INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
|
|
- Christopher Bell
- 5 years ago
- Views:
Transcription
1 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FINGER PRINT BASED ELECTRONIC VOTING MACHINE PROF. K. M. PIMPLE 1, MISS. PALLAVI M. KOLHE 2, MISS. KOMAL P. BARAMKAR 2, MISS. ASHWINI G. MANKAR 2, MISS. VAISHALI JAMBHE 2 1. Assistant Professor, Department of EXTC, IBSS COE Amravati. 2. Final year EXTC, IBSS COE Amravati, Maharashtra, India. Accepted Date: 05/03/2015; Published Date: 01/05/2015 Abstract: In this paper we propose a completely automated E- voting system. Authentication is the bigger concern at the time of voting. Recognizing the need of authentication, we developed an automated system with user friendly access using finger print sensor module. The sensor is a solidstate fingerprint sensor that reliably captures fingerprint information and was designed to integrate into devices for improved authentication and convenience. It provides a reliable, quick and userfriendly alternative to passwords and even for PIN's and other forms of user authentication. We make use of this device to construct an E-voting machine. Whenever a person puts his finger over the finger print module, if that is authenticated, the system will ask him to select the respective contestant. After that is done, his vote will be counted. When a person has casted his vote, the corresponding officer presses a button confirming that the particular finger print has casted the vote. So in case if the same person tries to caste again, \ it will not allow that. The number of votes each contestant got is displayed on LCD. Keywords: Finger print system, LCD, Biometrics. Corresponding Author: PROF. K. M. PIMPLE Access Online On: How to Cite This Article: PAPER-QR CODE K. M. Pimple, IJPRET, 2015; Volume 3 (9):
2 INTRODUCTION Biometrics refers to metrics related to human characteristics and traits. Biometrics authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are very distinctive, and also have measurable characteristics that are used to label and describe every biometric individual. Biometric identifiers are divided or categorized as physiological versus behavioral characteristics. The Physiological characteristics are mostly related to the shape of the body like examples palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent include, but are not limited to fingerprint. The second category is Behavioral characteristics which are completely related to the pattern of behavior of a person, gait, and voice including but not limited to typing rhythm. Some other researchers have coined a term as behaviometrics which describes the latter class of biometrics. In past or earlier days more traditional means of security access control were used. These systems include token-base identification systems, such as a driver's license or passport, or any kind of knowledge-based identification systems, such as a password or any personal identification number. Subsequent biometric identifiers are unique to differentiate the individuals so the identification process is simpler and easier, than compared to prior methods. II. RELATED WORK: A method of voting system or electoral system is a defined as, by which voters can make a choice between options, often in an election. The voting system accomplishes the rules to ensure valid voting, and also how votes are counted and to aggregate the final result. Most common voting systems are based on the majority rule, a proportional representation voting 1091
3 with a number of variations and methods such as first-past-the-post or preferential voting. The study of conventionally defined voting systems which is named as social choice theory or voting theory, consists of a subfield with political science, economics, or mathematics. In the Proposed system we used Finger print sensor which is a solid-state fingerprint sensor that reliably captures the fingerprint information. It is designed to incorporate for different devices to provide an improved authentication and also for the purpose of convenience. This sensor module provides a reliable, quick and user-friendly alternative to passwords, along with PIN's and other forms of user authentication details. Aforementioned identification process using finger print will change slightly between different products and systems. These Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and also matches the fingerprint to the predefined database. Within the database, a fingerprint is consistently matched to a reference number, or any PIN number which is then again matched to a person's name or account. The primary information about fingerprint is that, it is unique for each and every person. O it is for even a twin brother will not have the same fingerprints. Hence each fingerprint is used to store a unique identifiable piece of data base or any information. The uniqueness in each fingerprint is due to the peculiar genetic code of DNA which is present in every person. This code causes the formation of a different pattern of our fingerprint. The other characteristics of the finger print are shown in the above image. These characteristics may also helpful during the process of minutiae for extraction. The unique information used for the identification process also includes the flow of the friction ridges, the sequence and the presence/absence of the individual friction ridge path features. A single fingerprint consists of ridges and valleys. These ridges and valleys both together provide friction for the skin. The primary identification of the skin is based upon the minutiae, which absolutely is the location and direction of the ridge endings and splits along a ridge path II. PROPOSED METHODOLOGY: In this paper we are presented a biometric finger print based voting system. We make use of this device to construct voting machine. Whenever a person puts his finger over the finger print module, if that is authenticated, the system will ask him to select the respective contestant. After that is done, his vote will be counted. When a person has casted his vote, the corresponding officer presses a button confirming that the particular finger print has casted the 1092
