Authenticating Machines by Using Human Biometric
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 6
Abstract
The main aim of this paper is to design and implement authenticating machines by using human biometric which can be organized in bank, secured offices and homes. In this system only authorized person can be used bank locker for recovery money. We have implemented a bank locker security system based on RFID card and GSM technology. In biometrics basic feature of human is matched to the existing data and depending on result of matching identification of a human being is traced. A face recognition system using the space invariant features transformation (SIFT) algorithm was implemented. The algorithm is based on image features approach which represents a SIFT space invariant features transformation method in which a small set of significant features are used to describe the variation between face images. The biometric and GSM security has more advantages than other system. Because biometric is stored individual identity of a person and GSM system is used for sending and receiving message.
Authors and Affiliations
Amita Thakare, Samruddhi Shendre
Sensitivity Analysis of High Speed Sense Amplifier
In this paper we have examined the sensitivity Of Current Mirror Sense amplifier at different values of Vdd and W/L ratio.We have verified the results of sensitivity at 180 nano meter technology. In this Paper we will s...
Efficient Mobile Uplink LTE System Using Scfdma and Biorthogonal Wavelets
Mobile communications is one of the evolutionary technology in now a days. In this paper the proposed system is widely focused on to increase the efficiency of the mobile communications system in terms of decreasing the...
Fertility, Parity Progression Ratio and Population Growth of Assam: A Statistical Analysis
The study of fertility provides important information about women reproductive behavior and attitudes. The study of religious differentials in fertility is all the more important and intriguing in the case of Assam beca...
Security Augmentation of Cloud
Cloud gives us many reasons for use. It is an integration of computation devices which includes hardware, software, integrated services which may used by more than one use in more reliable and effective way of computing...
Investigating Image Processing Techniques on Using Face Recognition
Algorithms based on Principal Component Analysis (PCA) and subspace Linear Discriminate Analysis (LDA) are popular in face recognition. PCA is used to perform dimension reduction on human face data and LDA creates anoth...