SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
60
Two Step Design for Personal Authentication Using
Finger Vein Recognition and GSM Technology
N.Revathy1
1
Velammal Institute of Technology, Electronics and
Communication Department.
R.Dilli Babu3
3
Velammal Institute of Technology, Electronics and
Communication Department
rdillibabuece@gmail.com
S.Vijayanarayanan 2
2
Velammal Institute of Technology, Electronics and
Communication Department.
vijayanarayanans@yahoo.in
A.Vimal Raj4
4
Velammal Institute of Technology, Electronics and
Communication Department
electronicpostals@gmail.com
Abstract— This paper has proposed another methodology of constant implanted finger vein distinguishment alongside GSM innovation
for individual validation and security is made. [1]Unique human attributes are utilized to distinguish an individual or to confirm a character.
Finger vein recognizer, is utilized as a first level security for a confirmation process furthermore for showing or alarming unapproved
individual if entered. The equipment is the procedure with the assistance of Finger vein recognizer and transformed utilizing MATLAB
programming, which is modest and dependable in all the structures. GSM innovation is utilized as a second level security, where the client
sends a Novel code to the GSM recipient which on distinguishment sends a secret key to the Client for opening. [2]The proposed framework
takes just 0.5 seconds to confirm one info finger vein test and the normal mistake rate (ERR) of 0.06.
Index Terms— finger vein technology, GSM SIM 300 technology, Security, MATLAB, Personal authentication.
——————————  ——————————
1 INTRODUCTION
These days security assumes an imperative part in our surroundings,
on the grounds that they are utilized as a part of different purposes,
for example, for individual confirmation, managing an account and
for all different purposes. Two essential outlines, for example, Finger
vein distinguishment which is finished with the assistance of the
MATLAB programming, where the examined pictures are
preinstalled in the framework amid the security handle the finger is
kept in the finger vein equipment and with the assistance of the USB
cam and the IR sensor the picture is checked and checked with the
preinstalled picture and GSM SIM 300 advancements has been
utilized as a part of the framework for sending an OTP(one time
password) to the particular client furthermore for cautioning the
unapproved client by communicating something specific.[3]. This
will bring protection everywhere throughout the world, so with the
assistance of these strategies we propose a novel configuration for
two level security framework for individual verification.
2 SYSTEM ARCHITECTURE
2.1 FINGER VEIN RECOGNITION
The finger-vein is a biometrics pattern for personal identification for
security purposes. Vein patterns are the vast network of blood vessels
underneath a person’s skin. The finger-vein has the more advantage
than the other systems. The vein is hidden inside the body and is
mostly invisible to human eyes, so it is difficult to forge or steal.
[5]The finger-vein pattern can only be taken from alive body.
Therefore, it is a natural and convincing proof that the subject whose
finger-vein is successfully captured is a live. These workings are still
in progress and they are a little bit not fancy. The quality of finger-
vein images can be highly influenced by the imaging conditions;
vein patterns can be distorted from the finger pressure in a
conventional setup [6], [7]. They are unique for each and every one
and are stable. Due to its uniqueness, stability, to criminal tampering,
vein pattern recognition offers a more reliable solution for secure
biometric authentication systems. Below we are going to discuss
about structure of the finger vein pattern.
2.2 PROCESS
Finger vein recognition is explained with its components. In the first
stage of security, the finger is kept in the finger vein system
hardware and it is processed for authentication. The finger is kept on
the sensor for processing the device, it consists of a USB camera, IR
sensor, Power supply, cover for protecting the screen, after is it
placed on the screen, the NIR sensor sends a signal to our fingers and
with the help of the USB camera the images are captured and it is
processed. The hardware is connected to a memory device which
stores the original scanned finger vein images and when the person
keeps the finger it will match with the stored images and display the
result for in this case. Few images aren’t clear while scanning, which
is overcome by using the MATLAB process.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
61
2.3 BLOCK DIAGRAM
Fig 1.1 block diagram of working of Finger vein system linked
with MATLAB process
Fig 1.2 Block diagram of what’s happening inside the MATLAB
processing.
2.4 WORKING
[1] Once our finger is kept on the sensor, the image is captured and it
is sent for matching. The matching process is done with the help of
the MATLAB process. Fig 1.2 tells us about the working of the
MATLAB process where each and every block is explained in detail.
The Structural image of the finger vein is shown below. First the
image is acquired and then it is processed which is shown in Fig
1.3(a). In order to obtain a clean image the excessive and the
unwanted area and the lossy parts should be removed from the
sampled image. First, the image is converted into a binarized image
as shown in Fig 1.3(b) and the edge mapping is done. This is done in
two steps. First, the edge detector which we are using here is SOBEL
edge detector which is applied to the entire image(c), and the output
edge map is removed from the binarized image. And then sampled
image is compared with the saved image
Fig 1.3. (a) Acquired image sample. (b) Binarized image.
(c) The subtracted edge mapping image (d) ROI mask from the
Image in (e) ROI finger vein image. [1]
On the off chance that in case the picture is not clear or the picture is
mutilated we need to take after an alternate strategy for transforming
the picture. Initially an imprint is kept in the beginning of the picture
and afterward the fact of the matter is augmented, bending in the
picture or the lossy disengagement is acquired. This is then corrected
and prepared as a solitary picture and afterward it is sent for the
coordinating procedure.
Fig 1.4 (a) Acquired finger vein image. (b) ROI mask from (a).
(c) ROI mask after refinement. [1]
The same process, for example, 1) Division 2) Improvement 3)
Extraction 4) Coordinating with the database is completed in the
above procedure once in the wake of discovering the disengaged
district or the intruded on an area in the examined picture. It then
