Submit Search
Upload
IRJET- Advanced Two Factor Authentication using Image Processing
•
0 likes
•
33 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i2/IRJET-V6I2437.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
IRJET - Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
IRJET Journal
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
50120130406045
50120130406045
IAEME Publication
Improved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
Recommended
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
“Enhancing Iris Scanning Using Visual Cryptography”
“Enhancing Iris Scanning Using Visual Cryptography”
iosrjce
A survey paper on various biometric security system methods
A survey paper on various biometric security system methods
IRJET Journal
IRJET - Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
IRJET Journal
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
An Efficient Fingerprint Identification using Neural Network and BAT Algorithm
IJECEIAES
50120130406045
50120130406045
IAEME Publication
Improved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
A comparative analysis of Iris data compression
A comparative analysis of Iris data compression
IJSRED
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
ijtsrd
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Biometrics in India
Biometrics in India
Kshitij Behl
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
ijtsrd
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
More Related Content
What's hot
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET Journal
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
ijtsrd
A comparative analysis of Iris data compression
A comparative analysis of Iris data compression
IJSRED
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET Journal
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET Journal
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
IRJET Journal
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
ijtsrd
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Biometrics in India
Biometrics in India
Kshitij Behl
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
A Study of Iris Recognition
A Study of Iris Recognition
editor1knowledgecuddle
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
ijtsrd
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
IJERA Editor
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
IJCSEIT Journal
What's hot
(18)
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
A comparative analysis of Iris data compression
A comparative analysis of Iris data compression
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
Biometrics in India
Biometrics in India
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
A Study of Iris Recognition
A Study of Iris Recognition
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
Similar to IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET Journal
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
I017335457
I017335457
IOSR Journals
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
Maria Perkins
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET Journal
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
IRJET Journal
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
IRJET Journal
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
IRJET Journal
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
NIDHI SHARMA
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
pradip patel
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET Journal
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
IRJET Journal
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
Lisa Cain
Similar to IRJET- Advanced Two Factor Authentication using Image Processing
(20)
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
Fingerprint Based Voting
Fingerprint Based Voting
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
I017335457
I017335457
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
Soham Mondal
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
soniya singh
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Recently uploaded
(20)
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
IRJET- Advanced Two Factor Authentication using Image Processing
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2206 ADVANCED TWO FACTOR AUTHENTICATION USING IMAGE PROCESSING S. Jeyalakshmi1, H. Vaitheeswaran2, S. Vashanth3, G. Vignesh kumar4, S. Vijayan5 1Asst. Prof, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu 2,3,4,5B. Tech, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Mobile commerce is an emerging trend. Mobile commerce provides users to perform shopping, order food, m- payments, etc. These increasingtrendleadstosecuritythreats. This paper is focused on users authentication and security. Existing system used for mobile payment services in handheld devices doesn’t involve biometric authentication. Hence leading to misuse and confusion among m-commerce users, User authentication is performed by usingfingerprintanalysis invoking fusion of 2 algorithms namely Minutiae Maps (MM) and Orientation Map (OM). Also to enhance and provide more security we integrate IRIS recognition of the users. Fingerprints are the most used biometrics in mobile applications at recent but it has not been implemented in mobile transactions. Thisprojectimplementstheidentification procedure. It matches one fingerprintamongNfingerprints. It uses minutiae points based algorithms. In the enrollmentstep, the points are extracted