SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 683
IMPROVED AUTHENTICATION USING ARDUINO BASED VOICE
AND IRIS RECOGNITION TECHNOLOGY
M. Usha Rani1
, J. Goutham2
, M. Parthiban3
1
M.E. Network Engg, Velammal College of Engineering and Technology, Tamil Nadu, India
2
B.Tech, Information Technology, Velammal College of Engineering and Technology, Tamil Nadu, India
3
MBBS, PES Institute of Medical Science and Research Institute, Andhra Pradesh, India
Abstract
Today authentication is the important one to improve the security in various applications Here the proposed system uses three
steps to allow the process that is initially enter the password and then give the voice as the input using the arduino
microcontroller it verifies the voice and then iris identification of the user. The user has to follow these steps and then only permit
to continue the process. Based on the proposed system it highly protects your site from the hackers improve the efficiency also.
The Iris recognition utilizes iris biometric technology to update the human’s iris image, verify it because this is the most secured
method to improve the resources and the data become so confidential. Particularly this proposed system used to improve the Bank
transaction via internet communication using the low cost arduino microcontroller. This system improves the authentication using
the three step method by input as a text password, voice input, Iris recognition technology
Keywords: Arduino Microcontroller, Password, Voice recognition, Iris recognition
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
The Arduino is an open-hardware platform ready to be used
and to create prototype based on easy to use and flexible
software and hardware.[6] Arduino can get information
from the environment through its pines from a lot of sensors
and it can control lights, motors and other devices. This type
of iris recognition biometric technology is the strong and
scientific demand for the proliferation of systems for iris
identification and recognition. This is the best because the
face and , finger print and other biometric trails they need so
many mathematical calculation and computer vision process
on the research area. Voice recognition is the technology by
which sounds, words or phrases spoken by the humans are
converted into the electrical signals, and these signals are
transformed into coding to which the control to be assigned
will work on it.
Fig 1 Voice Recognition types
Based on the approaches the template matching is the
technique has the high accuracy when it used properly. Here
to introduce the same template matching process.
Fig 2 Biometric technologies
Another area biometric iris recognition authentication
technique which is very useful with is physical security to
the applications which need more security to allow the
secured users only allow the process. This helps to alleviate
problems associated with swipe card access where some
systems have to be manually programmed with specific card
numbers and robust processes need to be in place to ensure
access lists are regularly reviewed. Swipe cards are also
easily lost, stolen or borrowed.
2. LITERATURE REVIEW
There is a use of iris recognition technology is within the
computing environment. Today the security is a very
important one to protect the data from the ethical aspects
and from the hackers. For example the bank transactions are
have more and more secure detail information in that case
the bank need more security in order protect their data
information and other details. [3]The user and the bank
working staff’s being able to access the network with their
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 684
username and password is the only authentication steps in
all application processes. In this approach we propose three
step security method incase to improve the security level
with low cost implementation. Why this three step
verification is important means if the username and
password may be stolen by any one means it affects the
major problem in their transaction.
[2] By providing the Voice recognition technology and the
iris recognition technology with addition to the username
and password method. Using this techniques the voice and
the iris are the more secured method and it is impossible to
replicate the same voice input password and the same iris as
a password and plus there is no more option to set the same
voice and iris in that time of password needed on the
network and these security steps are impossible to do by the
hackers. For these advance method the transactions are
become so safe and so secure at the time of transfer
information through the network. [6] In this the Arduino
microcontroller is make a important role to with the
integration of EasyVR Shield and the Iris Recognition
shield. Initially the faculty members of the organization or if
network transactions means the user of the company and any
other secured applications.
3. PROPOSED SYSTEM
The proposed system explains the three step factor to
improve the authentication scheme that is password
entering, Voice recognition, Iris Recognition. These are the
requirements to improve the authentication in the system.
This block describes the overall proposed algorithm of the
three- factor authentication system.
This very secured and important method to improve the
system by implementing this with low cost Arduino
Microcontroller. Initially we tested with voice input to
control the LED it is working and then we extend that work
provide as a password to the system. For this initially the is
voice is stored in the database and every time the user give
the voice input it checks with the database voice input if it
corrects then proceed to allow the user to access the system
or the job in the network.
Fig 3: Arduino Micro Controller
Fig 4: Arduino Microcontroller with EasyVR Shield
Fig 5 Flow diagram of Voice Recognition
The voice recognition is used to improve the security that