matches with the preinstalled picture in the database and then it
sends a data to the Microcontroller.
The principle work of the microcontroller, it gets the sign from the
MATLAB processor and on the off chance that it is a "YES" then the
Entryway is opened (we are considering an entryway in this
clarification) on the off chance that it is a "NO" then it gives a ready
that an unapproved individual is attempting to enter inside.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
62
3 GSM SIM 300
Wrongdoing is heading consistently and it is vital to take essential
measures on security. In present day innovation, we must utilize vital
structures with simple establishment in evading manual work. Our
task gives the best approach to ensure home, office and so on
through GSM innovation by sending OTP (ONE TIME
PASSWORD) to the separate client. In the present day development
of remote correspondence, we thusly utilize this framework to
upgrade the security that satisfies the need of advanced innovation.
The utilization of GSM framework in security applications, controls
the use of wired structures which gets to be more muddled and very
problematic. In such case, this GSM model can enhance the
productivity of the methodology considered, supposed security
framework. It likewise improves as an alternative.
4 OUR WORK
The Fundamental idea of our undertaking is to give GSM based
security by sending an interesting secret key through SMS the
security framework which comprises of its own GSM module and
perceives the watchword and itself checking it sending an OTP to the
client. This GSM Modem can acknowledge any GSM system
administrator SIM card and act much the same as a cellular
telephone with its own extraordinary telephone number. The client
on getting the OTP through SMS from the framework, sorts the
relating OTP in the keypad, as data, which checks coordinating,
lastly the secured framework under lock is opened. We therefore
utilize GSM in light of the fact that it is shabby, simple and promptly
accessible innovation. Further the framework itself comprises of
GSM modem for sending and tolerating messages. ATMEL 89S52
microcontroller is utilized to control the framework. The LCD is
utilized for presentation. A key cushion is utilized for entering the
secret word. Here the individual who is approved has the general
control. As said before, the person who has to open the
corresponding security system has his own password which is
preloaded in the end system. Now the person has his own password.
He has to send the password as SMS to the system. Once the
password is matched, the microcontroller operates the system and
initiates the sending of OTP to the user. The user who had received
OTP via SMS uses this to type as key on the keypad. The
microcontroller checks the match. Depending on the response it
decides to open or stay closed. Once the match is authorized the
microcontroller itself switches the relay and turns it on. The relay
works and opens the corresponding security system. The GSM
system used makes the communication mechanism between user and
system through SMS. Microcontroller is growing filed when the
present day situation is considered. Embedded designs can also be
installed easily. The project, explained above is also a good example
of embedded system design. Significantly, we can develop the
project using this embedded design and much easily. As we know
the basics of embedded design is microcontroller. Microcontroller is
a chip which consists of all support functions such as clock, reset,
memory and I/O built inside the device. Also the basic block
diagram of this system is given below.
Fig 2.1 shows the block diagram of the basic block diagram of the
working of this method
SMS is defined as a SHORT MESSAGE SERVICE also defined as a
text based service that enables us to use 160 characters for
communication. It is also similar to email where the texts are stored
and forwarded from a center that is normally associated for SMS. If
the person is not available immediately for the process the message
is stored and retrieved automatically. Unlike calls they cannot be
excluded from the user if he is not available at a right time. The
message is retrieved later, whenever the user is available. It is also
one of the major advantages of Short Message Service.
5 TECHNOLOGY INSIDE
Microcontroller is the central core of the present day embedded
system. Here we are using ATMEL 89S52. It has 6 clock cycles per
period instead of 12. So the system speed can be increased further.
Thus the communication can be increased by 115200kbps.The core
of the circuit is ATMEL 89S52. It is a single chip 8-bit
microcontroller. It has I/O ports of 8 bits. Timer event counters of 16
bits. It also consists of enhanced UART, oscillator, and timing
circuits. It is also inbuilt with 4kb flash memory. It enhances the use
of parallel programming, in-system and in-application programming.
Further the controller consists of various ports. Port 0, 1, 2, 3. Each
performing its own tasks. The pin associated with controller consists
of RST input, i.e. reset that resets whenever the pin becomes high.
ALE pin or address latch enable. It is also used as program pulse
input during flash memory operation. If desired, the operation can be
stopped by setting 0 of SFR location 8EH. PSEN is the Program
Store Enable strobe to external program memory. Further the XTAL
is the oscillator used. The next part in our project is IC MAX 232A.
It’s used for serial communication in the design. It also acts as a
voltage converter. We all know that RS232 is not compatible with a
microcontroller. So we need a voltage converter which converts
Transistor Logic voltage levels that will be acceptable to the 89S51.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
63
Fig 2.2 shows the basic block diagram of the working of the GSM
SIM 300 module embedded with the XBOARD attached with the
LCD display
Finally, it uses RS232 cables to send the data. The IC is a dual
driver or dual receiver. It also has a capacitive voltage generator for
supplying TIA/EIA 232F. The receiver converts those inputs to 5V
TTL/CMOS. Each driver converts them back to TIA/EIA 232F.
Further, this is the first IC which contains the set of the necessary
drivers and receivers, each 2. It is also easy in adapting the RS 232
signals TTL logic. It also finds its way in simplifying or minimizing
the circuitry. The introduction of MAX232, there is also the net level
IC of same family i.e. MAX 232A. But MAX232A is just a driver
and receiver. Further, it does not generate necessary RS232 signals or
provide serial/parallel conversion. But it converts signal voltage
levels. Extra circuits can be used to decode serial data and to
