16 x 2.

Flowchart
Figure 3 explains the flowchart of the tool that has been designed.The first stage begins with initializing the device or setting the inputs and outputs according to the program.Next, connect the microcontroller via the available Wi-Fi and have registered according to the programmed.If Wi-Fi is not available, the tool will work offline.Furthermore, the tool will detect through RFID, namely E-KTP, fingerprint and face detection.To open the access door, it must be done through three stages namely detection of E-KTP, fingerprint and face-recognized.If all three stages are met, then the access will be accepted by the microcontroller and the door will be opened.If one of the stages is not fulfilled, then the access will be denied.

Result and Discussion
Layered door lock security using E-KTP, fingerprint and Face ID based on IoT is carried out with several tests.The overall circuit of the security system can be seen in Figure 4 system testing has a very important role in identifying errors or deficiencies in the software and hardware being tested.One of the techniques used in testing is synchronization testing on each component connected to the microcontroller.The focus of this test is to ensure that the device functions as a whole in accordance with its functional requirements, without any errors or interruptions.
This test is testing how the tool works that has been designed, starting to activate the circuit contained in the tool design by initializing the tool or setting the inputs and outputs according to the program.Furthermore, the microcontroller will be connected to the available Wi-Fi and has been registered according to the programmed.If Wi-Fi is not available, the device will work offline, after which the device will detect RFID, namely E-KTP, fingerprints and face records to open access using three stages, namely by using E-KTP, fingerprints and face records.If all three stages are appropriate then access will be accepted by the microcontroller, if one is not fulfilled then access will be denied.Fingerprint and Face ID based on IoT A regulator is a circuit that functions to maintain voltage stability even though the input voltage increases and decreases.This circuit is adjusted to the needs of the microcontroller, which provides an output voltage of 5V with a minimum current of 10 mA.Testing the regulator circuit is conducted to evaluate the performance of the circuit in its application.The goal is to prevent damage to the microcontroller and supporting components such as sensors, resistors, transistors, and others.Regulator testing is done by measuring the input and output voltages.The data in Table 1 shows the center value of the input and output generated by the regulator when given a voltage supply.Testing the Atmega328 microcontroller circuit was successfully carried out using USBISP as a downloader program that can recognize the type of microcontroller, the AT-Mega328 IC.Microcontroller programming is conducted through ISP (In System Programming) mode, where the microcontroller must be programmable directly on the circuit board, and the microcontroller circuit must be recognized by the download program.
Table 2 shows the results of testing the buzzer circuit which is conducted by using a program to turn the buzzer on and off in one second intervals.Thus, it is expected that the buzzer can function properly.From the program, it is checked using a voltmeter.Figure 5 explains that the LCD circuit contained in the tool is used to evaluate the suitability of LCD users in this study.In this LCD circuit, the module used is the ic to LCD converter module on the ATmega328 microcontroller.

Figure 5. LCD test results
Figure 6 describes the PN532 test, the testing process carried out to detect the presence of RFID on the E-KTP chip contained in the E-KTP card.The purpose of this test is to read the unique ID value on each E-KTP card.The E-KTP program has been adjusted and synchronized with the right circuit, making it possible to detect the E-KTP ID by attaching the E-KTP card to the PN 532 module.Figure 6 shows the PN532 test results, where PN532 detects the presence of a 7-byte ID with the value as displayed in the program.

Figure 6. PN532 test results
Figure 8 explains that fingerprint sensor testing is used to connect and set up communication between the microcontroller and the fingerprint sensor.This process involves programming the microcontroller to be able to read serial data from the fingerprint sensor with a rate speed of 57600 bps.The program will call a fingerprint as shown in Figure 9

Conclusion
The door's 3-layer security system functions effectively.The lock's security control is achieved through the utilization of the Blynk application, which effectively operates over a wi-fi network.The test results indicate that the developed system achieved a performance score of 91.6%.

Figure 2 .
Figure 2. The overall circuit of the tool circuit

Figure 3 .
Figure 3. Flowchart of the system

Figure 4 .
Figure 4. Layered door lock security circuit using E-KTP,Fingerprint and Face ID based on IoT A regulator is a circuit that functions to maintain voltage stability even though the input voltage increases and decreases.This circuit is adjusted to the needs of the microcontroller, which provides an output voltage of 5V with a minimum current of 10 mA.Testing the regulator circuit is conducted to evaluate the performance of the circuit in its application.The goal is to prevent damage to the microcontroller and supporting components such as sensors, resistors, transistors, and others.Regulator testing is done by measuring the input and output voltages.The data in Table1shows the center value of the input and output generated by the regulator when given a voltage supply.

Figure 8 .Figure 9 .
Figure8explains that fingerprint sensor testing is used to connect and set up communication between the microcontroller and the fingerprint sensor.This process involves programming the microcontroller to be able to read serial data from the fingerprint sensor with a rate speed of 57600 bps.The program will call a fingerprint as shown in Figure9(a) where the fingerprint detects ID 1 while in Figure(b) the fingerprint is absent.The sensor will detect the fingerprint.Then the fingerprint sends data to the microcontroller, which will then be displayed via the serial monitor on the Arduino device as shown in.

Table 1 .
Testing result of regulator circuit