INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Size: px
Start display at page:

Download "INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY"

Transcription

1 INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FINGER PRINT BASED ELECTRONIC VOTING MACHINE PROF. K. M. PIMPLE 1, MISS. PALLAVI M. KOLHE 2, MISS. KOMAL P. BARAMKAR 2, MISS. ASHWINI G. MANKAR 2, MISS. VAISHALI JAMBHE 2 1. Assistant Professor, Department of EXTC, IBSS COE Amravati. 2. Final year EXTC, IBSS COE Amravati, Maharashtra, India. Accepted Date: 05/03/2015; Published Date: 01/05/2015 Abstract: In this paper we propose a completely automated E- voting system. Authentication is the bigger concern at the time of voting. Recognizing the need of authentication, we developed an automated system with user friendly access using finger print sensor module. The sensor is a solidstate fingerprint sensor that reliably captures fingerprint information and was designed to integrate into devices for improved authentication and convenience. It provides a reliable, quick and userfriendly alternative to passwords and even for PIN's and other forms of user authentication. We make use of this device to construct an E-voting machine. Whenever a person puts his finger over the finger print module, if that is authenticated, the system will ask him to select the respective contestant. After that is done, his vote will be counted. When a person has casted his vote, the corresponding officer presses a button confirming that the particular finger print has casted the vote. So in case if the same person tries to caste again, \ it will not allow that. The number of votes each contestant got is displayed on LCD. Keywords: Finger print system, LCD, Biometrics. Corresponding Author: PROF. K. M. PIMPLE Access Online On: How to Cite This Article: PAPER-QR CODE K. M. Pimple, IJPRET, 2015; Volume 3 (9):

2 INTRODUCTION Biometrics refers to metrics related to human characteristics and traits. Biometrics authentication is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. Biometric identifiers are very distinctive, and also have measurable characteristics that are used to label and describe every biometric individual. Biometric identifiers are divided or categorized as physiological versus behavioral characteristics. The Physiological characteristics are mostly related to the shape of the body like examples palm veins, face recognition, DNA, palm print, hand geometry, iris recognition, retina and odour/scent include, but are not limited to fingerprint. The second category is Behavioral characteristics which are completely related to the pattern of behavior of a person, gait, and voice including but not limited to typing rhythm. Some other researchers have coined a term as behaviometrics which describes the latter class of biometrics. In past or earlier days more traditional means of security access control were used. These systems include token-base identification systems, such as a driver's license or passport, or any kind of knowledge-based identification systems, such as a password or any personal identification number. Subsequent biometric identifiers are unique to differentiate the individuals so the identification process is simpler and easier, than compared to prior methods. II. RELATED WORK: A method of voting system or electoral system is a defined as, by which voters can make a choice between options, often in an election. The voting system accomplishes the rules to ensure valid voting, and also how votes are counted and to aggregate the final result. Most common voting systems are based on the majority rule, a proportional representation voting 1091

3 with a number of variations and methods such as first-past-the-post or preferential voting. The study of conventionally defined voting systems which is named as social choice theory or voting theory, consists of a subfield with political science, economics, or mathematics. In the Proposed system we used Finger print sensor which is a solid-state fingerprint sensor that reliably captures the fingerprint information. It is designed to incorporate for different devices to provide an improved authentication and also for the purpose of convenience. This sensor module provides a reliable, quick and user-friendly alternative to passwords, along with PIN's and other forms of user authentication details. Aforementioned identification process using finger print will change slightly between different products and systems. These Standard systems are comprised of a sensor for scanning a fingerprint and a processor which stores the fingerprint database and software which compares and also matches the fingerprint to the predefined database. Within the database, a fingerprint is consistently matched to a reference number, or any PIN number which is then again matched to a person's name or account. The primary information about fingerprint is that, it is unique for each and every person. O it is for even a twin brother will not have the same fingerprints. Hence each fingerprint is used to store a unique identifiable piece of data base or any information. The uniqueness in each fingerprint is due to the peculiar genetic code of DNA which is present in every person. This code causes the formation of a different pattern of our fingerprint. The other characteristics of the finger print are shown in the above image. These characteristics may also helpful during the process of minutiae for extraction. The unique information used for the identification process also includes the flow of the friction ridges, the sequence and the presence/absence of the individual friction ridge path features. A single fingerprint consists of ridges and valleys. These ridges and valleys both together provide friction for the skin. The primary identification of the skin is based upon the minutiae, which absolutely is the location and direction of the ridge endings and splits along a ridge path II. PROPOSED METHODOLOGY: In this paper we are presented a biometric finger print based voting system. We make use of this device to construct voting machine. Whenever a person puts his finger over the finger print module, if that is authenticated, the system will ask him to select the respective contestant. After that is done, his vote will be counted. When a person has casted his vote, the corresponding officer presses a button confirming that the particular finger print has casted the 1092