generate serial data at the correct timing. The recent MAX233 can be
used, the difference between the prior versions is that it has built in
capacitor while the last version has to be attached with an external
capacitor. It is used under fixed voltages for one device. But planned
cabling can be used to avoid those distortions. It also loaded with
protocol ability to send and receive to and from the attached device.
We use TTL logic or CMOS, the prior step is connecting RS 232
port. Hence serial communication is enhanced mainly due to these
couplings at particular voltage levels. GSM stands for Global System
for Mobile communications. The modem used here is GSM modem.
It is not similar to other conventional modems used. It also send or
receive calls/SMS using Subscriber Identity Module (SIM), which is
used as an identity. The system is connected to the RF antenna that
transmits and receives data. The advantage of using this is it is
digitally processed. It refers to Subscriber Identity Module. It stores
the information of the operator and user and it also acts as a separate
identity for each user. It allows the handset to stay connected to the
particular network by constant connectivity through the information
through the SIM.
6 WORKING OF THE SYSTEM
Finger vein innovation is utilized as a first level security framework
and the GSM SIM 300 innovation is utilized as a second level
security framework. Inevitably, the finger vein recognizer is
appended to the entryway. On the off chance that a man needs to
enter through the entryway, the individual ought to pass the
individual security i.e. the finger vein perceiving innovation. The
individual ought to keep his finger in the locator, which filters the
picture and matches with the database introduce inside the
framework. This methodology is completed utilizing MATLAB
programming. The individual's tested picture is now nourished into
the database. To begin with, the filtered picture is binarized and the
inordinate area and lossy territories are disposed off. The picture is
further refined through the MATLAB process and the first district of
investment is put away inside the database. At the point when the
individual who needs to gets past the entryway must keep his finger
on the identifier. The identifier is contained USB cam above and IR
Drove underneath.
The picture of the finger once kept is examined and caught with the
cam and the picture is send for further handling. After a few courses
of action of picture division, and picture improvement the ideal
picture without commotion is send to the database in pairs
arrangement. The coordinating of the constant result is finished with
the effectively put away information in the database. The coordinated
is carried out by the microcontroller. When the outcome is sure, the
microcontroller works the transfer and make access to gets past the
entryway. Subsequently the client completes his first level security.
The second level security is GSM innovation. Once the client goes
into the room. He himself utilizes his cellular telephone to send a
SMS to the end security framework which is as of now preloaded
with the GSM module. The framework on getting the SMS checks
for its uniqueness with the operation of the microcontroller. In the
event that the coordinating is carried out the yield of the
microcontroller is certain. When the outcome is certain the
framework is made to produce the arbitrary one time secret key and
make it answer to the client. The client on accepting the one time
secret word by means of SMS needs to sort this as a key on the
keypad. Once the framework created one time secret word is
coordinated with the particular case that is being written, the
microcontroller works the hand-off joined to it and opens the locker.
Along these lines the two level verification makes high security and
further improved security to enhance the framework wellbeing.
7.1 CONCLUSION
This paper has proposed another level of security frameworks for
individual confirmation furthermore for different applications. With
the assistance of the finger vein indicator, we can secure a steady,
novel and a secured biometric framework with the assistance of the
above segments the framework can be solid and transformed with no
deviations. Despite the fact that the gadget is expensive it can
transform consistently and the level of the security is high when
contrasted and alternate techniques for biometric filtering. With
respect to second level security is concerned, which is GSM SIM
300 innovation, it is a shabby and dependable framework which
conveys between the client and the gadget continually with no
obstruction. What's more the fundamental focal point of this
framework is the novel arbitrary code which is produced by the
gadget and sent to the client for confirmation which makes this
framework profoundly securable. Although more work is to be
transformed, our outcomes to the blend of the Finger vein innovation
and the GSM SIM 300 innovation is guaranteed and it is a superior
development in the field of security. This is particularly utilized as a
part of the field of security frameworks and all different fields
identified with it.
INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303
64
REFERENCES
[1] Zhi Liu and Shangling Song ―An EmbeddedReal-Time Finger-
Vein Recognition SystemFor Mobile Devices‖,IEEE Transactions on
Consumer Electronics, Vol. 58, No. 2, May2012.
[2] V.Ramya, P.Vijaya kumar, B.Palaniappan ―ANOVEL DESIGN
OF FINGER VEIN RCOGNITION FOR PERSONAL
UTHENTICATION AND VEHICE SECURITY‖ Journal of
Theoretical and Applied Information Technology, Vol. 65, No.1.
[3] T.Y.V BhanuKiranmai, K.Amruthavally, andG.Harish ―An
Embedded Real-Time Finger-Vein Recognition System for Security
Levels‖,International Journal of Application orInnovation in
Engineering & Management(ijaiem), Volume. 2, Issue. 6, June 2013.
[4] Caixia Liu, ―Study on Finger Vein Feature Extraction
Algorithm‖, International Journal of Computer Science Issues, vol.
10, no 3, 2012.
[5] Ajay Kumar and Yingbo Zhou ―Human Identification Using
Finger Vein‖, IEEE Transaction on image processing, Vol.21, No.4,
2012.
[6] E. C. Lee and K. R. Park, ―Restoration method of skin scattering
blurred vein image for finger vein recognition,‖ Electron. Lett., vol.
45, no. 21, pp.1074–1076, Oct. 2009.
[7] Ma Yuchun; Huang Yinghong; Zhang Kun; LiZhuang, "General
Application Research on GSM module," Internet Computing &
Information Services(ICICIS), 2011 International Conference on ,
vol., n., pp.525,528, 17-18 Sept. 2011
[8] Jingjing Wang, "Realizing SMS Using PC's Serial Port Based on
VC++," Computer Science an Engineering, 2009. WCSE '09. Second
International Workshop on, vol.2, no., pp.382, 384,8-30 Oct. 2009