4 vote. So in case if the same person tries to caste again, it will not allow that. The number of votes each contestant got is displayed on LCD. The present system uses an onboard minicomputer named as PIC microcontroller which consists of number of input and output ports. The input and output port of the micro controller are interfaced with different input and output modules depending on the requirements. The current system uses finger print module, selection buttons as input to the microcontroller and the LCD and buzzer as output modules. In other words micro controller acts as a communication medium for all the modules involved in the project. The system also performs an health check indication of microcontroller using LED indicators. The device also consists of LCD which displays the required information and also alerts the user when any wrong finger authentication was detected then LCD displayed the message NOT MATCHED Finger print based Voting Machine PIC Micro controller Finger print module Buzzer Driver Buzzer LED Indicators Crystal Oscillator Reset Button Control Buttons LCD Driver LCD Filter O/P 5V DC I/O 230V Transformer Rectifier Regulator Regulated power supply. a. Fingerprint: The present system uses finger print module and the Fingerprint processing includes two parts: fingerprint enrollment and fingerprint matching (the matching can be 1:1 or 1:N).When enrolling, the finger print the user needs to enter the finger twice. The system will process the twice given finger images, and generates a template of the finger based on processing results. 1093
5 And this template is stored. When matching, any finger prints the user enters the finger through optical sensor and system will generate a template of the finger and compare it with templates of the fingers stored in library. For 1:1 matching, system will compare the live finger with specific template designated in the Module; for 1: N matching, or searching, system will search the whole finger library for the matching finger. In both circumstances, the system will provide the results of matching either success or failure. b. Microcontroller The microcontroller used in the proposed system is PIC which stands for Peripheral Interface Controller given by Microchip Technology to identify its single-chip microcontrollers. PIC microcontrollers are very successful in 8-bit microcontrollers. This project makes use of an onboard mini computer, which is usually termed as micro controller. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The controller contains some internal memory to store the program code. This memory is also used to dump some set of assembly instructions into the controller and these help for the functioning of the controller. The crystal oscillator speed that can be connected to the PIC microcontroller ranges from up to 20Mhz. Using the CCS C compiler usually 20Mhz oscillator will be used. The cost of the microcontroller is also very cheaper. The 20 MHz crystal oscillator should be connected with about 22pF capacitor. There are 5 input/output ports on PIC microcontroller namely port A port B port C port D and port E. Ever single port has different based functionality. Most of them can be used as general I/O ports. The microcontroller uses Harvard architecture which separates both Program and Variable (data) memory interface. This facilitates fetching of an instruction and the operation on data/accessing of variables simultaneously. 1094
6 c. LCD Display module: Microcontroller One of the most common devices attached to a micro controller is an LCD display. Special thin flat panels that can let light go through it, or can block the light. Some of the most common LCD s connected to the many microcontrollers are 16x2 and 20x2 LCD displays. It means that 16 characters per line by 2 lines were displayed and 20 characters per line by 2 lines were displayed, respectively. Liquid crystal displays are usually abbreviated as LCD s. These displays are often used in battery-powered devices, such as digital watches, since they require very little amount of electricity consumption. d. Buzzer LCD module The paper related to finger based voting system uses a buzzer module for audible alerts when any wrong finger print was detected. The buzzer or beeper is an audio based signaling device. It 1095
7 is mainly designed as mechanical, electromechanical, or piezoelectric. There are many typical uses of buzzers and beepers which include alarm devices, timers and also based on confirmation of user inputs such as a mouse click or keystroke. IV CONCLUSION: Buzzer The existing voting system is an Integrating feature of all the hardware components been used and developed in it. The Presence of each and every module has been reasoned out and placed very carefully. Hence the contributing to the best working unit for a secured voting system has been designed perfectly. Secondly, using highly advanced IC s like finger print module, biometric technology with the help of growing technology, the project has been successfully implemented with a unique idea. Thus the project has been successfully designed and tested. The project Finger print based Voting Machine was designed to construct an automated voting machine using fingerprint module and push buttons. The finger print module captures fingerprint information through which the user can be identified and his vote will be taken into account. The required information was displayed on LCD. This project can be extended using a GSM module and 3G technology. GSM intimates the bank authorities and the owner of the locker if the password is entered wrongly for 3 times continuously and 3G technology is used to have a photograph of the person who entered wrong password, which helps a lot in security issues. REFERENCES: 1. Jain, A et al (1997) "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and Machine Intelligence VOL. 19, No. 4, 1997:
8 2. Electronic Voting (2009), Available from com/terminology_electronicvoting.pdf 3. T Kohno et al.(2004), Analysis of Electronic Voting, IEEE Symposium on Privacy and Security. 4. D Deville et al(2003), Smart Card Operating system: Past, Present and Future.Proceedings of Fifth USENIX/NordU Conference, Vaster as, Sweden 5. Nalini K. Ratha, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40, no. 3, pp , A. Abhyankar, S. Schuckers, Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques, in Proc. International Conference On Image Processing, pp , Sujan Parthasaradhi, Reza Derakhshani, L Hornak, S. A. C. Schuckers, Time-series detection of perspiration as a liveness test in fingerprint scanners, IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, vol. 35, no. 3, pp , August M.Kaur, M. Singh, A. Girdhar, and P. S. Sandhu, "Fingerprint verification system using minutiae extraction technique". World Academy of Science, 1097
Implementation of Aadhaar Based EVM
Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:
More informationBIOMETRIC PRINTER SECURITY SYSTEM
BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering
More informationInternational Journal of Informative & Futuristic Research ISSN:
Reviewed Paper Volume 3 Issue 12 August 2016 International Journal of Informative & Futuristic Research Fingerprint Based Vehicle Security Paper ID IJIFR/V3/ E12/ 007 Page No. 4486-4494 Research Area Embedded
More informationDesign and implementation of fingerprint based bank locker system using ARM7 and GSM
Design and implementation of fingerprint based bank locker system using ARM7 and GSM Pooja Ausekar 1, Shraddha Kshirsagar 2, Puja Lawate 3, Prof. Mr. Sujit A. Inamdar 4 1,2,3 Student, Department of electronics
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India
More informationREDACTION BASED ATM MONITORING SYSTEM USING MSP 430
REDACTION BASED ATM MONITORING SYSTEM USING MSP 430 Introduction: Now a day s electronic devices become smaller and lower in power Requirements, and they are less expensive. we have begun to adorn our
More informationIn this unit we are continuing our discussion of IT security measures.
1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems
More informationMinutiae Based Fingerprint Authentication System
Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising
More informationCIS 4360 Secure Computer Systems Biometrics (Something You Are)
CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationBiometric Security Roles & Resources
Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures
More informationTouchless Fingerprint recognition using MATLAB
International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless
More informationCSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018
CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)
More informationRole of Biometrics in Cybersecurity. Sam Youness
Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday
More informationBIOMETRIC BASED VOTING MACHINE
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE
More informationBiometric Security Technique: A Review
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.
More informationAdvanced Biometric Access Control Training Course # :
Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic
More informationBIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal
BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION
More informationGurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3
Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander
More informationBIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS
BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,
More informationBiometrics Our Past, Present, and Future Identity
Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti
More informationAn Overview of Biometric Image Processing
An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional
More informationAuthentication Technologies
Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something
More informationFINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION
International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION
More informationSECURITY ENHANCEMENT OF E-VOTING SYSTEM
SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses
More informationANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti Ganesh* 1
e-issn 2277-2685, p-issn 2320-976 IJESR/June 2014/ Vol-4/Issue-6/480-484 Gunaganti Ganesh/ International Journal of Engineering & Science Research ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti
More informationBiometric Palm vein Recognition using Local Tetra Pattern
Biometric Palm vein Recognition using Local Tetra Pattern [1] Miss. Prajakta Patil [1] PG Student Department of Electronics Engineering, P.V.P.I.T Budhgaon, Sangli, India [2] Prof. R. D. Patil [2] Associate
More informationMinutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System
Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification
More informationDesign And Implementation Of Ordering System For Restaurants
Design And Implementation Of Ordering System For Restaurants V. Swapna (A), M. Firdouse Ali Khan (B) (a) Department of ECE, ATRI, Parvathapur, Hyderabad. (b) Snr.Asst.Professor, Department of ECE, ATRI,
More informationIJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:
SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,
More informationELCT708 MicroLab Session #1 Introduction to Embedded Systems and Microcontrollers. Eng. Salma Hesham
ELCT708 MicroLab Session #1 Introduction to Embedded Systems and Microcontrollers What is common between these systems? What is common between these systems? Each consists of an internal smart computer
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationKeywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable
More informationGENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION
GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION S.Pooranachandran 1, E.Aravind 2, D.Bharathipriya 3, A.K.Gokul 4,E.Karthika 5, Department of Electronics and Communication Engineering.