4 vote. So in case if the same person tries to caste again, it will not allow that. The number of votes each contestant got is displayed on LCD. The present system uses an onboard minicomputer named as PIC microcontroller which consists of number of input and output ports. The input and output port of the micro controller are interfaced with different input and output modules depending on the requirements. The current system uses finger print module, selection buttons as input to the microcontroller and the LCD and buzzer as output modules. In other words micro controller acts as a communication medium for all the modules involved in the project. The system also performs an health check indication of microcontroller using LED indicators. The device also consists of LCD which displays the required information and also alerts the user when any wrong finger authentication was detected then LCD displayed the message NOT MATCHED Finger print based Voting Machine PIC Micro controller Finger print module Buzzer Driver Buzzer LED Indicators Crystal Oscillator Reset Button Control Buttons LCD Driver LCD Filter O/P 5V DC I/O 230V Transformer Rectifier Regulator Regulated power supply. a. Fingerprint: The present system uses finger print module and the Fingerprint processing includes two parts: fingerprint enrollment and fingerprint matching (the matching can be 1:1 or 1:N).When enrolling, the finger print the user needs to enter the finger twice. The system will process the twice given finger images, and generates a template of the finger based on processing results. 1093

5 And this template is stored. When matching, any finger prints the user enters the finger through optical sensor and system will generate a template of the finger and compare it with templates of the fingers stored in library. For 1:1 matching, system will compare the live finger with specific template designated in the Module; for 1: N matching, or searching, system will search the whole finger library for the matching finger. In both circumstances, the system will provide the results of matching either success or failure. b. Microcontroller The microcontroller used in the proposed system is PIC which stands for Peripheral Interface Controller given by Microchip Technology to identify its single-chip microcontrollers. PIC microcontrollers are very successful in 8-bit microcontrollers. This project makes use of an onboard mini computer, which is usually termed as micro controller. It acts as heart of the project. This onboard computer can efficiently communicate with the output and input modules which are being used. The controller contains some internal memory to store the program code. This memory is also used to dump some set of assembly instructions into the controller and these help for the functioning of the controller. The crystal oscillator speed that can be connected to the PIC microcontroller ranges from up to 20Mhz. Using the CCS C compiler usually 20Mhz oscillator will be used. The cost of the microcontroller is also very cheaper. The 20 MHz crystal oscillator should be connected with about 22pF capacitor. There are 5 input/output ports on PIC microcontroller namely port A port B port C port D and port E. Ever single port has different based functionality. Most of them can be used as general I/O ports. The microcontroller uses Harvard architecture which separates both Program and Variable (data) memory interface. This facilitates fetching of an instruction and the operation on data/accessing of variables simultaneously. 1094

6 c. LCD Display module: Microcontroller One of the most common devices attached to a micro controller is an LCD display. Special thin flat panels that can let light go through it, or can block the light. Some of the most common LCD s connected to the many microcontrollers are 16x2 and 20x2 LCD displays. It means that 16 characters per line by 2 lines were displayed and 20 characters per line by 2 lines were displayed, respectively. Liquid crystal displays are usually abbreviated as LCD s. These displays are often used in battery-powered devices, such as digital watches, since they require very little amount of electricity consumption. d. Buzzer LCD module The paper related to finger based voting system uses a buzzer module for audible alerts when any wrong finger print was detected. The buzzer or beeper is an audio based signaling device. It 1095

7 is mainly designed as mechanical, electromechanical, or piezoelectric. There are many typical uses of buzzers and beepers which include alarm devices, timers and also based on confirmation of user inputs such as a mouse click or keystroke. IV CONCLUSION: Buzzer The existing voting system is an Integrating feature of all the hardware components been used and developed in it. The Presence of each and every module has been reasoned out and placed very carefully. Hence the contributing to the best working unit for a secured voting system has been designed perfectly. Secondly, using highly advanced IC s like finger print module, biometric technology with the help of growing technology, the project has been successfully implemented with a unique idea. Thus the project has been successfully designed and tested. The project Finger print based Voting Machine was designed to construct an automated voting machine using fingerprint module and push buttons. The finger print module captures fingerprint information through which the user can be identified and his vote will be taken into account. The required information was displayed on LCD. This project can be extended using a GSM module and 3G technology. GSM intimates the bank authorities and the owner of the locker if the password is entered wrongly for 3 times continuously and 3G technology is used to have a photograph of the person who entered wrong password, which helps a lot in security issues. REFERENCES: 1. Jain, A et al (1997) "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and Machine Intelligence VOL. 19, No. 4, 1997:

8 2. Electronic Voting (2009), Available from com/terminology_electronicvoting.pdf 3. T Kohno et al.(2004), Analysis of Electronic Voting, IEEE Symposium on Privacy and Security. 4. D Deville et al(2003), Smart Card Operating system: Past, Present and Future.Proceedings of Fifth USENIX/NordU Conference, Vaster as, Sweden 5. Nalini K. Ratha, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40, no. 3, pp , A. Abhyankar, S. Schuckers, Fingerprint liveness detection using local ridge frequencies and multiresolution texture analysis techniques, in Proc. International Conference On Image Processing, pp , Sujan Parthasaradhi, Reza Derakhshani, L Hornak, S. A. C. Schuckers, Time-series detection of perspiration as a liveness test in fingerprint scanners, IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews, vol. 35, no. 3, pp , August M.Kaur, M. Singh, A. Girdhar, and P. S. Sandhu, "Fingerprint verification system using minutiae extraction technique". World Academy of Science, 1097