More Related Content

What's hot

Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screensree438
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET Journal
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Lakshmi Sarvani Videla
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationeSAT Publishing House
 
Zigbee based smart fall detection and notification system with wearable senso...
Zigbee based smart fall detection and notification system with wearable senso...Zigbee based smart fall detection and notification system with wearable senso...
Zigbee based smart fall detection and notification system with wearable senso...eSAT Journals
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009pavan
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET Journal
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT IJECEIAES
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)Karteek Irukulla
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationIRJET Journal
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET Journal
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking ApplicationIRJET Journal
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...IJECEIAES
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceIJMER
 
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIntrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIRJET Journal
 

What's hot (20)

Image based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screenImage based password authentication for illiterates with touch screen
Image based password authentication for illiterates with touch screen
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...IRJET- 	  PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
IRJET- PASSMATRIX- An Authentication System to Resist Shoulder Surfing Att...
 
Sri
SriSri
Sri
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
Zigbee based smart fall detection and notification
Zigbee based smart fall detection and notificationZigbee based smart fall detection and notification
Zigbee based smart fall detection and notification
 
Zigbee based smart fall detection and notification system with wearable senso...
Zigbee based smart fall detection and notification system with wearable senso...Zigbee based smart fall detection and notification system with wearable senso...
Zigbee based smart fall detection and notification system with wearable senso...
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
K017257578
K017257578K017257578
K017257578
 
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
 
IRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually ImpairedIRJET- Smart Helmet for Visually Impaired
IRJET- Smart Helmet for Visually Impaired
 
Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT Design and implement a smart system to detect intruders and firing using IoT
Design and implement a smart system to detect intruders and firing using IoT
 
137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)137.gsm, fprs ,keypad_based_atm_security_(doc)
137.gsm, fprs ,keypad_based_atm_security_(doc)
 
Home Security Systems using Camera and Android Application
Home Security Systems using Camera and Android ApplicationHome Security Systems using Camera and Android Application
Home Security Systems using Camera and Android Application
 
IRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb PeopleIRJET - A Smart Assistant for Aiding Dumb People
IRJET - A Smart Assistant for Aiding Dumb People
 
Mobile Theft Tracking Application
Mobile Theft Tracking ApplicationMobile Theft Tracking Application
Mobile Theft Tracking Application
 
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...Portable and Efficient Fingerprint Authentication System Based on a Microcont...
Portable and Efficient Fingerprint Authentication System Based on a Microcont...
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
A Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile DeviceA Survey of User Authentication Schemes for Mobile Device
A Survey of User Authentication Schemes for Mobile Device
 
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and SecurityIntrusion Tracking, Recognition and Destruction for Surveillance and Security
Intrusion Tracking, Recognition and Destruction for Surveillance and Security
 

Similar to Two Step Design for Personal Authentication Using Finger Vein Recognition and GSM Technology

Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollernooriasukmaningtyas
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 90308448771000kv technologies
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyeSAT Journals
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security systempraful borad
 
Intelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting SystemIntelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting SystemIRJET Journal
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET Journal
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMIRJET Journal
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 

Similar to Two Step Design for Personal Authentication Using Finger Vein Recognition and GSM Technology (20)

Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
IRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety DeviceIRJET- TOUCH ME NOT-A Women Safety Device
IRJET- TOUCH ME NOT-A Women Safety Device
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Real time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontrollerReal time model of a lock gate system upon fingerprint with microcontroller
Real time model of a lock gate system upon fingerprint with microcontroller
 
Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877Electronic eye for security system @1000KV Technologies 9030844877
Electronic eye for security system @1000KV Technologies 9030844877
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
Intelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting SystemIntelligent Accident Detection, Prevention and Reporting System
Intelligent Accident Detection, Prevention and Reporting System
 
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing AttacksIRJET-  	  Passmatrix Authentication to Overcome Shouldersurfing Attacks
IRJET- Passmatrix Authentication to Overcome Shouldersurfing Attacks
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHMSMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
SMART SURVEILLANCE SYSTEM USING LBPH ALGORITHM
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 

More from IJTET Journal

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityIJTET Journal
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiIJTET Journal
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesIJTET Journal
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterIJTET Journal
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
 

More from IJTET Journal (20)

Beaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For SecurityBeaglebone Black Webcam Server For Security
Beaglebone Black Webcam Server For Security
 
Biometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry PiBiometrics Authentication Using Raspberry Pi
Biometrics Authentication Using Raspberry Pi
 
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksConceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc Networks
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodPrevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy Method
 
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksEffective Pipeline Monitoring Technology in Wireless Sensor Networks
Effective Pipeline Monitoring Technology in Wireless Sensor Networks
 
Raspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRSRaspberry Pi Based Client-Server Synchronization Using GPRS
Raspberry Pi Based Client-Server Synchronization Using GPRS
 
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...
 
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesAn Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
An Efficient Decoding Algorithm for Concatenated Turbo-Crc Codes
 
Improved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile ApplicationImproved Trans-Z-source Inverter for Automobile Application
Improved Trans-Z-source Inverter for Automobile Application
 
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...
 
Comprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor NetworksComprehensive Path Quality Measurement in Wireless Sensor Networks
Comprehensive Path Quality Measurement in Wireless Sensor Networks
 
Optimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query ServicesOptimizing Data Confidentiality using Integrated Multi Query Services
Optimizing Data Confidentiality using Integrated Multi Query Services
 
Foliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing TechniquesFoliage Measurement Using Image Processing Techniques
Foliage Measurement Using Image Processing Techniques
 
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemHarmonic Mitigation Method for the DC-AC Converter in a Single Phase System
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase System
 
Comparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting StructuresComparative Study on NDCT with Different Shell Supporting Structures
Comparative Study on NDCT with Different Shell Supporting Structures
 
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...
 
A Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC ConverterA Five – Level Integrated AC – DC Converter
A Five – Level Integrated AC – DC Converter
 
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...
 
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationStudy of Eccentrically Braced Outrigger Frame under Seismic Exitation
Study of Eccentrically Braced Outrigger Frame under Seismic Exitation
 

Recently uploaded

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationNeilDeclaro1
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answersdalebeck957
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Two Step Design for Personal Authentication Using Finger Vein Recognition and GSM Technology