here the user has to give the input via headphone and the
input is forwarded to the Easy VR Shield using the arduino
microcontroller. [2] Initially the default user voice input
password is define and stored in the database .whenever
there is a need to access the process then first enter the
password and then give the user input then if correct means
then only it forward to the next step of Iris Recognition
process
Iris recognition is the process of recognizing a person by
analyzing the apparent pattern of her or his iris.
 In windows: Windows 7 & 8
 For Android: Android OS 3.1
These two platforms are supported by this technology. So
this is platform independent and this also makes the one
more advantage to use this three step authentication for the
secured transaction in the network.
The iris identification module is responsible for recognizing
the iris of the user. During the identification stage, the
biometric sensor in the iris recognition module captures the
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 685
characteristics of the user and it to be identified and then
converts it into the system format and then assigned as the
template. [3] which compares it against the stored template
in the database to determine whether the two templates
match then only it will continue to the next step otherwise
there is an error will be displayed.
The identification can be in the form of verification,
authenticating a claimed identity or recognition, determining
the identity of a person from a database to identify the
person is correct or not. In a verification system, the
captured iris is stored in the database and saved as a
template to provide identity to the user and the faculty
members in the bank or any company while enter into the
network or in the system . Every time the user there is in a
need to show the iris in front of the iris recognition module
which is connected with the arduino microcontroller board.
At the time the captured iris is verified with the template iris
if it is matched then only the user is allowed to do their
process in the network.
Iris Recognition technology methods:
Processing of capture the Iris into 3 steps
i. Capture the iris image
ii. Optimizing the iris image and assign as a template
image
iii. Store the image in database to compare when user
gives an input
These are all the three steps that is used to capture the image
from the camera and then process it to the module to get the
input from the user module.
Fig 6: Eye diagram to display the iris part
Fig 7 Overall process flow diagram
This is the flow diagram of the part of Iris recognition
technique part. Initially the iris to be captured form the user
and it to be stored in the database as the template .
Whenever there is a need to access the network or the
system the iris is captured form the user the captured iris and
the template iris is matched then only the system allowed
continuing the process. Before that the voice and the
password are to be correct then only capture the iris and the
process continue on.
Fig 8: Iris Recognition module
The Iris recognition module contains the combination of
DVI- D Monitor, 4GB Micro SD holds app software and the
database, USB Keyboard and mouse for the user control,
FA2 USB Iris Camera, Quad USB 2.0 hosts, 10/ 100
Ethernet port also available in the iris recognition module.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 686
The uniqueness of the iris and low probability of a false
acceptance or false rejection all contribute to the benefits of
using iris recognition technology. [3]It provides an accurate
and secure method of authenticating users onto company
systems, and has the speed required minimizing user
frustration when accessing the secured systems.
4. CONCLUSIONS
Finally the improved authentication is provided by the three
proposed methods Using the Arduino Microcontroller,
EasyVR shield and with the Iris recognition shield. By using
the Iris means don’t worry about the password hackers this
is the strong and effective password to the user. These are
increasing the security to the system by online and offline
network. Provides better security to the bank transactions
and the Military applications, in need of secure information
transaction. The already existing system for example by
only using the password and the PINs are very risk if it may
be known to the hackers the total information will be taken
by the hackers. So in today the security is the important one
to the transaction. Here the three-factor authentication
system is implemented with the low cost implementation.
FUTURE ENHANCEMENTS
In future have to extend the proposed system to develop that
process based on the mobile application environment for
that increase the security as efficiently to everyone for
secure communication in the mobile phones using the
mobile application in the android and windows OS.
REFERENCES
[1]. M. Baloul, E. Cherrier, and C. Rosenberger. Challenge-
based speaker recognition for mobile authentication. In
International Conference of the Biometrics Special Interest
Group (BIOSIG), pages 1{7, 2012
[2]. Daugman John “ How Iris Rcognition Works” IEEE
Transaction on Circuits and systems for Video Technology
14 (1) (January 2004) : 21-30
[3]. NTSC Subcommite on Biometrices “ Biometrics
Overview” Web( August:006
[4]. M.M.Gifford, D.J. McCartney and C.H.Seal,
“Networked biometrics systems: requirements based on iris
recognition”, BT Technol. Journal, Vol. 17, n°2, April 1999.
[5]. R.P.Wildes, J.C. Asmuth, G.L. Green and S.C. Hsu, A
system for automated iris recoginition”, IEEE paper 1994
[6]. www. arduino.cc.
BIOGRAPHIES
Usha Rani. M, M.E Network Engineering,
Velammal College of Engineering and
Technology, Madurai
Goutham. J , B.Tech Information Technology
,Velammal College of Engineering and
Technology, Madurai
Parthiban. M, MBBS, PES Institute of
Medical Science and Research Institute,
Andhra Pradesh