Implementation of Aadhaar Based EVM

Implementation of Aadhaar Based EVM Implementation of Aadhaar Based EVM Kiran Chavan 1, Kashinath Raut 2, Ashish Bhingardive 3, Yogesh Kolape 4, D. M. Ujalambkar 5 1, 2, 3, 4, 5 Computer Department, Savitribai Phule Pune University Abstract:

More information

BIOMETRIC PRINTER SECURITY SYSTEM

BIOMETRIC PRINTER SECURITY SYSTEM BIOMETRIC PRINTER SECURITY SYSTEM A.S.Karthiga 1, k.saravanakumar 2, R.Aravind 3, M.Karthi 4, S.P.Dwarakesh M.E., 5, 1,2,3,4 UG Scholar, Dept. of EEE, 5 Assistant professor of EEE, Erode Sengunthar Engineering

More information

International Journal of Informative & Futuristic Research ISSN:

International Journal of Informative & Futuristic Research ISSN: Reviewed Paper Volume 3 Issue 12 August 2016 International Journal of Informative & Futuristic Research Fingerprint Based Vehicle Security Paper ID IJIFR/V3/ E12/ 007 Page No. 4486-4494 Research Area Embedded

More information

Design and implementation of fingerprint based bank locker system using ARM7 and GSM

Design and implementation of fingerprint based bank locker system using ARM7 and GSM Design and implementation of fingerprint based bank locker system using ARM7 and GSM Pooja Ausekar 1, Shraddha Kshirsagar 2, Puja Lawate 3, Prof. Mr. Sujit A. Inamdar 4 1,2,3 Student, Department of electronics

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 Enhancing Security in Identity Documents Using QR Code RevathiM K 1, Annapandi P 2 and Ramya K P 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu628215, India

More information

REDACTION BASED ATM MONITORING SYSTEM USING MSP 430

REDACTION BASED ATM MONITORING SYSTEM USING MSP 430 REDACTION BASED ATM MONITORING SYSTEM USING MSP 430 Introduction: Now a day s electronic devices become smaller and lower in power Requirements, and they are less expensive. we have begun to adorn our

More information

In this unit we are continuing our discussion of IT security measures.

In this unit we are continuing our discussion of IT security measures. 1 In this unit we are continuing our discussion of IT security measures. 2 One of the best security practices in Information Security is that users should have access only to the resources and systems

More information

Minutiae Based Fingerprint Authentication System

Minutiae Based Fingerprint Authentication System Minutiae Based Fingerprint Authentication System Laya K Roy Student, Department of Computer Science and Engineering Jyothi Engineering College, Thrissur, India Abstract: Fingerprint is the most promising

More information

CIS 4360 Secure Computer Systems Biometrics (Something You Are)

CIS 4360 Secure Computer Systems Biometrics (Something You Are) CIS 4360 Secure Computer Systems Biometrics (Something You Are) Professor Qiang Zeng Spring 2017 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Biometric Security Roles & Resources

Biometric Security Roles & Resources Biometric Security Roles & Resources Part 1 Biometric Systems Skip Linehan Biometrics Systems Architect, Raytheon Intelligence and Information Systems Outline Biometrics Overview Biometric Architectures

More information

Touchless Fingerprint recognition using MATLAB

Touchless Fingerprint recognition using MATLAB International Journal of Innovation and Scientific Research ISSN 2351-814 Vol. 1 No. 2 Oct. 214, pp. 458-465 214 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/ Touchless

More information

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018

CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 CSCE 548 Building Secure Software Biometrics (Something You Are) Professor Lisa Luo Spring 2018 Previous Class Credentials Something you know (Knowledge factors) Something you have (Possession factors)

More information

Role of Biometrics in Cybersecurity. Sam Youness

Role of Biometrics in Cybersecurity. Sam Youness Role of Biometrics in Cybersecurity Sam Youness Agenda Biometrics basics How it works Biometrics applications and architecture Biometric devices Biometrics Considerations The road ahead The Basics Everyday

More information

BIOMETRIC BASED VOTING MACHINE

BIOMETRIC BASED VOTING MACHINE Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 5, Issue 4, April-2018 BIOMETRIC BASED VOTING MACHINE

More information

Biometric Security Technique: A Review

Biometric Security Technique: A Review ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 9(47), DOI: 10.17485/ijst/2016/v9i47/106905, December 2016 Biometric Security Technique: A Review N. K.