  • 1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 60 Two Step Design for Personal Authentication Using Finger Vein Recognition and GSM Technology N.Revathy1 1 Velammal Institute of Technology, Electronics and Communication Department. R.Dilli Babu3 3 Velammal Institute of Technology, Electronics and Communication Department rdillibabuece@gmail.com S.Vijayanarayanan 2 2 Velammal Institute of Technology, Electronics and Communication Department. vijayanarayanans@yahoo.in A.Vimal Raj4 4 Velammal Institute of Technology, Electronics and Communication Department electronicpostals@gmail.com Abstract— This paper has proposed another methodology of constant implanted finger vein distinguishment alongside GSM innovation for individual validation and security is made. [1]Unique human attributes are utilized to distinguish an individual or to confirm a character. Finger vein recognizer, is utilized as a first level security for a confirmation process furthermore for showing or alarming unapproved individual if entered. The equipment is the procedure with the assistance of Finger vein recognizer and transformed utilizing MATLAB programming, which is modest and dependable in all the structures. GSM innovation is utilized as a second level security, where the client sends a Novel code to the GSM recipient which on distinguishment sends a secret key to the Client for opening. [2]The proposed framework takes just 0.5 seconds to confirm one info finger vein test and the normal mistake rate (ERR) of 0.06. Index Terms— finger vein technology, GSM SIM 300 technology, Security, MATLAB, Personal authentication. ——————————  —————————— 1 INTRODUCTION These days security assumes an imperative part in our surroundings, on the grounds that they are utilized as a part of different purposes, for example, for individual confirmation, managing an account and for all different purposes. Two essential outlines, for example, Finger vein distinguishment which is finished with the assistance of the MATLAB programming, where the examined pictures are preinstalled in the framework amid the security handle the finger is kept in the finger vein equipment and with the assistance of the USB cam and the IR sensor the picture is checked and checked with the preinstalled picture and GSM SIM 300 advancements has been utilized as a part of the framework for sending an OTP(one time password) to the particular client furthermore for cautioning the unapproved client by communicating something specific.[3]. This will bring protection everywhere throughout the world, so with the assistance of these strategies we propose a novel configuration for two level security framework for individual verification. 2 SYSTEM ARCHITECTURE 2.1 FINGER VEIN RECOGNITION The finger-vein is a biometrics pattern for personal identification for security purposes. Vein patterns are the vast network of blood vessels underneath a person’s skin. The finger-vein has the more advantage than the other systems. The vein is hidden inside the body and is mostly invisible to human eyes, so it is difficult to forge or steal. [5]The finger-vein pattern can only be taken from alive body. Therefore, it is a natural and convincing proof that the subject whose finger-vein is successfully captured is a live. These workings are still in progress and they are a little bit not fancy. The quality of finger- vein images can be highly influenced by the imaging conditions; vein patterns can be distorted from the finger pressure in a conventional setup [6], [7]. They are unique for each and every one and are stable. Due to its uniqueness, stability, to criminal tampering, vein pattern recognition offers a more reliable solution for secure biometric authentication systems. Below we are going to discuss about structure of the finger vein pattern. 2.2 PROCESS Finger vein recognition is explained with its components. In the first stage of security, the finger is kept in the finger vein system hardware and it is processed for authentication. The finger is kept on the sensor for processing the device, it consists of a USB camera, IR sensor, Power supply, cover for protecting the screen, after is it placed on the screen, the NIR sensor sends a signal to our fingers and with the help of the USB camera the images are captured and it is processed. The hardware is connected to a memory device which stores the original scanned finger vein images and when the person keeps the finger it will match with the stored images and display the result for in this case. Few images aren’t clear while scanning, which is overcome by using the MATLAB process.
  • 2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 61 2.3 BLOCK DIAGRAM Fig 1.1 block diagram of working of Finger vein system linked with MATLAB process Fig 1.2 Block diagram of what’s happening inside the MATLAB processing. 2.4 WORKING [1] Once our finger is kept on the sensor, the image is captured and it is sent for matching. The matching process is done with the help of the MATLAB process. Fig 1.2 tells us about the working of the MATLAB process where each and every block is explained in detail. The Structural image of the finger vein is shown below. First the image is acquired and then it is processed which is shown in Fig 1.3(a). In order to obtain a clean image the excessive and the unwanted area and the lossy parts should be removed from the sampled image. First, the image is converted into a binarized image as shown in Fig 1.3(b) and the edge mapping is done. This is done in two steps. First, the edge detector which we are using here is SOBEL edge detector which is applied to the entire image(c), and the output edge map is removed from the binarized image. And then sampled image is compared with the saved image Fig 1.3. (a) Acquired image sample. (b) Binarized image. (c) The subtracted edge mapping image (d) ROI mask from the Image in (e) ROI finger vein image. [1] On the off chance that in case the picture is not clear or the picture is mutilated we need to take after an alternate strategy for transforming the picture. Initially an imprint is kept in the beginning of the picture and afterward the fact of the matter is augmented, bending in the picture or the lossy disengagement is acquired. This is then corrected and prepared as a solitary picture and afterward it is sent for the coordinating procedure. Fig 1.4 (a) Acquired finger vein image. (b) ROI mask from (a). (c) ROI mask after refinement. [1] The same process, for example, 1) Division 2) Improvement 3) Extraction 4) Coordinating with the database is completed in the above procedure once in the wake of discovering the disengaged district or the intruded on an area in the examined picture. It then matches with the preinstalled picture in the database and then it sends a data to the Microcontroller. The principle work of the microcontroller, it gets the sign from the MATLAB processor and on the off chance that it is a "YES" then the Entryway is opened (we are considering an entryway in this clarification) on the off chance that it is a "NO" then it gives a ready that an unapproved individual is attempting to enter inside.
