Abstract- In this paper the method face Recognition is using to access Automated teller machines (ATMs). ATMs are used to do banking function like checking balance withdraw money, changing pin numbers etc. The ATM cards and pin numbers are used for security purpose. But this system is using SIM card in place of ATM cards. In order to improve security the system first authenticate the person if he/she is recognized then it will ask the password of the account. This system used Spartan 3 FPGA board to control the system. One buzzer is connected on the FPGA board which gives instructions to the user to access the Account. If the person is not authenticated then the process is terminated and the output is show on FPGA board with the help of LEDs.
Keywords- Recognition, ATM, PCA, GSM, FPGA, Euclidian distance
I. INTRODUCTION
The face recognition plays very important role in security system [4]. The main objective of face recognition is to recognize person from pictures or video using databases of face. There are a lots of variation to design a face recognition is not an easy task [2]. Due to variation in illumination, facial expression and poses variations it is difficult to do face recognition [7]. A number of defense , security and commercial application demand real time face recognition system, especially when other biometric technique are not feasible [1]. In this paper the system is using face recognition to access the ATM. Automated teller machines (ATMs) are used by user to do banking function like withdraw money, checking balance etc. In these days ATMs are very popular because it works all days of the week and it provides 24 hours service. We can find ATMs anywhere in cities, railway stations, near societies, near restauran...
... middle of paper ...
...otani, Feifei Lee and Tadahiro Ohmi,” Face Recognition Using Self-Organizing Maps” www.intechopen.com
[6] Rala M. Ebied,” Feature Extraction using PCA and Kernel-PCA for Face Recognition”, in The 8th International Conference on INFOrmatics and Systems Computational Intelligence and Multimedia Computing Track , 2012 ,pp mm72-mm77
[7] Mohammed Alwakeel , Zyad Shaaban ,”Face Recognition Based on Haar Wavelet Transform and Principal Component Analysis via Levenberg-Marquardt Backpropagation Neural Network” in European Journal of Scientific Research,2010 pp. 25-31
[8] Kyungnam Kim, “Face Recognition using Principle Component”, Analysis” www.google.com
[9] Kyungnam Kim, “Face Recognition using Principle Component”, Analysis” www.google.com
[10] Lindsay I Smith, “A tutorial on Principal Components Analysis” February 26, 2002
[11] www.mathwork.com
[12] www.google.com
The most predominant feature of the human face is eyes. When talking to a person our eyes meet there eyes; the way that people identify each other is through eyes; eyes even have the power to communicate on its own. Eliezer identified people buy there eyes and knew their emotions through their eyes. “Across the aisle, a beautiful women with dark hair and dreamy eyes. I had
In the editorial cartoon, Our Eyes Secure Your Safety, is dealing with giving up rights and freedoms. The cartoonist has presented the perspective that rejecting collectivism can be ineffective, which is shown by people walking around surrounded by video surveillance. The author uses irony of large eyes in the sky with big bold letters that states the quote our eyes secure individuals' safety to show the ideas presented on portraying negative notion on the subject of which is surrendering our rights and freedoms for more collective security; he/she also stresses the idea of individualism. The individualist view of a society without high government involvement was furthermore illustrated in the source by the idea of all the eyes, gloominess
...re either out of date or present controversial evidence (Grüter et al., 2008, pg. 82) (Dalrymple, 2010, pg. 2554-2555) (Rossion, 2008). The specific contributions of each structure is highly debated and continuously being researched. It is agreed upon that damage to any combination of these area is necessary and sufficient to produce facial recognition deficits (Rossion, 2008, pg. 424). Common ways to test the activity in the brain when it is processing faces is by using different event related potentials. One such ERP is the N170, which is believed to be particularly more sensitive to faces than to objects (Towler et al., 2012) (Dalrymple, 2010). However, researchers are not convinced that it actually is face specific (Earp, 2013). The p300 is used as well to test how long it takes the brain to recognize a face after being exposed (Towler et al., 2012, pg. 3588).
A cube a total of 6 sides, when it is places on a surface only 5 of
Biometrics is described as the use of human physical features to verify identity and has been in use since the beginning of recorded history. Only recently, biometrics has been used in today’s high-tech society for the prevention of identity theft. In this paper, we will be understanding biometrics, exploring the history of biometrics, examples of today’s current technology and where biometrics are expected to go in the future.
Stergiou, C., & Siganos, D. (2011, August 6). Neural Networks. Retrieved August 6, 2011, from
When Maxwell Smart first whipped out his shoe phone in 1965, everyone saw an act of pure movie magic. Back in the mid to late 1900s everybody had the same idea of the future. Everyone pictured the future as talking robots (Siri), computerized pocket-sized dictionaries (smart-phones), hovering devices (drones), and much more. Today, everyone thinks of these technologies as commonalities. Most of these current devices have a valuable impact, while few create debatable issues. The company NGI has a system that will revolutionize the field of biometric facial recognition. In the article titled Embracing Big Brother: How Facial Recognition Could Help Fight Crime, author Jim Stenman says, "The mission is to reduce terrorist and criminal activity by improving and expanding biometric identification as well as criminal history information s...