from the print. Later on, during the authentication step, the points are matched. They are implemented using fingerprint enhancement and minutiae filtering. Then for IRIS recognition, K-NN classifiers are used. For effective encryption and decryption we implement the algorithms among RC4, AES, DES, 3DES. For PIN generation we are using PIN distribution technique and for message authentication purpose we are using more secured algorithm like SHA algorithm. Key words: K-NN Classifier, MM – Minutiae maps, OM- Orientation maps, PIN – Personal IdentificationNumber 1. INTRODUCTION: Online banking transaction isdevelopingandmostlyusedby every merchant user in recent times. More than millions of customers using online transactions. Authentication is the only process to validate and verify the users. One time password (OTP) is the only security added in present time for authenticating users. As the users increases, intruders and security breaches also increases. To increase more security we can adopt our bio-metricsfortheauthentication. The main objective of this research project was to create a performing and accurate program for fingerprint identification. Also to enhance and provide security we integrate IRIS recognition of the users. For IRIS recognition, we used K-NN classifier algorithm. For effective encryption and decryption we are using the algorithms such as RC4, AES, DES, 3DES. For PIN generation we are using PIN distribution technique. Message authentication purpose, we are using more secured algorithm like SHA algorithm. I choose the subject of fingerprints because it involves different fields like pattern recognition, statistical tests, minutiae detection, performing algorithm programming. Fingerprint recognition stands for me as a stereotype in pattern recognition and detection. Techniques used in this field can be reused in other applications. Added to that, high security issues led to a lot of research on fingerprint recognition, meaning that the techniques we used are advanced. 2. OBJECTIVE This project is proposed to provide greater security in online transactions. And our main motive is to minimizethepossibilityof security breach in Authentication scheme. Then to provide secure forwarding infrastructure and to provide useful privacy and secure public policy framework. Finally we had developed to enhance the confidentiality and integrity in online banking transactions. 3. RELATED WORK: Online banking dealings were developing and largely employed by each people in gift year. Over scores of customer’svictimizationon-linetransactions.Authentication is that the solely method to validate and verify the users. Only once secret (OTP) is that the solely security value- added in nowadays for authenticating users. Because the users will increase, intruders and security breaches conjointly will increase. To extend a lot of security we are able to adopt our bio-metrics for the authentication. We choose the topic of fingerprints as a result of it involves completely different fields: pattern recognition, applied mathematics tests trivialities detection, playacting formula programming. Fingerprint recognition stands on behalf of me as a stereotype in pattern recognition and detection. Techniques employed in this field will be reused in alternative applications. additional to it, high securityissues diode to plenty of analysis on fingerprint recognition, For encryption and decryption we used differentalgorithmslike RC4, AES, DES, 3DES. Thus finally we used Pin distribution algorithm for distributing the PIN. Thus, Our project
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2207 promotes and focuses onthe usersauthenticationinsafeand secured way for safeguarding the usersinbank transactions. In [1] “A Brief Review of the Iris Recognition Systems for Developing a User-Friendly Biometric Application”, IEEE International Conference on Energy, Communication, Data Analytics and SoftComputing(ICECDS-2017)byJagadeeshN and Dr. Chandrasekhar M. Patil in 2017: A biometric system offers automatic identification of a human being based on the unique feature or characteristic whichisbeingpossessed by the individual. A number of biometric techniquesexistsin the current scenario, viz., finger print, iris, face, etc. The iris segmentation is one of the most dominant type used in all Aadhar card applications & has its ownmajorapplicationsin the field of surveillance as well as in security purposes. The performance of an iris recognition systems depends heavily on the feature extraction, histogram, and segmentation with normalization techniques. In [2] “A Survey on Iris Recognition System”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016 by Sandeep Patil, Shreya Gudasalamani, Nalini C. Iyer in 2016: Biometricsrecognition is the use of physiological and behavioral traitstoidentify an individual. Many biometric traits have been developed and are being used to authenticate the person's identity. Iris recognition systems are widely used and have been proved to be efficient at individual recognition with high accuracy and nearly perfect matching. the Iris images are gathered from the publically available Iris database TheIrisfeature of two eyes of same person are not similar making it more secured way of authentication compared to other Biometric recognition systems. The various stages of processing involved in the design of Iris recognition system are Localization of eye, Boundary segmentations of Iris and pupil, Normalization,Local feature extractions and Matching. In [3] “Fingerprint Based Biometric ATM Authentication system”, IEEE International Journal of Engineering Inventions, e-ISSN: 2278-7461, p-ISSN: 2319-6491, Volume 3, Issue 11 (2014) PP: 22-28 by Dhiraj Sunehra in 2014: Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometric-based solutions are able to provide for confidential financial transactionsandpersonal data privacy. The various features used are face, fingerprints, hand geometry, handwriting, iris, retina, vein and voice. All fingerprints have unique characteristics and patterns. A normal fingerprint pattern is made up of lines and spaces. These lines are called ridges while the spaces between the ridges are called valleys. It is through the pattern of these ridges and valleys that a unique fingerprint is matched for verification and authorization. These unique fingerprint traits are termed “minutiae” and comparisons are made based on these traits. In [4] “An improved algorithm for feature extraction from a fingerprint fuzzy image”, by kamil surmacz*, khalid saeed, piotr rapta in 2013: Proper fingerprint feature extraction is crucial in fingerprint-matching algorithms. permanently results, different items of knowledge a couple of fingerprint image, like ridge orientation and frequency,must bethought of. it's usually necessary to boost the standard of a fingerprint image so as for the feature extraction method to figure properly. During this paper we tend to gift an entire (fully implemented) improved algorithmic program for fingerprint feature extraction, supported various papers on this topic. The paper describes a fingerprint recognition system consisting of image preprocessing, filtration, feature extraction and matching for recognition. The image preprocessing includes normalization supported mean and variation. The orientation field is extracted and physicist filter is employed to organize the fingerprint image for additional process 4. PROPOSED SYSTEM: This project is mainly focused on Fingerprint recognition, IRIS recognition and PIN authentication. Thus fingerprint recognition provides more security for online transactions. Then IRIS recognition integrationprovideshighsecurity and avoid fake users. Thus two steps are done to perfectly validate the users and avoid fake users. The biometricimage of the user is sent safely to biometric server via WAP gateway. Effective finger print extraction algorithm like OM, MM, Core point detection, Gabor filter, OCM are used and they are used to identify the fingerprint. IRIS recognition is implemented using K-NN classifier. PIN distribution technique are used to finally verify the users. Weresearched on implementing effective encryption algorithms among RC4, AES, DES. 5. SYSTEM ARCHITECTURE: Fig- 1: System Architecture diagram The above diagram clearly explains that the customer or user wants to purchase some products or items they should place the products in a cart and then wants to pay the appropriate amount for the product. Hence, The product merchant confirmstheorder.Themerchantgatewayinvokes the biometric server for money transaction. Then the biometric server request the user to givethebiometrics.Asa
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2208 response the user gives the biometrics. They are acknowledged to the payment gateway merchant that the biometrics are given and they will intimate the user that are biometrics are taken as an input successfully, then they are authenticated with the help of the authentication server by the given inputs. If the authentication server fails the external servers are used to authenticate the users. Thus backup servers are known as external server. Thus finally, money gets transacted to the bank if biometrics placed are legitimate and matched with the appropriate user and are given to the appropriate merchant. Thus, the user was authenticated and transacted the money in a secured way. This will be very effective when compared to other authentication schemes. 6. METHEDOLOGY: For implementation the entire system has been divided into the following modules: IRIS recognition Fingerprint recognition PIN distribution A. IRIS recognition: IRIS is recognized by KNN-classifiers. In pattern recognition field, KNN algorithm is one of the most important and secured non-parameter algorithms and it is a supervised learning algorithm. The classification rules are generated by the set of training samples itself without the need of any additional data. The KNN classification algorithm predicts the test sample’s category according to the K training samples which are the nearest neighbors to the test sample, and judge it to that category which has the largest category probability. Once the iris region is successfully segmented from an eye image, the next stage is to transform the iris region so that it has fixed dimensions in order to allow comparisons. The detection inconsistencies between eye images are mainly due to the streching of the iris caused by pupil dilation from varying levels of illumination. The IRIS recognition module is described below as follows, Fig – 2: IRIS recognition flow diagram The described iris recognition process will be shown in fig.3 as below as follows, Fig - 3: IRIS recognition module Fig – 4: Classification and recognition module B. Fingerprint recognition: The orientation info per pel is just required to enhance the fingerprint. This method is completed to extend the quality of the print by reducing the noise, filling some tiny gaps and enhancing the ridges and valleys. The Gabor filters are usually utilized in fingerprint identification algorithms. Histogram equalization improves distinction of the input image by uniformly distributing intensity levels on whole image manufacturing uniform bar chart. So new intensity values replaces all the previous intensity values manufacturing bright and increased image. Minutiae points are extracted throughout the enrollment process and so for every authentication. In an exceedingly fingerprint, they correspond to either a ridge endingora bifurcation,there'sa duality between the two kinds of minutiae: if the picture element brightness is inverted, ridge endings become bifurcations and contrariwise. The position of the detail