  • 3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 62 3 GSM SIM 300 Wrongdoing is heading consistently and it is vital to take essential measures on security. In present day innovation, we must utilize vital structures with simple establishment in evading manual work. Our task gives the best approach to ensure home, office and so on through GSM innovation by sending OTP (ONE TIME PASSWORD) to the separate client. In the present day development of remote correspondence, we thusly utilize this framework to upgrade the security that satisfies the need of advanced innovation. The utilization of GSM framework in security applications, controls the use of wired structures which gets to be more muddled and very problematic. In such case, this GSM model can enhance the productivity of the methodology considered, supposed security framework. It likewise improves as an alternative. 4 OUR WORK The Fundamental idea of our undertaking is to give GSM based security by sending an interesting secret key through SMS the security framework which comprises of its own GSM module and perceives the watchword and itself checking it sending an OTP to the client. This GSM Modem can acknowledge any GSM system administrator SIM card and act much the same as a cellular telephone with its own extraordinary telephone number. The client on getting the OTP through SMS from the framework, sorts the relating OTP in the keypad, as data, which checks coordinating, lastly the secured framework under lock is opened. We therefore utilize GSM in light of the fact that it is shabby, simple and promptly accessible innovation. Further the framework itself comprises of GSM modem for sending and tolerating messages. ATMEL 89S52 microcontroller is utilized to control the framework. The LCD is utilized for presentation. A key cushion is utilized for entering the secret word. Here the individual who is approved has the general control. As said before, the person who has to open the corresponding security system has his own password which is preloaded in the end system. Now the person has his own password. He has to send the password as SMS to the system. Once the password is matched, the microcontroller operates the system and initiates the sending of OTP to the user. The user who had received OTP via SMS uses this to type as key on the keypad. The microcontroller checks the match. Depending on the response it decides to open or stay closed. Once the match is authorized the microcontroller itself switches the relay and turns it on. The relay works and opens the corresponding security system. The GSM system used makes the communication mechanism between user and system through SMS. Microcontroller is growing filed when the present day situation is considered. Embedded designs can also be installed easily. The project, explained above is also a good example of embedded system design. Significantly, we can develop the project using this embedded design and much easily. As we know the basics of embedded design is microcontroller. Microcontroller is a chip which consists of all support functions such as clock, reset, memory and I/O built inside the device. Also the basic block diagram of this system is given below. Fig 2.1 shows the block diagram of the basic block diagram of the working of this method SMS is defined as a SHORT MESSAGE SERVICE also defined as a text based service that enables us to use 160 characters for communication. It is also similar to email where the texts are stored and forwarded from a center that is normally associated for SMS. If the person is not available immediately for the process the message is stored and retrieved automatically. Unlike calls they cannot be excluded from the user if he is not available at a right time. The message is retrieved later, whenever the user is available. It is also one of the major advantages of Short Message Service. 5 TECHNOLOGY INSIDE Microcontroller is the central core of the present day embedded system. Here we are using ATMEL 89S52. It has 6 clock cycles per period instead of 12. So the system speed can be increased further. Thus the communication can be increased by 115200kbps.The core of the circuit is ATMEL 89S52. It is a single chip 8-bit microcontroller. It has I/O ports of 8 bits. Timer event counters of 16 bits. It also consists of enhanced UART, oscillator, and timing circuits. It is also inbuilt with 4kb flash memory. It enhances the use of parallel programming, in-system and in-application programming. Further the controller consists of various ports. Port 0, 1, 2, 3. Each performing its own tasks. The pin associated with controller consists of RST input, i.e. reset that resets whenever the pin becomes high. ALE pin or address latch enable. It is also used as program pulse input during flash memory operation. If desired, the operation can be stopped by setting 0 of SFR location 8EH. PSEN is the Program Store Enable strobe to external program memory. Further the XTAL is the oscillator used. The next part in our project is IC MAX 232A. It’s used for serial communication in the design. It also acts as a voltage converter. We all know that RS232 is not compatible with a microcontroller. So we need a voltage converter which converts Transistor Logic voltage levels that will be acceptable to the 89S51.
  • 4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 63 Fig 2.2 shows the basic block diagram of the working of the GSM SIM 300 module embedded with the XBOARD attached with the LCD display Finally, it uses RS232 cables to send the data. The IC is a dual driver or dual receiver. It also has a capacitive voltage generator for supplying TIA/EIA 232F. The receiver converts those inputs to 5V TTL/CMOS. Each driver converts them back to TIA/EIA 232F. Further, this is the first IC which contains the set of the necessary drivers and receivers, each 2. It is also easy in adapting the RS 232 signals TTL logic. It also finds its way in simplifying or minimizing the circuitry. The introduction of MAX232, there is also the net level IC of same family i.e. MAX 232A. But MAX232A is just a driver and receiver. Further, it does not generate necessary RS232 signals or provide serial/parallel conversion. But it converts signal voltage levels. Extra circuits can be used to decode serial data and to generate serial data at the correct