Biometric Access Control Using Voice and Fingerprint
نویسندگان
چکیده
In security-related systems, such as access control authentication is extremely important. There are several ways to carry out this crucial activity, but biometrics currently attracting more attention. After realizing the usefulness of biometrics, security systems use them for one two fundamental functions: user identification or verification. Multiple exist, and various require biometrics. As a result their impossibility be lost, stolen, forgotten, have been deemed most secure practical method. Therefore, design development voice fingerprint-based magic system. This research explores idea increasing door by replacing key with trustworthy electromagnetic lock system that allows only authorized people location using recognition fingerprint device. The sensor were able scan user’s open prototype when valid try door. motor closes after preset 5 seconds delay.
منابع مشابه
Multi-biometric Templates Using Fingerprint and Voice
As biometrics gains popularity, there is an increasing concern about privacy and misuse of biometric data held in central repositories. Furthermore, biometric verification systems face challenges arising from noise and intra-class variations. To tackle both problems, a multimodal biometric verification system combining fingerprint and voice modalities is proposed. The system combines the two mo...
متن کاملDesign and implementation biometric access control system using fingerprint for restricted area based on gabor filter
Biometric recognition is the use of individual biometric characteristics, such as fingerprint, face, and signature for automatically computerized recognition systems. Fingerprints are the most widely used form of biometric recognition system successfully. However, fingerprint images are rarely of perfect quality. They may be degraded and corrupted due to variations in skin and impression condit...
متن کاملAnonymous Biometric Access Control
Access control systems using the latest biometric technologies can offer a higher level of security than conventional passwordbased systems. Their widespread deployments, however, can severely undermine individuals’ rights of privacy. Biometric signals are immutable and can be exploited to associate individuals’ identities to sensitive personal records across disparate databases. In this paper,...
متن کاملAccess Control Using Fingerprint Authentication Processor and RFID
A typical access control system uses two components. First component is a fingerprint reader that is connected to a database to match the pre stored fingerprints with the one obtained by the reader. The second component is an RFID card that transmits information about the person that requests an access. In this paper, a compact system that consists of a CMOS fingerprint sensor (FPC1011F1) is us...
متن کاملBiometric-PKI Authentication System Using Fingerprint Minutiae
A digital certificate under Public Key Infrastructure has a defect of Man-in-the-Middle Attack that performs hash collision attacks. In this paper, we propose a robust biometric-PKI authentication system against Man-in-the-Middle Attack. The biometric-PKI authentication system consists of current PKI authentication and biometric authentication, which employs biometric data and a public key from...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Engineering and technology journal
سال: 2022
ISSN: ['2456-3358']
DOI: https://doi.org/10.47191/etj/v7i7.08