Abstract- In this paper the method face Recognition is using to access Automated teller machines (ATMs). ATMs are used to do banking function like checking balance withdraw money, changing pin numbers etc. The ATM cards and pin numbers are used for security purpose. But this system is using SIM card in place of ATM cards. In order to improve security the system first authenticate the person if he/she is recognized then it will ask the password of the account. This system used Spartan 3 FPGA board to control the system. One buzzer is connected on the FPGA board which gives instructions to the user to access the Account. If the person is not authenticated then the process is terminated and the output is show on FPGA board with the help of LEDs.
Keywords- Recognition, ATM, PCA, GSM, FPGA, Euclidian distance
I. INTRODUCTION
The face recognition plays very important role in security system [4]. The main objective of face recognition is to recognize person from pictures or video using databases of face. There are a lots of variation to design a face recognition is not an easy task [2]. Due to variation in illumination, facial expression and poses variations it is difficult to do face recognition [7]. A number of defense , security and commercial application demand real time face recognition system, especially when other biometric technique are not feasible [1]. In this paper the system is using face recognition to access the ATM. Automated teller machines (ATMs) are used by user to do banking function like withdraw money, checking balance etc. In these days ATMs are very popular because it works all days of the week and it provides 24 hours service. We can find ATMs anywhere in cities, railway stations, near societies, near restauran...
... middle of paper ...
...otani, Feifei Lee and Tadahiro Ohmi,” Face Recognition Using Self-Organizing Maps” www.intechopen.com
[6] Rala M. Ebied,” Feature Extraction using PCA and Kernel-PCA for Face Recognition”, in The 8th International Conference on INFOrmatics and Systems Computational Intelligence and Multimedia Computing Track , 2012 ,pp mm72-mm77
[7] Mohammed Alwakeel , Zyad Shaaban ,”Face Recognition Based on Haar Wavelet Transform and Principal Component Analysis via Levenberg-Marquardt Backpropagation Neural Network” in European Journal of Scientific Research,2010 pp. 25-31
[8] Kyungnam Kim, “Face Recognition using Principle Component”, Analysis” www.google.com
[9] Kyungnam Kim, “Face Recognition using Principle Component”, Analysis” www.google.com
[10] Lindsay I Smith, “A tutorial on Principal Components Analysis” February 26, 2002
[11] www.mathwork.com
[12] www.google.com
[5] W.Zhang, S.Shan, ”Local Gabor binary pattern histogram sequence (LGBPHS): a novel non-statistical model for face representation and recognition,” ICCV, vol. 1, pp.786-791, 2005.
Biometrics is, “the automated use of physiological or behavioral characteristics to determine or verify identity (biometricgroup.com, 2014).”16 The purpose of the paper is to provide information about different forms of Biometrics. With the ever increasing threat of terrorism at home and abroad, biometrics is emerging as a way to increase security across the world. It is important to point out current issues dealing with Biometrics and how they relate to people that may one day have to use them.
...hniques such as correlation-based matching, minutiae-based matching, and pattern-based (or image-based) matching uses standard dataset for testing purpose. But Practically due to some physical changes in finger during verification ,system gets failed. Various fingerprint matching techniques do not authenticate wrinkled fingers. Thus error rate gets increased when matching is done between dry and wet-wrinkled fingers .Thus proposed system will extract features which will not change even after wrinkling. The proposed system will use minutiae based matching due to which error rate can be reduced. The Wet and Wrinkled Fingerprint (WWF) dataset is used to check the performance of proposed system. In this dataset there are wrinkled fingers due to wetness also some samples of dry fingers. Thus proposed matching algorithm will improve fingerprint recognition for wet fingers.
Within the article the authors point out the use of biometric and multi-modal authentication techniques, pointing out the strengths and weaknesses of different authentication approaches. The article has substantial background information and study results, not only point out the impact of such methods but also shows how the active authentication can take place to benefit the
Hirayama, T., Iwai, Y., & Yachida, M. (2007, May). Integration of facial position estimation and person identification for face authentication [Electronic Version]. Systems & Computers in Japan, 38(5), 43-58.
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
Facial recognition isn’t simply just recognizing a face and knowing who that person is. We perceive faces as whole not as a collection of different features. It can be done in three steps; 1. presence of the face is noticed, 2. The face is then measured to find distinguishing
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
Facial recognition has been around in digital form since 1964 after Woody Bledsoe and his team, funded by an unnamed intelligence agency, began using computers to recognize "landmark" features on faces in photographs (Thorat, 2010).
The definition of electronic door lock relates to electronic locks, and in particular, to an electronic recognition lock which automatically releases an electronically controlled door bolt in response to the reception of a coded sequence of signals transmitted by a transponder unit carried by a person desiring to open the lock. [1] We propose to improve the door-locking security system by combining many functions in an electronic door lock; we can call it as Smart Door Lock as well.
Scrimin, S., Moscardino, U., Capello, F., Altoe, G., & Axia, G. (2009). Recognition of facial
Computerized facial recognition is an old idea conceived decades ago, but the use of it has accelerated since the 1990s, due to cheaper technology and...
Lyons et al. [6] Classifying facial attributes using a 2-D Gabor wavelet representation and discriminant analysis used a set of multi scale, multi orientation Gabor filters to transform the images first. The Gabor coef...
“The term -information security- means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction” (United States Code, 2008). In order to ensure the identity of who is trying to access the information, the concept of “Biometric Technology” has been developed in the last years. This essay will start explaining this concept and the characteristics of its development through the time. Then, the essay will offer a brief explanation of biometric systems operation and a description of different biometric systems developed until now. Finally, this research analyzes the current and future applications and the issues that surround it.
Abstract—Because of the drawbacks of the text based authentication systems, graphical passwords are the most preferable type of authentication mechanism , where users click on images for the authentication purpose. The main goal of an authentication system is to help users for selecting the better password. If the password is created by the user , then it is easy to guess by an attacker and if the passwords is assigned by the system, then it is difficult for the user to memorize. So modern researches conclude that graphical passwords are most preferable authentication system. A graphical password uses images or representation of images as passwords. Human brain can easily recollect the graphical image secret word compare to Text secret word..