Contenu connexe

Tendances

WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...IJCSEA Journal
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET Journal
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance systemIRJET Journal
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR CodeIRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”iosrjce
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET Journal
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET Journal
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
 

Tendances (17)

WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
WIRELESS BIOMETRIC FINGERPRINT ATTENDANCE SYSTEM USING ARDUINO AND MYSQL DATA...
 
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
IoT based attendance system
IoT based attendance systemIoT based attendance system
IoT based attendance system
 
april201629
april201629april201629
april201629
 
IRJET- Securing E-Medical Documents using QR Code
IRJET-  	  Securing E-Medical Documents using QR CodeIRJET-  	  Securing E-Medical Documents using QR Code
IRJET- Securing E-Medical Documents using QR Code
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
 
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
IRJET-Online Ticket Substantiation using QR Code based Android Application Sy...
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...IRJET-  	  Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 

En vedette

Control of inverters to support bidirectional power flow in grid connected sy...
Control of inverters to support bidirectional power flow in grid connected sy...Control of inverters to support bidirectional power flow in grid connected sy...
Control of inverters to support bidirectional power flow in grid connected sy...eSAT Publishing House
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitieseSAT Publishing House
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holeseSAT Publishing House
 
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...eSAT Publishing House
 
Computational analysis of effect of stacking orientation on low velocity impa...
Computational analysis of effect of stacking orientation on low velocity impa...Computational analysis of effect of stacking orientation on low velocity impa...
Computational analysis of effect of stacking orientation on low velocity impa...eSAT Publishing House
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networkseSAT Publishing House
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach ineSAT Publishing House
 
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...eSAT Publishing House
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityeSAT Publishing House
 
Impact of power electronics on global warming
Impact of power electronics on global warmingImpact of power electronics on global warming
Impact of power electronics on global warmingeSAT Publishing House
 
Prediction of tool wear during turning of en9 work material against coated ca...
Prediction of tool wear during turning of en9 work material against coated ca...Prediction of tool wear during turning of en9 work material against coated ca...
Prediction of tool wear during turning of en9 work material against coated ca...eSAT Publishing House
 
Bit error rate analysis of miso system in rayleigh fading channel
Bit error rate analysis of miso system in rayleigh fading channelBit error rate analysis of miso system in rayleigh fading channel
Bit error rate analysis of miso system in rayleigh fading channeleSAT Publishing House
 
Probabilstic seismic risk evaluation of rc buildings (2)
Probabilstic seismic risk evaluation of rc buildings (2)Probabilstic seismic risk evaluation of rc buildings (2)
Probabilstic seismic risk evaluation of rc buildings (2)eSAT Publishing House
 
Cfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressorCfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressoreSAT Publishing House
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indooreSAT Publishing House
 
A semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryA semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryeSAT Publishing House
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...eSAT Publishing House
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pondeSAT Publishing House
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data miningeSAT Publishing House
 

En vedette (20)

Control of inverters to support bidirectional power flow in grid connected sy...
Control of inverters to support bidirectional power flow in grid connected sy...Control of inverters to support bidirectional power flow in grid connected sy...
Control of inverters to support bidirectional power flow in grid connected sy...
 
Effect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensitiesEffect of inclined hump on the turbulence intensities
Effect of inclined hump on the turbulence intensities
 
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holesMicrostructure analysis of steel 85 & al 7050 for cold expanded holes
Microstructure analysis of steel 85 & al 7050 for cold expanded holes
 
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...
Wear behaviour of si c reinforced al6061 alloy metal matrix composites by usi...
 