More information

Advanced Biometric Access Control Training Course # :

Advanced Biometric Access Control Training Course # : Advanced Biometric Access Control Training Course # : 14-4156 Content A. Objectives 5 mins B. History of EAC- 10 mins C. Electronic Access Control in Todays World 20 mins D. Essential Components of Electronic

More information

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal

BIOMETRIC MECHANISM FOR ONLINE TRANSACTION ON ANDROID SYSTEM ENHANCED SECURITY OF. Anshita Agrawal BIOMETRIC MECHANISM FOR ENHANCED SECURITY OF ONLINE TRANSACTION ON ANDROID SYSTEM 1 Anshita Agrawal CONTENTS Introduction Biometric Authentication Fingerprints Proposed System Conclusion References 2 INTRODUCTION

More information

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3

Gurmeet Kaur 1, Parikshit 2, Dr. Chander Kant 3 1 M.tech Scholar, Assistant Professor 2, 3 Volume 8 Issue 2 March 2017 - Sept 2017 pp. 72-80 available online at www.csjournals.com A Novel Approach to Improve the Biometric Security using Liveness Detection Gurmeet Kaur 1, Parikshit 2, Dr. Chander

More information

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS

BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS BIOMETRIC IDENTIFICATION OF PERSONS A SOLUTION FOR TIME & ATTENDANCE PROBLEMS Emil PRICOP Petroleum-Gas University of Ploiesti, emil.pricop@gmail.com Keywords: fingerprint, RFID, access control, biometric,

More information

Biometrics Our Past, Present, and Future Identity

Biometrics Our Past, Present, and Future Identity Biometrics Our Past, Present, and Future Identity Syed Abd Rahman Al-Attas, Ph.D. Associate Professor Computer Vision, Video, and Image Processing Research Lab Faculty of Electrical Engineering, Universiti

More information

An Overview of Biometric Image Processing

An Overview of Biometric Image Processing An Overview of Biometric Image Processing CHAPTER 2 AN OVERVIEW OF BIOMETRIC IMAGE PROCESSING The recognition of persons on the basis of biometric features is an emerging phenomenon in our society. Traditional

More information

Authentication Technologies

Authentication Technologies Authentication Technologies 1 Authentication The determination of identity, usually based on a combination of something the person has (like a smart card or a radio key fob storing secret keys), something

More information

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION

FINGERPRINT RECOGNITION FOR HIGH SECURITY SYSTEMS AUTHENTICATION International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 1, Mar 2013, 155-162 TJPRC Pvt. Ltd. FINGERPRINT RECOGNITION

More information

SECURITY ENHANCEMENT OF E-VOTING SYSTEM

SECURITY ENHANCEMENT OF E-VOTING SYSTEM SECURITY ENHANCEMENT OF E-VOTING SYSTEM CHAPTER-4 Security is one of the most important issues for a reliable and trusted Electronic Voting system. The term E-Voting is used in different ways and it encompasses

More information

ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti Ganesh* 1

ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti Ganesh* 1 e-issn 2277-2685, p-issn 2320-976 IJESR/June 2014/ Vol-4/Issue-6/480-484 Gunaganti Ganesh/ International Journal of Engineering & Science Research ANTI THEFT CONTROL SYSTEM OF CAR USING ARM7 Gunaganti

More information

Biometric Palm vein Recognition using Local Tetra Pattern

Biometric Palm vein Recognition using Local Tetra Pattern Biometric Palm vein Recognition using Local Tetra Pattern [1] Miss. Prajakta Patil [1] PG Student Department of Electronics Engineering, P.V.P.I.T Budhgaon, Sangli, India [2] Prof. R. D. Patil [2] Associate

More information

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System

Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Minutiae vs. Correlation: Analysis of Fingerprint Recognition Methods in Biometric Security System Bharti Nagpal, Manoj Kumar, Priyank Pandey, Sonakshi Vij, Vaishali Abstract Identification and verification

More information

Design And Implementation Of Ordering System For Restaurants

Design And Implementation Of Ordering System For Restaurants Design And Implementation Of Ordering System For Restaurants V. Swapna (A), M. Firdouse Ali Khan (B) (a) Department of ECE, ATRI, Parvathapur, Hyderabad. (b) Snr.Asst.Professor, Department of ECE, ATRI,

More information

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN:

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 5, Oct-Nov, 2013 ISSN: SIMHA : Secure Biometric Multi-Host Authentication Ramya K P 1, Chithra Devi R 2 and Revathi M K 3 1 Information Technology, Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamil Nadu 628215,

More information

ELCT708 MicroLab Session #1 Introduction to Embedded Systems and Microcontrollers. Eng. Salma Hesham

ELCT708 MicroLab Session #1 Introduction to Embedded Systems and Microcontrollers. Eng. Salma Hesham ELCT708 MicroLab Session #1 Introduction to Embedded Systems and Microcontrollers What is common between these systems? What is common between these systems? Each consists of an internal smart computer

More information

Finger Print Enhancement Using Minutiae Based Algorithm

Finger Print Enhancement Using Minutiae Based Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,

More information

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization.

Keywords Wavelet decomposition, SIFT, Unibiometrics, Multibiometrics, Histogram Equalization. Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Secure and Reliable

More information

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION

GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION GENERATION OF SECURE ONE TIME PASSWORD FOR ATM SECURITY AND THEFT PROTECTION S.Pooranachandran 1, E.Aravind 2, D.Bharathipriya 3, A.K.Gokul 4,E.Karthika 5, Department of Electronics and Communication Engineering.

More information

A Review of Emerging Biometric Authentication Technologies

A Review of Emerging Biometric Authentication Technologies International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 7 Issue 2 Ver. IV February 2018 PP. 16-21 A Review of Emerging Biometric Authentication

More information

Biometrics problem or solution?