More informationA Review of Emerging Biometric Authentication Technologies
International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication
More informationBiometrics problem or solution?
Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these
More informationStuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication
Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals
More informationAbstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;
Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints
More informationInternational Journal of Emerging Technology & Research
International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Biometric Based Attendance Management System Using Wi-Fi
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FLASH FLOOD INTIMATION OVER GSM NETWORK TO THE STATION MASTER MR ADITYA V MOHOD
More informationSecure and Private Identification through Biometric Systems
Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant
More informationFingerprint Recognition using Fuzzy based image Enhancement
Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India
More informationSecure Authentication for Internet environment using Biometric and One-Time Password
UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time
More informationBiometric Vehicle Access System Using Fingerprint Recognition
Biometric Vehicle Access System Using Fingerprint Recognition G. Srikanth 1, U. Ramakrishna 2 1 Communication & Signal Processing M. Tech, 2 Assistant professor ECE Department R.V.R& J.C College OF Engineering,
More informationMicroProcessor. MicroProcessor. MicroProcessor. MicroProcessor
1 2 A microprocessor is a single, very-large-scale-integration (VLSI) chip that contains many digital circuits that perform arithmetic, logic, communication, and control functions. When a microprocessor
More informationImplementing the Concept of Biometrics Recognition System in Voting Machine
Implementing the Concept of Biometrics Recognition System in Voting Machine B. Pushpalatha, PG Scholar S. Vimalathithan, Associate Professor Department of Computer Science and Engineering Department of
More informationIntroduction. Bio-LYNX can be customized according to the requirements of the customer.
Bio-LYNX Introduction Bio-LYNX is one the most advanced attendance machine packed with latest technology and updated features. It is a Wi-Fi, GPRS, GPS enabled attendance device with multiple operational
More information[Swain, 4(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ANDROID BASED FINGERPRINT SENSOR ATTENDANCE SYSTEM Kaliprasanna Swain *, M.V.S.V Prasad, Anwesha Dash *123 Electronics and Communication
More informationFeatures. NOTE: Customization Possible (As per the requirement).
Industrial Bio-LYNX Introduction Industrial Bio Lynx is another masterpiece from Star Link in the segment of Industrial Models that serve its purpose of attendance perfectly. It features transaction storage
More informationIGNITION BASED ON FINGERPRINT RECOGNITION
IGNITION BASED ON FINGERPRINT RECOGNITION 1 Amit Saxena, 2 Sarthak Sharma, 2 Shivam Gaur, 2 Shubham Chauhan, 2 Shantanu Varshney 1 Assistant Professor, Dept. of E&C Engg., MIT Moradabad Ram Ganga Vihar,
More informationBiometric Cryptosystems: for User Authentication
Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,
More informationHighly Secure Authentication Scheme: A Review
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:
More informationImplementation of the USB Token System for Fingerprint Verification
Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,
More informationBiometric Online Signature Verification with added Security of unique ID
ISSN(Online): 23198753 ISSN (Print): 23476710 Biometric Online Signature Verification with added Security of unique ID Anjali Deshpande 1, Shivani Pandita 2 P.G. Student, Department of Electronics and
More informationFINGERPRINT BIOMETRICS
FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...
More informationAuthentication: Beyond Passwords
HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint
More informationDUALGSM MODEMS BASED IRRIGATION WATER PUMP CONTROLLER FOR ILLITERATES
DUALGSM MODEMS BASED IRRIGATION WATER PUMP CONTROLLER FOR ILLITERATES This project aims in providing a user friendly, reliable and automated water pumping system for illiterates. Now a day s technology
More informationDesign of Campus one-finger Service System Based on Fingerprint Identification
Design of Campus one-finger Service System Based on Fingerprint Identification Shouxi Zhu Aviation Information Technology R&D Center Binzhou University Binzhou, China Wenlai Ma Flying College of Binzhou
More informationARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility.
ARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility. Introduction: Some people will try to steal the property which may endanger the safety of money in the bank, house
More informationINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM
More informationAccess Control Biometrics User Guide
Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This
More informationImplementation of ATM security using IOT
Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering
More informationD. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,
Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Two Step Verification
More informationTypes of Peripheral Devices
DSB International Public School Rishikesh Class VII Computer Science L1 - More Peripherals A computer peripheral is a device that is connected to a computer but is not part of the core computer architecture.