Computational analysis of effect of stacking orientation on low velocity impa...
Computational analysis of effect of stacking orientation on low velocity impa...Computational analysis of effect of stacking orientation on low velocity impa...
Computational analysis of effect of stacking orientation on low velocity impa...
 
Mobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networksMobility management in heterogeneous wireless networks
Mobility management in heterogeneous wireless networks
 
Analysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach inAnalysis of roucairol and carvalho approach in
Analysis of roucairol and carvalho approach in
 
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
Adaptive transmit diversity selection (atds) based on stbc and sfbc fir 2 x1 ...
 
Intelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobilityIntelligent location tracking scheme for handling user’s mobility
Intelligent location tracking scheme for handling user’s mobility
 
Impact of power electronics on global warming
Impact of power electronics on global warmingImpact of power electronics on global warming
Impact of power electronics on global warming
 
Prediction of tool wear during turning of en9 work material against coated ca...
Prediction of tool wear during turning of en9 work material against coated ca...Prediction of tool wear during turning of en9 work material against coated ca...
Prediction of tool wear during turning of en9 work material against coated ca...
 
Bit error rate analysis of miso system in rayleigh fading channel
Bit error rate analysis of miso system in rayleigh fading channelBit error rate analysis of miso system in rayleigh fading channel
Bit error rate analysis of miso system in rayleigh fading channel
 
Probabilstic seismic risk evaluation of rc buildings (2)
Probabilstic seismic risk evaluation of rc buildings (2)Probabilstic seismic risk evaluation of rc buildings (2)
Probabilstic seismic risk evaluation of rc buildings (2)
 
Cfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressorCfd simulation of single stage axial flow compressor
Cfd simulation of single stage axial flow compressor
 
Use of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoorUse of location aided algorithm using wi fi in indoor
Use of location aided algorithm using wi fi in indoor
 
A semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatoryA semi circle theorem in magneto-rotatory
A semi circle theorem in magneto-rotatory
 
Synthesis and characterization of
Synthesis and characterization ofSynthesis and characterization of
Synthesis and characterization of
 
Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...Nutrients retention in functional beef burgers with especial emphasis on lipi...
Nutrients retention in functional beef burgers with especial emphasis on lipi...
 
Hydrologic modeling of detention pond
Hydrologic modeling of detention pondHydrologic modeling of detention pond
Hydrologic modeling of detention pond
 
Subject distribution using data mining
Subject distribution using data miningSubject distribution using data mining
Subject distribution using data mining
 

Similaire à Improved authentication using arduino based voice

An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition systemeSAT Publishing House
 
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...IRJET Journal
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IRJET Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Journals
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESIRJET Journal
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniqueseSAT Publishing House
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesIAEME Publication
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor AuthenticationIRJET Journal
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTIRJET Journal
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentseSAT Journals
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET Journal
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition SystemIRJET Journal
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Passwordijtsrd
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 

Similaire à Improved authentication using arduino based voice (20)

An embedded finger vein recognition system
An embedded finger vein recognition systemAn embedded finger vein recognition system
An embedded finger vein recognition system
 
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
SYSTEM FOR ATTENDANCE TRACKING BASED ON THE INTERNET OF THINGS THAT MAKES USE...
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISESMACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
 
Multilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniquesMultilevel authentication using gps and otp techniques
Multilevel authentication using gps and otp techniques
 
Effectiveness of various user authentication techniques
Effectiveness of various user authentication techniquesEffectiveness of various user authentication techniques
Effectiveness of various user authentication techniques
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...
 
Fingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOTFingerprint Based Attendance System by IOT
Fingerprint Based Attendance System by IOT
 
Ingerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parentsIngerprint based student attendance system with sms alert to parents
Ingerprint based student attendance system with sms alert to parents
 
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTOIRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
 
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET -  	  Human Identification using Major and Minor Finger Knuckle PatternIRJET -  	  Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometric Ear Recognition System
Biometric Ear Recognition SystemBiometric Ear Recognition System
Biometric Ear Recognition System
 
A Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical PasswordA Survey on Smart Android Graphical Password
A Survey on Smart Android Graphical Password
 
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder LockIRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Dernier

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Dernier (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Improved authentication using arduino based voice