Biometrics problem or solution? Biometrics problem or solution? Summary Biometrics are a security approach that offers great promise, but also presents users and implementers with a number of practical problems. Whilst some of these

More information

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication

Stuart Hall ICTN /10/17 Advantages and Drawbacks to Using Biometric Authentication Stuart Hall ICTN 4040 601 04/10/17 Advantages and Drawbacks to Using Biometric Authentication As technology advances, so must the means of heightened information security. Corporate businesses, hospitals

More information

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric;

Abstract -Fingerprints are the most widely. Keywords:fingerprint; ridge pattern; biometric; Analysis Of Finger Print Detection Techniques Prof. Trupti K. Wable *1(Assistant professor of Department of Electronics & Telecommunication, SVIT Nasik, India) trupti.wable@pravara.in*1 Abstract -Fingerprints

More information

International Journal of Emerging Technology & Research

International Journal of Emerging Technology & Research International Journal of Emerging Technology & Research Volume 1, Issue 5, July-Aug, 2014 (www.ijetr.org) ISSN (E): 2347-5900 ISSN (P): 2347-6079 Biometric Based Attendance Management System Using Wi-Fi

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK FLASH FLOOD INTIMATION OVER GSM NETWORK TO THE STATION MASTER MR ADITYA V MOHOD

More information

Secure and Private Identification through Biometric Systems

Secure and Private Identification through Biometric Systems Secure and Private Identification through Biometric Systems 1 Keshav Rawat, 2 Dr. Chandra Kant 1 Assistant Professor, Deptt. of Computer Science & Informatics, C.U. Himachal Pradesh Dharamshala 2 Assistant

More information

Fingerprint Recognition using Fuzzy based image Enhancement

Fingerprint Recognition using Fuzzy based image Enhancement Fingerprint Recognition using Fuzzy based image Enhancement BhartiYadav 1, Ram NivasGiri 2 P.G. Student, Department of Computer Engineering, Raipur Institute of technology, Raipur, Chhattisgarh, India

More information

Secure Authentication for Internet environment using Biometric and One-Time Password

Secure Authentication for Internet environment using Biometric and One-Time Password UTM Computing Proceedings Innovations in Computing Technology and Applications Volume 2 Year: 2017 ISBN: 978-967-0194-95-0 1 Secure Authentication for Internet environment using Biometric and One-Time

More information

Biometric Vehicle Access System Using Fingerprint Recognition

Biometric Vehicle Access System Using Fingerprint Recognition Biometric Vehicle Access System Using Fingerprint Recognition G. Srikanth 1, U. Ramakrishna 2 1 Communication & Signal Processing M. Tech, 2 Assistant professor ECE Department R.V.R& J.C College OF Engineering,

More information

MicroProcessor. MicroProcessor. MicroProcessor. MicroProcessor

MicroProcessor. MicroProcessor. MicroProcessor. MicroProcessor 1 2 A microprocessor is a single, very-large-scale-integration (VLSI) chip that contains many digital circuits that perform arithmetic, logic, communication, and control functions. When a microprocessor

More information

Implementing the Concept of Biometrics Recognition System in Voting Machine

Implementing the Concept of Biometrics Recognition System in Voting Machine Implementing the Concept of Biometrics Recognition System in Voting Machine B. Pushpalatha, PG Scholar S. Vimalathithan, Associate Professor Department of Computer Science and Engineering Department of

More information

Introduction. Bio-LYNX can be customized according to the requirements of the customer.

Introduction. Bio-LYNX can be customized according to the requirements of the customer. Bio-LYNX Introduction Bio-LYNX is one the most advanced attendance machine packed with latest technology and updated features. It is a Wi-Fi, GPRS, GPS enabled attendance device with multiple operational

More information

[Swain, 4(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785

[Swain, 4(7): July, 2015] ISSN: (I2OR), Publication Impact Factor: 3.785 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ANDROID BASED FINGERPRINT SENSOR ATTENDANCE SYSTEM Kaliprasanna Swain *, M.V.S.V Prasad, Anwesha Dash *123 Electronics and Communication

More information

Features. NOTE: Customization Possible (As per the requirement).

Features. NOTE: Customization Possible (As per the requirement). Industrial Bio-LYNX Introduction Industrial Bio Lynx is another masterpiece from Star Link in the segment of Industrial Models that serve its purpose of attendance perfectly. It features transaction storage

More information

IGNITION BASED ON FINGERPRINT RECOGNITION

IGNITION BASED ON FINGERPRINT RECOGNITION IGNITION BASED ON FINGERPRINT RECOGNITION 1 Amit Saxena, 2 Sarthak Sharma, 2 Shivam Gaur, 2 Shubham Chauhan, 2 Shantanu Varshney 1 Assistant Professor, Dept. of E&C Engg., MIT Moradabad Ram Ganga Vihar,