Speech is the common basic way we communication with each other. The development of voice biometrics is one that emerged to allow a user to input their voice into a computer system. It is a growing technology which provides security in computers. A speech recognition system is designed to assist the user to complete what that person wants to say versus having a person transcribe it. The first step in voice recognition is for the user to be trained and produce an actual voice sample. Through this process sounds, words or phrases are converted in electrical signals and then they are turned into a coding process by the system. The goal of voice recognition is to understand the human spoken voice.
Biometric technology is used for the ways humans can be identified by unique aspects of their bodies, such as fingerprints, body odor, our voices and many more. If one was to think about privacy rights, he/she would be concerned about the widespread adoption of these systems, since such systems could easily be used to develop a record of known rebellious people and/or dangerous criminals, to be used for social control purposes. Although that may seem pretty good and a positive thing for the society, one should take into account of the defects and errors of technology. Of the many biometrics technologies that are being developed and are already developed, facial recognition is one of the most threatening because it can be deployed secretly; one may not know whether or when they can be caught in a surveillance camera for such facial recognition biometrics. Additionally, tests have found that the miscalculations for facial biometrics technologies are very high. As a result, according to Privacy Rights Clearinghouse, innocent people can be erroneously identified as dangerous criminals and actual dangerous criminals and/or suspected terrorists can fail to be detected overall, allowing for a huge injustice and unfairness. Privacy rights concerned with biometrics have sparked a concern and should be dealt with; otherwise, this is just one of the
An ID card scanner displays and records data stored on a driver's license, state identification or military identification. Usually, it includes the age, date of birth, name, address and expiry date of the card. While it's easy to help a bouncer to reduce expired IDs and minor IDs, it does not automatically detect fake IDs. For an identification scanner that is most effective at detecting false IDs, the operator must manually compare the information printed on the ID with the information stored on the ID.
“The term -information security- means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction” (United States Code, 2008). In order to ensure the identity of who is trying to access the information, the concept of “Biometric Technology” has been developed in the last years. This essay will start explaining this concept and the characteristics of its development through the time. Then, the essay will offer a brief explanation of biometric systems operation and a description of different biometric systems developed until now. Finally, this research analyzes the current and future applications and the issues that surround it.
In early days, text based passwords are used for authentication . Text based password authentication uses alphanumeric letters for creating passwords . Here, users always creates password which is easy to remember but these passwords are easy for attackers to break. For provide more security, users use strong system assigned passwords which will be difficult for users to remember. Biometric and tokens [9] are used as an alternative to text based passwords. But it also has its own drawbacks such as it requires extra hardware for its implementation, so such methods are costly. As an alternative to all these methods, graphical passwords are used because psychological studies shows that human brain can recognize images better than the text.Graphical password uses images or representation of an image as a
Every day people are visiting airport to board a plane. To get into the airplane, people have to pass the airport security system. The airport security system will check the people and their stuff that they bring such as luggage and bag. The checker can be security guard, people detector machine, baggage scanner machine, dog and CCTV. It aims is to avoid the passengers from the contrabands or dangerous object such as drugs/illegal drugs, bomb, dangerous chemical materials, firearm weapon, metal weapon, and the other dangerous objects that can affects human lives and safety in airport and airplane. Security is the most important thing that the airport must have. Until today, sometimes some people in airport smuggles contraband into airplane by slip the contraband in the other object that can’t seen. Even security guard possibly not sees the contraband that is smuggled. That’s why the bag or people detector can help to detect the contraband.
As one of the feature of biometric, signature verification is used to find the authenticity of a person to give the access the most valued and important documents and shelf. Firstly the signature of a person are taken as a reference in database. To generate the database, number of attempts from the same person has been taken, as it would permit minute deviations in signatures that generates due to environmental conditions. Once it is done, then the signatures at other times are every time then verified with the existing database. Because of confidentially of the file/document/transaction giving access is the crucial process that should be monitored with perfection. The same happens with offline signature verification. Computerized process and verification algorithm (thus software) takes fully care of signature under test, generate results that are 100% authentic, and advocates credibility of the concerned person .However, there might raise issue of authenticity even if the same person performs the signature. Or, at times a forge person may duplicate the exact signature. Many research have been done to find the accuracy of result so as to prevent from forgery. Forgery is also divided into different categories depending upon their severity as
The Man Who Was Afraid of ATMs is a reflection of the hardships Chang (the protagonist) faced when forced to adjust to life in another country, while the three secondary characters adapt to the new life with minimal difficulties. Concepts that I’ll apply in this story is the ABCs of Acculturation, Acculturation Processes, Enculturation, Ethnocentrism and Gender Stereotypes.