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 683 IMPROVED AUTHENTICATION USING ARDUINO BASED VOICE AND IRIS RECOGNITION TECHNOLOGY M. Usha Rani1 , J. Goutham2 , M. Parthiban3 1 M.E. Network Engg, Velammal College of Engineering and Technology, Tamil Nadu, India 2 B.Tech, Information Technology, Velammal College of Engineering and Technology, Tamil Nadu, India 3 MBBS, PES Institute of Medical Science and Research Institute, Andhra Pradesh, India Abstract Today authentication is the important one to improve the security in various applications Here the proposed system uses three steps to allow the process that is initially enter the password and then give the voice as the input using the arduino microcontroller it verifies the voice and then iris identification of the user. The user has to follow these steps and then only permit to continue the process. Based on the proposed system it highly protects your site from the hackers improve the efficiency also. The Iris recognition utilizes iris biometric technology to update the human’s iris image, verify it because this is the most secured method to improve the resources and the data become so confidential. Particularly this proposed system used to improve the Bank transaction via internet communication using the low cost arduino microcontroller. This system improves the authentication using the three step method by input as a text password, voice input, Iris recognition technology Keywords: Arduino Microcontroller, Password, Voice recognition, Iris recognition --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION The Arduino is an open-hardware platform ready to be used and to create prototype based on easy to use and flexible software and hardware.[6] Arduino can get information from the environment through its pines from a lot of sensors and it can control lights, motors and other devices. This type of iris recognition biometric technology is the strong and scientific demand for the proliferation of systems for iris identification and recognition. This is the best because the face and , finger print and other biometric trails they need so many mathematical calculation and computer vision process on the research area. Voice recognition is the technology by which sounds, words or phrases spoken by the humans are converted into the electrical signals, and these signals are transformed into coding to which the control to be assigned will work on it. Fig 1 Voice Recognition types Based on the approaches the template matching is the technique has the high accuracy when it used properly. Here to introduce the same template matching process. Fig 2 Biometric technologies Another area biometric iris recognition authentication technique which is very useful with is physical security to the applications which need more security to allow the secured users only allow the process. This helps to alleviate problems associated with swipe card access where some systems have to be manually programmed with specific card numbers and robust processes need to be in place to ensure access lists are regularly reviewed. Swipe cards are also easily lost, stolen or borrowed. 2. LITERATURE REVIEW There is a use of iris recognition technology is within the computing environment. Today the security is a very important one to protect the data from the ethical aspects and from the hackers. For example the bank transactions are have more and more secure detail information in that case the bank need more security in order protect their data information and other details. [3]The user and the bank working staff’s being able to access the network with their
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 684 username and password is the only authentication steps in all application processes. In this approach we propose three step security method incase to improve the security level with low cost implementation. Why this three step verification is important means if the username and password may be stolen by any one means it affects the major problem in their transaction. [2] By providing the Voice recognition technology and the iris recognition technology with addition to the username and password method. Using this techniques the voice and the iris are the more secured method and it is impossible to replicate the same voice input password and the same iris as a password and plus there is no more option to set the same voice and iris in that time of password needed on the network and these security steps are impossible to do by the hackers. For these advance method the transactions are become so safe and so secure at the time of transfer information through the network. [6] In this the Arduino microcontroller is make a important role to with the integration of EasyVR Shield and the Iris Recognition shield. Initially the faculty members of the organization or if network transactions means the user of the company and any other secured applications. 3. PROPOSED SYSTEM The proposed system explains the three step factor to improve the authentication scheme that is password entering, Voice recognition, Iris Recognition. These are the requirements to improve the authentication in the system. This block describes the overall proposed algorithm of the three- factor authentication system. This very secured and important method to improve the system by implementing this with low cost Arduino Microcontroller. Initially we tested with voice input to control the LED it is working and then we extend that work provide as a password to the system. For this initially the is voice is stored in the database and every time the user give the voice input it checks with the database voice input if it corrects then proceed to allow the user to access the system or the job in the network. Fig 3: Arduino Micro Controller Fig 4: Arduino Microcontroller with EasyVR Shield Fig 5 Flow diagram of Voice Recognition The voice recognition is used to improve the security that here the user has to give the input via headphone and the input is forwarded to the Easy VR Shield using the arduino microcontroller. [2] Initially the default user voice input password is define and stored in the database .whenever there is a need to access the process then first enter the password and then give the user input then if correct means then only it forward to the next step of Iris Recognition process Iris recognition is the process of recognizing a person by analyzing the apparent pattern of her or his iris.  