More information

Biometric Cryptosystems: for User Authentication

Biometric Cryptosystems: for User Authentication Biometric Cryptosystems: for User Authentication Shobha. D Assistant Professor, Department of Studies in Computer Science, Pooja Bhagavat Memorial Mahajana Post Graduate Centre, K.R.S. Road, Metagalli,

More information

Highly Secure Authentication Scheme: A Review

Highly Secure Authentication Scheme: A Review e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Highly Secure Authentication Scheme:

More information

Implementation of the USB Token System for Fingerprint Verification

Implementation of the USB Token System for Fingerprint Verification Implementation of the USB Token System for Fingerprint Verification Daesung Moon, Youn Hee Gil, Sung Bum Pan, and Yongwha Chung Biometrics Technology Research Team, ETRI, Daejeon, Korea {daesung, yhgil,

More information

Biometric Online Signature Verification with added Security of unique ID

Biometric Online Signature Verification with added Security of unique ID ISSN(Online): 23198753 ISSN (Print): 23476710 Biometric Online Signature Verification with added Security of unique ID Anjali Deshpande 1, Shivani Pandita 2 P.G. Student, Department of Electronics and

More information

FINGERPRINT BIOMETRICS

FINGERPRINT BIOMETRICS FINGERPRINT BIOMETRICS White Paper JAN KREMER CONSULTING SERVICES Fingerprint Technology White Paper Page 1 TABLE OF CONTENTS 1. INTRODUCTION... 3 1.1. DOCUMENT OUTLINE... 3 1.2. BIOMETRICS OVERVIEW...

More information

Authentication: Beyond Passwords

Authentication: Beyond Passwords HW2 Review CS 166: Information Security Authentication: Beyond Passwords Prof. Tom Austin San José State University Biometrics Biometric Something You Are You are your key ¾ Schneier Examples Fingerprint

More information

DUALGSM MODEMS BASED IRRIGATION WATER PUMP CONTROLLER FOR ILLITERATES

DUALGSM MODEMS BASED IRRIGATION WATER PUMP CONTROLLER FOR ILLITERATES DUALGSM MODEMS BASED IRRIGATION WATER PUMP CONTROLLER FOR ILLITERATES This project aims in providing a user friendly, reliable and automated water pumping system for illiterates. Now a day s technology

More information

Design of Campus one-finger Service System Based on Fingerprint Identification

Design of Campus one-finger Service System Based on Fingerprint Identification Design of Campus one-finger Service System Based on Fingerprint Identification Shouxi Zhu Aviation Information Technology R&D Center Binzhou University Binzhou, China Wenlai Ma Flying College of Binzhou

More information

ARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility.

ARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility. ARM Based Bank Lockers Safety System Using Digital Key Password With Door Access Facility. Introduction: Some people will try to steal the property which may endanger the safety of money in the bank, house

More information

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES

INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES Scientific Journal Impact Factor (SJIF): 1.711 e-issn: 2349-9745 p-issn: 2393-8161 International Journal of Modern Trends in Engineering and Research www.ijmter.com INNOVATIVE AUTOMOBILE SECURITY SYSTEM

More information

Access Control Biometrics User Guide

Access Control Biometrics User Guide Access Control Biometrics User Guide October 2016 For other information please contact: British Security Industry Association t: 0845 389 3889 e: info@bsia.co.uk www.bsia.co.uk Form No. 181 Issue 3 This

More information

Implementation of ATM security using IOT

Implementation of ATM security using IOT Implementation of ATM security using IOT Mahalakshmi.T.K 1, J.Kumudha 2, M.Ranjitha 3, Mr.J.Gurumurthy 4, Dr.D.Sivakumar 5 1,2,3 Department of electronics and communication engineering, Easwari engineering

More information

D. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai,

D. Jagadeesan Assistant Professor, Dept. of Computer Science and Engineering, Adhiparasakthi College of Engineering, Kalavai, Volume 4, Issue 9, September 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Two Step Verification

More information

Types of Peripheral Devices

Types of Peripheral Devices DSB International Public School Rishikesh Class VII Computer Science L1 - More Peripherals A computer peripheral is a device that is connected to a computer but is not part of the core computer architecture.

More information

Biometrics Hybrid System Based Verification

Biometrics Hybrid System Based Verification Biometrics Hybrid System Based Verification Mahesh Naidu K #1, Prof Govindarajulu P *2 #1 Ph.D Research Scholar,Dept of Computer Science, SVU College of CM&CS, S.V. University, Tirupati, Andhra Pradesh,

More information

Fingerprint Identification System Based On Neural Network

Fingerprint Identification System Based On Neural Network Fingerprint Identification System Based On Neural Network Mr. Lokhande S.K., Prof. Mrs. Dhongde V.S. ME (VLSI & Embedded Systems), Vishwabharati Academy s College of Engineering, Ahmednagar (MS), India

More information

SECURE DIGITAL ACCESS SYSTEM USING IBUTTON

SECURE DIGITAL ACCESS SYSTEM USING IBUTTON SECURE DIGITAL ACCESS SYSTEM USING IBUTTON Access control forms a vital link in a security chain. Here we describe a secure digital access system using ibutton that allows only authorised persons to access

More information

Keywords Digital IC tester, Microcontroller AT89S52

Keywords Digital IC tester, Microcontroller AT89S52 Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Digital Integrated

More information

A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES

A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES A UNIVERSAL REMOTE CONTROLLER WITH HAPTIC INTERFACE FOR CUSTOMER ELECTRONIC DEVICES The main aim of this project is to introduce a new universal remote control that gives easy-to-control interface for

More information

A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC

A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC A REVIEW ON RESEARCH ON AUTHENTICATING MACHINES BY USING HUMAN BIOMERTRIC Samruddhi Shendre 1, Amita Thakare 2 1Samruddhi Shendre, Dept. of ECE, Priyadarshini Bhagwati College of Engineering, Nagpur 2Professor.