timing. The recent MAX233 can be used, the difference between the prior versions is that it has built in capacitor while the last version has to be attached with an external capacitor. It is used under fixed voltages for one device. But planned cabling can be used to avoid those distortions. It also loaded with protocol ability to send and receive to and from the attached device. We use TTL logic or CMOS, the prior step is connecting RS 232 port. Hence serial communication is enhanced mainly due to these couplings at particular voltage levels. GSM stands for Global System for Mobile communications. The modem used here is GSM modem. It is not similar to other conventional modems used. It also send or receive calls/SMS using Subscriber Identity Module (SIM), which is used as an identity. The system is connected to the RF antenna that transmits and receives data. The advantage of using this is it is digitally processed. It refers to Subscriber Identity Module. It stores the information of the operator and user and it also acts as a separate identity for each user. It allows the handset to stay connected to the particular network by constant connectivity through the information through the SIM. 6 WORKING OF THE SYSTEM Finger vein innovation is utilized as a first level security framework and the GSM SIM 300 innovation is utilized as a second level security framework. Inevitably, the finger vein recognizer is appended to the entryway. On the off chance that a man needs to enter through the entryway, the individual ought to pass the individual security i.e. the finger vein perceiving innovation. The individual ought to keep his finger in the locator, which filters the picture and matches with the database introduce inside the framework. This methodology is completed utilizing MATLAB programming. The individual's tested picture is now nourished into the database. To begin with, the filtered picture is binarized and the inordinate area and lossy territories are disposed off. The picture is further refined through the MATLAB process and the first district of investment is put away inside the database. At the point when the individual who needs to gets past the entryway must keep his finger on the identifier. The identifier is contained USB cam above and IR Drove underneath. The picture of the finger once kept is examined and caught with the cam and the picture is send for further handling. After a few courses of action of picture division, and picture improvement the ideal picture without commotion is send to the database in pairs arrangement. The coordinating of the constant result is finished with the effectively put away information in the database. The coordinated is carried out by the microcontroller. When the outcome is sure, the microcontroller works the transfer and make access to gets past the entryway. Subsequently the client completes his first level security. The second level security is GSM innovation. Once the client goes into the room. He himself utilizes his cellular telephone to send a SMS to the end security framework which is as of now preloaded with the GSM module. The framework on getting the SMS checks for its uniqueness with the operation of the microcontroller. In the event that the coordinating is carried out the yield of the microcontroller is certain. When the outcome is certain the framework is made to produce the arbitrary one time secret key and make it answer to the client. The client on accepting the one time secret word by means of SMS needs to sort this as a key on the keypad. Once the framework created one time secret word is coordinated with the particular case that is being written, the microcontroller works the hand-off joined to it and opens the locker. Along these lines the two level verification makes high security and further improved security to enhance the framework wellbeing. 7.1 CONCLUSION This paper has proposed another level of security frameworks for individual confirmation furthermore for different applications. With the assistance of the finger vein indicator, we can secure a steady, novel and a secured biometric framework with the assistance of the above segments the framework can be solid and transformed with no deviations. Despite the fact that the gadget is expensive it can transform consistently and the level of the security is high when contrasted and alternate techniques for biometric filtering. With respect to second level security is concerned, which is GSM SIM 300 innovation, it is a shabby and dependable framework which conveys between the client and the gadget continually with no obstruction. What's more the fundamental focal point of this framework is the novel arbitrary code which is produced by the gadget and sent to the client for confirmation which makes this framework profoundly securable. Although more work is to be transformed, our outcomes to the blend of the Finger vein innovation and the GSM SIM 300 innovation is guaranteed and it is a superior development in the field of security. This is particularly utilized as a part of the field of security frameworks and all different fields identified with it.
  • 5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY VOLUME 4 ISSUE 2 – APRIL 2015 - ISSN: 2349 - 9303 64 REFERENCES [1] Zhi Liu and Shangling Song ―An EmbeddedReal-Time Finger- Vein Recognition SystemFor Mobile Devices‖,IEEE Transactions on Consumer Electronics, Vol. 58, No. 2, May2012. [2] V.Ramya, P.Vijaya kumar, B.Palaniappan ―ANOVEL DESIGN OF FINGER VEIN RCOGNITION FOR PERSONAL UTHENTICATION AND VEHICE SECURITY‖ Journal of Theoretical and Applied Information Technology, Vol. 65, No.1. [3] T.Y.V BhanuKiranmai, K.Amruthavally, andG.Harish ―An Embedded Real-Time Finger-Vein Recognition System for Security Levels‖,International Journal of Application orInnovation in Engineering & Management(ijaiem), Volume. 2, Issue. 6, June 2013. [4] Caixia Liu, ―Study on Finger Vein Feature Extraction Algorithm‖, International Journal of Computer Science Issues, vol. 10, no 3, 2012. [5] Ajay Kumar and Yingbo Zhou ―Human Identification Using Finger Vein‖, IEEE Transaction on image processing, Vol.21, No.4, 2012. [6] E. C. Lee and K. R. Park, ―Restoration method of skin scattering blurred vein image for finger vein recognition,‖ Electron. Lett., vol. 45, no. 21, pp.1074–1076, Oct. 2009. [7] Ma Yuchun; Huang Yinghong; Zhang Kun; LiZhuang, "General Application Research on GSM module," Internet Computing & Information Services(ICICIS), 2011 International Conference on , vol., n., pp.525,528, 17-18 Sept. 2011 [8] Jingjing Wang, "Realizing SMS Using PC's Serial Port Based on VC++," Computer Science an Engineering, 2009. WCSE '09. Second International Workshop on, vol.2, no., pp.382, 384,8-30 Oct. 2009