In windows: Windows 7 & 8  For Android: Android OS 3.1 These two platforms are supported by this technology. So this is platform independent and this also makes the one more advantage to use this three step authentication for the secured transaction in the network. The iris identification module is responsible for recognizing the iris of the user. During the identification stage, the biometric sensor in the iris recognition module captures the
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 685 characteristics of the user and it to be identified and then converts it into the system format and then assigned as the template. [3] which compares it against the stored template in the database to determine whether the two templates match then only it will continue to the next step otherwise there is an error will be displayed. The identification can be in the form of verification, authenticating a claimed identity or recognition, determining the identity of a person from a database to identify the person is correct or not. In a verification system, the captured iris is stored in the database and saved as a template to provide identity to the user and the faculty members in the bank or any company while enter into the network or in the system . Every time the user there is in a need to show the iris in front of the iris recognition module which is connected with the arduino microcontroller board. At the time the captured iris is verified with the template iris if it is matched then only the user is allowed to do their process in the network. Iris Recognition technology methods: Processing of capture the Iris into 3 steps i. Capture the iris image ii. Optimizing the iris image and assign as a template image iii. Store the image in database to compare when user gives an input These are all the three steps that is used to capture the image from the camera and then process it to the module to get the input from the user module. Fig 6: Eye diagram to display the iris part Fig 7 Overall process flow diagram This is the flow diagram of the part of Iris recognition technique part. Initially the iris to be captured form the user and it to be stored in the database as the template . Whenever there is a need to access the network or the system the iris is captured form the user the captured iris and the template iris is matched then only the system allowed continuing the process. Before that the voice and the password are to be correct then only capture the iris and the process continue on. Fig 8: Iris Recognition module The Iris recognition module contains the combination of DVI- D Monitor, 4GB Micro SD holds app software and the database, USB Keyboard and mouse for the user control, FA2 USB Iris Camera, Quad USB 2.0 hosts, 10/ 100 Ethernet port also available in the iris recognition module.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 686 The uniqueness of the iris and low probability of a false acceptance or false rejection all contribute to the benefits of using iris recognition technology. [3]It provides an accurate and secure method of authenticating users onto company systems, and has the speed required minimizing user frustration when accessing the secured systems. 4. CONCLUSIONS Finally the improved authentication is provided by the three proposed methods Using the Arduino Microcontroller, EasyVR shield and with the Iris recognition shield. By using the Iris means don’t worry about the password hackers this is the strong and effective password to the user. These are increasing the security to the system by online and offline network. Provides better security to the bank transactions and the Military applications, in need of secure information transaction. The already existing system for example by only using the password and the PINs are very risk if it may be known to the hackers the total information will be taken by the hackers. So in today the security is the important one to the transaction. Here the three-factor authentication system is implemented with the low cost implementation. FUTURE ENHANCEMENTS In future have to extend the proposed system to develop that process based on the mobile application environment for that increase the security as efficiently to everyone for secure communication in the mobile phones using the mobile application in the android and windows OS. REFERENCES [1]. M. Baloul, E. Cherrier, and C. Rosenberger. Challenge- based speaker recognition for mobile authentication. In International Conference of the Biometrics Special Interest Group (BIOSIG), pages 1{7, 2012 [2]. Daugman John “ How Iris Rcognition Works” IEEE Transaction on Circuits and systems for Video Technology 14 (1) (January 2004) : 21-30 [3]. NTSC Subcommite on Biometrices “ Biometrics Overview” Web( August:006 [4]. M.M.Gifford, D.J. McCartney and C.H.Seal, “Networked biometrics systems: requirements based on iris recognition”, BT Technol. Journal, Vol. 17, n°2, April 1999. [5]. R.P.Wildes, J.C. Asmuth, G.L. Green and S.C. Hsu, A system for automated iris recoginition”, IEEE paper 1994 [6]. www. arduino.cc. BIOGRAPHIES Usha Rani. M, M.E Network Engineering, Velammal College of Engineering and Technology, Madurai Goutham. J , B.Tech Information Technology ,Velammal College of Engineering and Technology, Madurai Parthiban. M, MBBS, PES Institute of Medical Science and Research Institute, Andhra Pradesh