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2209 purpose is at the tip of the ridge or the valley. The orientation is given by the orientation of the arrow formed by the ridge or the depression. Steganography is the process of hiding a secret message within an ordinary message and the detection of hidden content is called as steganalysis. We propose an optimal discrete wavelet transform based steganography. First decomposition is done on a hostimage and the secret information is hidden by manipulating the transform coefficients of the decomposed image. After embedding, the stego image is subjected to various types of image processing attacks like Gaussian white noise, salt and pepper noise, blurring and sharpening. Experiments show that the peak signal noise ratio generated by the proposed method is better. The Fingerprint recognitionisdescribedas follows, Fig – 5: – Fingerprint recognition module C. PIN distribution: For secure PIN distribution we propose a unique sequence which is encrypted using RC4 algorithm and sent to the authentication and external servers for verification. In this system all important details of the user namely user id, timestamp, PIN number and user IP address (collectively termed as a token) are obtained. Our architecture proposes high secure PIN distribution techniquebysplittingthe4digit PIN number into two parts i.e., 2 digits each and forming a sequence. Each part separately will be processed toproduce the decimal sequence number.ThePIN distributionisshown in Fig. 4.1.3.b. Recent database query management plays an important role because whenever the new data is hit the administrator should know whether the actual user is only hitting the database and initiatingthetransaction.Hence our architecture obtains user id, time stamp and IP address and monitored whenever the query is processed by the user. Fig – 6: PIN seperation Fig 7: PIN encryption Fig – 8: PIN decryption 7. FUTURE ENHANCEMENT: Advanced two factor authentication can be useful for banking in future. Now, fingerprints are mostly used and trending in all mobile phones, laptops, tablets. But iris recognition is developing stepbystepandnowimplemented in some mobiles. If they are implemented in every mobile phones then these authentication will helpful in banking sector and provides a better security with high performance and reduces the time of authentication. Sincethefingerprint and iris are unique for every humans, they can be integrated and used in all the authentication purposes. This can be the perfect solution choice for the challenging security in banking sectors. 8. CONCLUSION: User authentication is important in M-commerce applications to ensure the communicating entity is theexact user and our proposed architecture ensures using fingerprint analysis. The fingerprint analysis is effectively performed by fusion of two algorithms namely Minutiae Maps (MM) and Orientation Maps (OM). By fusing and implementing both algorithms the finger print process is
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2210 more accurate and effective. Also the fingerprint is sent to the biometric server through WAP gateway in a secure way using DWT data hiding technique. To add more security we introduce secure PIN distribution process using our proposed PIN distribution architecture, unique sequence formation, OK message concept, RC4 encryption algorithm and SHA algorithm for message authentication. The execution time is analyzed and compared amongencryption algorithms namely DES, 3DES, AES, RC4 for processing the PIN split up, unique sequence and forming the cipher text in Sony C6602 and Moto G. The result shows that RC4 algorithm is faster and more effective in processing time when compared with other algorithms. Thus the proposed architecture ensures complete reliable and secure transaction for m-commerce users. 9. REFERENCES: 1. Jagadeesh. N, Dr. Chandrasekhar M. Patil, “A Brief Review of the Iris Recognition Systems for Developing a User-Friendly Biometric Application”, International Conference on Energy, Communication, Data AnalyticsandSoftComputing, 2017 2. Sandeep Patil, Shreya Gudasalamani ,Nalini C. Iyer, “A Survey on Iris Recognition System”,International Conference on Electrical, Electronics, and Optimization Techniques, 2016 3. Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authentication system”, International Journal of Engineering Inventions, Vol.4,Issue 11,2014. 4. K Amil Surmacz ,K Halid Saeed, P Iotr Rapta , “An improved algorithm for feature extraction from a fingerprint fuzzy image”, IEEE Transactions on Pattern Analysis and Machine Intelligence VOL.43, Issue.3, 2013 5. Aayushi Mishra,Manish Mathuria, “Multilevel Security Feature for OnlineTransaction using QR Code & Digital Watermarking”, International Conference on Electronics, Communication and Aerospace Technology,2015
Download now