More information

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS

Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS www.ijcsi.org 366 Biometric Device Assistant Tool: Intelligent Agent for Intrusion Detection at Biometric Device using JESS Prof. Maithili Arjunwadkar 1, Prof. Dr. R. V. Kulkarni 2 1 Assistant Professor,

More information

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint

Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Multimodal Biometric System by Feature Level Fusion of Palmprint and Fingerprint Navdeep Bajwa M.Tech (Student) Computer Science GIMET, PTU Regional Center Amritsar, India Er. Gaurav Kumar M.Tech (Supervisor)

More information

Smart Card and Biometrics Used for Secured Personal Identification System Development

Smart Card and Biometrics Used for Secured Personal Identification System Development Smart Card and Biometrics Used for Secured Personal Identification System Development Mădălin Ştefan Vlad, Razvan Tatoiu, Valentin Sgârciu Faculty of Automatic Control and Computers, University Politehnica

More information

Information Security Identification and authentication. Advanced User Authentication II

Information Security Identification and authentication. Advanced User Authentication II Information Security Identification and authentication Advanced User Authentication II 2016-01-29 Amund Hunstad Guest Lecturer, amund@foi.se Agenda for lecture I within this part of the course Background

More information

6. Multimodal Biometrics

6. Multimodal Biometrics 6. Multimodal Biometrics Multimodal biometrics is based on combination of more than one type of biometric modalities or traits. The most compelling reason to combine different modalities is to improve

More information

Fingerprint Authentication for SIS-based Healthcare Systems

Fingerprint Authentication for SIS-based Healthcare Systems Fingerprint Authentication for SIS-based Healthcare Systems Project Report Introduction In many applications there is need for access control on certain sensitive data. This is especially true when it

More information

Keystroke Dynamics: Low Impact Biometric Verification

Keystroke Dynamics: Low Impact Biometric Verification Keystroke Dynamics: Low Impact Biometric Verification Tom Olzak September 2006 Biometrics has long been one of the solutions touted by security vendors to meet multifactor authentication objectives. However,

More information

A Survey on Security in Palmprint Recognition: A Biometric Trait

A Survey on Security in Palmprint Recognition: A Biometric Trait A Survey on Security in Palmprint Recognition: A Biometric Trait Dhaneshwar Prasad Dewangan 1, Abhishek Pandey 2 Abstract Biometric based authentication and recognition, the science of using physical or

More information

Biometric Security System Using Palm print

Biometric Security System Using Palm print ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2

AUTOMATED GARBAGE COLLECTION USING GPS AND GSM. Shobana G 1, Sureshkumar R 2 Volume 118 No. 20 2018, 751-755 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AUTOMATED GARBAGE COLLECTION USING GPS AND GSM Shobana G 1, Sureshkumar

More information

An Algorithm for Feature Level Fusion in Multimodal Biometric System

An Algorithm for Feature Level Fusion in Multimodal Biometric System An Algorithm for Feature Level Fusion in Multimodal Biometric System 1 S.K.Bhardwaj 1 Research Scholar, Singhania University, Jhunjhunu, Rajasthan (India) Abstract The increasing demand for high secure

More information

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017

Global Mobile Biometric Authentication Market: Size, Trends & Forecasts ( ) October 2017 Global Mobile Biometric Authentication Market: Size, Trends & Forecasts (2017-2021) October 2017 Global Mobile Biometric Authentication Market Report Scope of the Report The report entitled Global Mobile

More information

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES

BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES BIOMETRIC BANKING TECHNOLOGY TO SECURE ONLINE TRANSACTIONS WITH FEASIBLE BIOMETRIC DEVICES 1V. Sai Venkatalakshmi, 2 N. Deivanayaki, 3 A. Risvanul Jannah 1M.E student, 2 Associate Professor, 3 Assistant

More information

GE-INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH VOLUME -3, ISSUE -5 (May 2015) IF ISSN: ( )

GE-INTERNATIONAL JOURNAL OF ENGINEERING RESEARCH VOLUME -3, ISSUE -5 (May 2015) IF ISSN: ( ) DESIGN AND IMPLEMENTATION OF MICROCONTROLLER BASED SPEED DATA LOGGER Kriti Jain *, Prem Chand #, Saad Shamsi #, Dimple Taneja #, Rahul Yadav #, Sanjeev Yadav # *Assistant Professor, ECE Department, Amity