More informationBiometrics Hybrid System Based Verification
Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,
More informationFingerprint Identification System Based On Neural Network
Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India
More informationSECURE DIGITAL ACCESS SYSTEM USING IBUTTON
SECURE DIGITAL ACCESS SYSTEM USING IBUTTON Access control forms a vital link in a security chain. Here we describe a secure digital access system using ibutton that allows only authorised persons to access
More informationKeywords Digital IC tester, Microcontroller AT89S52
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Digital Integrated
More informationA UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES
A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES The main aim of this project is to introduce a new universal remote control that gives easy-to-control interface for
More informationA REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC
A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC Samruddhi Shendre 1, Amita Thakare 2 1Samruddhi Shendre, Dept. of ECE, Priyadarshini Bhagwati College of Engineering, Nagpur 2Professor.
More informationBiometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS
www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,
More informationMultimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint
Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)
More informationSmart Card and Biometrics Used for Secured Personal Identification System Development
Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica
More informationInformation Security Identification and authentication. Advanced User Authentication II
Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background
More information6. Multimodal Biometrics
6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve
More informationFingerprint Authentication for SIS-based Healthcare Systems
Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it
More informationKeystroke Dynamics: Low Impact Biometric Verification
Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,
More informationA Survey on Security in Palmprint Recognition: A Biometric Trait
A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or
More informationBiometric Security System Using Palm print
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationAUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2
Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar
More informationAn Algorithm for Feature Level Fusion in Multimodal Biometric System
An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure
More informationGlobal Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017
Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile
More informationBIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES
BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant
More informationGE-INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH VOLUME -3, ISSUE -5 (May 2015) IF ISSN: ( )
DESIGN AND IMPLEMENTATION OF MICROCONTROLLER BASED SPEED DATA LOGGER Kriti Jain *, Prem Chand #, Saad Shamsi #, Dimple Taneja #, Rahul Yadav #, Sanjeev Yadav # *Assistant Professor, ECE Department, Amity
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation
More informationDepartment of Information Technology Avinashilingam Deemed University,Coimbatore, India 1 2
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 29 BVM SYSTEM USING FINGER PRINT, PHONIC &TELEGENIC APPERCEPTION FOR ENFEEBLE PEOPLE 1 C.Roopa, 2 A.Manimala 1 UG
More informationEncryption of Text Using Fingerprints
Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,
More informationAn Efficient on-line Signature Verification System Using Histogram Features
RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai
More informationPALM VEIN TECHNOLOGY
Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)
More informationBIOMETRIC BASED USER AUTHENTICATION USING SMART CARD
BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD P.RAMESH 1, Y.BALAGANGADHAR REDDY 2 1 P.Ramesh, M.Tech student, Dept Of ECE, Priyadashini Institute Of Technology, Ramachandrapuram, Tirupathi, Jntu
More informationThe Design of Fingerprint Biometric Authentication on Smart Card for
The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia
More informationTechnical Challenges for Biometric Science
Technical Challenges for Biometric Science 1 Dilip Tamboli, 2 Sandeep B Patil, 3 Dr. G.R.Sinha 1 P.G. Scholar, Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India 2 Associate Prof.,
More informationBIOMETRIC BASED USER AUTHENTICATION USING SMART CARD
BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD SHANIGARAPU NAVEEN 1, S. RANJITH KUMAR 2 S. Naveen, M.Tech student, Dept Of ECE, Ganapathy engineering college, rangashaipet, Warangal, Telangana, India.
More informationThumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password
Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,
More informationANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL
ANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL 1, Neha Verma 2 1 B.E. Student, sumit.dashore007gmail.com, 2 Asst. Professor, nv5678@gmail.com Shri Shankaracharya Institute
More informationIdentification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:
Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:
More informationIEEE PROJECTS ON EMBEDDED SYSTEMS
S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of
More informationGSM+GPS Based School Kids Tracking System
GSM+GPS Based School Kids Tracking System Introduction: In this project, the tracking system will used GPS (Global Positioning System) and GSM(Global System for Mobile Communications)as the tracking system
More informationKeywords Palmprint recognition, patterns, features
Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm
More informationHYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha* 1, K. Sudhakar Reddy 2
ISSN 2277-2685 IJESR/June 2015/ Vol-5/Issue-6/516-521 G. Sumalatha et. al./ International Journal of Engineering & Science Research HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha*
More informationGPRS based SCADA implementation for multisensory security with SMS alerts.
GPRS based SCADA implementation for multisensory security with SMS alerts. Priyanka somashekhar malabagi 1, Latha shenoy 2 M.Tech Student, Microelectronics and Control Systems, NMAM Institute of Technology,
More information