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor(SJIF): 3.134 e-issn(o): 2348-4470 p-issn(p): 2348-6406 International Journal of Advance Engineering and Research Development Volume 2,Issue 7, July -2015 Estimation

More information

Department of Information Technology Avinashilingam Deemed University,Coimbatore, India 1 2

Department of Information Technology Avinashilingam Deemed University,Coimbatore, India 1 2 International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 29 BVM SYSTEM USING FINGER PRINT, PHONIC &TELEGENIC APPERCEPTION FOR ENFEEBLE PEOPLE 1 C.Roopa, 2 A.Manimala 1 UG

More information

Encryption of Text Using Fingerprints

Encryption of Text Using Fingerprints Encryption of Text Using Fingerprints Abhishek Sharma 1, Narendra Kumar 2 1 Master of Technology, Information Security Management, Dehradun Institute of Technology, Dehradun, India 2 Assistant Professor,

More information

An Efficient on-line Signature Verification System Using Histogram Features

An Efficient on-line Signature Verification System Using Histogram Features RESEARCH ARTICLE OPEN ACCESS An Efficient on-line Signature Verification System Using Histogram Features Mr.Abilash S 1, Mrs.M.Janani, M.E 2 ME Computer Science and Engineering,Department of CSE, Annai

More information

PALM VEIN TECHNOLOGY

PALM VEIN TECHNOLOGY Palm Vein Technology 1 SRI VASAVI ENGINEERING COLLEGE Pedatadepalli, West Godavari Dist, A.P Department of Electrical & Electronics Engineering SEMINAR ON PALM VEIN TECHNOLOGY (TOUCHING THE PERFECTION)

More information

BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD

BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD P.RAMESH 1, Y.BALAGANGADHAR REDDY 2 1 P.Ramesh, M.Tech student, Dept Of ECE, Priyadashini Institute Of Technology, Ramachandrapuram, Tirupathi, Jntu

More information

The Design of Fingerprint Biometric Authentication on Smart Card for

The Design of Fingerprint Biometric Authentication on Smart Card for The Design of Fingerprint Biometric Authentication on Smart Card for PULAPOT Main Entrance System Computer Science Department, Faculty of Technology Science and Defence Universiti Pertahanan Nasional Malaysia

More information

Technical Challenges for Biometric Science

Technical Challenges for Biometric Science Technical Challenges for Biometric Science 1 Dilip Tamboli, 2 Sandeep B Patil, 3 Dr. G.R.Sinha 1 P.G. Scholar, Department of Electronics & Telecommunication Engg. SSGI Bhilai, C.G.India 2 Associate Prof.,

More information

BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD

BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD BIOMETRIC BASED USER AUTHENTICATION USING SMART CARD SHANIGARAPU NAVEEN 1, S. RANJITH KUMAR 2 S. Naveen, M.Tech student, Dept Of ECE, Ganapathy engineering college, rangashaipet, Warangal, Telangana, India.

More information

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password

Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Thumb based Biometric Authentication Scheme in WLAN using Gauss Iterated Map and One Time Password Sanjay Kumar* Department of Computer Science and Engineering National Institute of Technology Jamshedpur,

More information

ANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL

ANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL ANTI-THEFT VEHICLE SECURITY SYSTEM USING FINGERPRINT SCANNER AS WELL AS MANUAL 1, Neha Verma 2 1 B.E. Student, sumit.dashore007gmail.com, 2 Asst. Professor, nv5678@gmail.com Shri Shankaracharya Institute

More information

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts:

Identification, authentication, authorisation. Identification and authentication. Authentication. Authentication. Three closely related concepts: Identification, authentication, authorisation Three closely related concepts: Identification and authentication WSPC, Chapter 6 Identification: associating an identity with a subject ( Who are you? ) Authentication:

More information

IEEE PROJECTS ON EMBEDDED SYSTEMS

IEEE PROJECTS ON EMBEDDED SYSTEMS S.NO 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 PROJECT TITLES EMACS: Design And Implementation Of Indoor Environment Monitoring And Control System VOT-EL: Three Tier Secured State Of

More information

GSM+GPS Based School Kids Tracking System

GSM+GPS Based School Kids Tracking System GSM+GPS Based School Kids Tracking System Introduction: In this project, the tracking system will used GPS (Global Positioning System) and GSM(Global System for Mobile Communications)as the tracking system

More information

Keywords Palmprint recognition, patterns, features

Keywords Palmprint recognition, patterns, features Volume 7, Issue 3, March 2017 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Review on Palm

More information

HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha* 1, K. Sudhakar Reddy 2

HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha* 1, K. Sudhakar Reddy 2 ISSN 2277-2685 IJESR/June 2015/ Vol-5/Issue-6/516-521 G. Sumalatha et. al./ International Journal of Engineering & Science Research HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN G. Sumalatha*

More information

GPRS based SCADA implementation for multisensory security with SMS alerts.

GPRS based SCADA implementation for multisensory security with SMS alerts. GPRS based SCADA implementation for multisensory security with SMS alerts. Priyanka somashekhar malabagi 1, Latha shenoy 2 M.Tech Student, Microelectronics and Control Systems, NMAM Institute of Technology,

More information