Submit Search
Upload
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
•
0 likes
•
4 views
IRJET Journal
Follow
https://www.irjet.net/archives/V9/i1/IRJET-V9I177.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
A Case Study on Face Spoof Detection
A Case Study on Face Spoof Detection
IRJET Journal
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET Journal
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET Journal
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
Recommended
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
A Case Study on Face Spoof Detection
A Case Study on Face Spoof Detection
IRJET Journal
IRJET- Biometric Vehicle Starter and Security
IRJET- Biometric Vehicle Starter and Security
IRJET Journal
Face Recognition System using OpenCV
Face Recognition System using OpenCV
IRJET Journal
IRJET- Applications of Object Detection System
IRJET- Applications of Object Detection System
IRJET Journal
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET- Design, Test the Performance Evaluation of Automobile Security Tec...
IRJET Journal
Biometric Ear Recognition System
Biometric Ear Recognition System
IRJET Journal
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET Journal
3M Secure Transportation System.
3M Secure Transportation System.
IRJET Journal
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
ijtsrd
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
Ijetcas14 598
Ijetcas14 598
Iasir Journals
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
Biomatrics
Biomatrics
Amit Pandey
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
IRJET Journal
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
More Related Content
Similar to EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
IRJET Journal
3M Secure Transportation System.
3M Secure Transportation System.
IRJET Journal
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
ijtsrd
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
IRJET Journal
Fingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET Journal
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
ijtsrd
Ijetcas14 598
Ijetcas14 598
Iasir Journals
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET Journal
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
Biomatrics
Biomatrics
Amit Pandey
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
IRJET Journal
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
IRJET Journal
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET Journal
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
IRJET Journal
Similar to EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
(20)
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
3M Secure Transportation System.
3M Secure Transportation System.
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
Implementation of Multimodal Biometrics Systems in Handling Security of Mobil...
IRJET - Smart License Generation in RTO
IRJET - Smart License Generation in RTO
Fingerprint Based Voting
Fingerprint Based Voting
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET-Human Face Detection and Identification using Deep Metric Learning
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
Ijetcas14 598
Ijetcas14 598
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
Biomatrics
Biomatrics
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
MEDIBIOMETRIC – EMERGENCY HEALTHCARE SYSTEM
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
IRJET - Face Detection and Recognition System
IRJET - Face Detection and Recognition System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
rknatarajan
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
Suhani Kapoor
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls in Nagpur High Profile
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
roncy bisnoi
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
ranjana rawat
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
sanyuktamishra911
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
120cr0395
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
result management system report for college project
result management system report for college project
Tonystark477637
Recently uploaded
(20)
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
Extrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
result management system report for college project
result management system report for college project
EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 447 EMERGING BIOMETRIC AUTHENTICATION TECHNIQUES FOR CARS Mr.Thippireddy Varun Simha Reddy1, Mr.Rolla Sai Vignesh Rayal2, Dr.D.Stalin Alex3 1Student, Dept. of Electronics & Communication Engineering, Jain University, Karnataka, India 2Student, Dept. of Electronics & Communication Engineering, SRM University, Chennai, India 3Professor, Dept. of Computer Science & Engineering (Data Science), Jain University, Karnataka, India ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - A Biometric applications have continued to arise since the development of the sensors. The goal of this study is to develop a thorough understandingofbiometrics. Biometrics is a phrase that refers to human features, and the fact thatitis linked to security makes it even more appealing. By recognising traits that are unique to humans, biometric security makes identity verification easier. More inventions have been produced in this field due to the rapid rise of computer processing. When building a biometric system, the two most critical factors to consider are security and recognition accuracy. Security is essential at our businesses, universities, libraries, laboratories, and many other locations to ensure that our data is kept private and secure from unauthorised access. The lock will open automatically if the fingerprint and facial profile match; otherwise, the password will be requested; if they match, the lock will open. If this happens, the buzzer attached to the audioamplifier willsound to inform everyone close. Biometric authenticationplaysa key role in delivering high security in automobile door lock systems based on biometric authentication. Today, security is critical to ensure that our data is not kept hidden by unauthorised parties. The major purpose is to secure the automobile, and any car, from unauthorised individuals by employing a unique identifying system thatemploysbiometric authentication. Install a fingerprint scanner, facerecognition, and a password to unlock the door, and the door will automatically lock after 30 seconds to give additionalsecurity for the owner. Key Words: Biometric, Fingerprint, Iris, Voice, Facial, ECG. 1.INTRODUCTION Vehicle use has grown in importance all over the world, and it is also necessary to maintain it safe from thievery. Carmakers are incorporating security features into their products by using advanced mechanical technologies to avoid thefts, particularly in the event of cars. Biometric and non-biometric solutionsprovidesecurityhighlights.Security frameworks have been seen to crash as a result of stolen secret phrases and decoded information being encrypted, however it is extremely difficult to duplicate distinct characteristics. Biometric frameworks are increasingly commonplace, and technologies such as unique finger impression recognition, iris recognition, and facial recognition are gaining popularity. [1] Fingerprint acknowledgement and discovery frameworks, for example, are simple to convey, current, and persons may be distinguished without their awareness. IThe purpose of an in-car security system is to prevent vehicle theft and ensure the safety of passengers by avoiding the burglary approach. Recently, the automobile industry has been investing more in computerised advances than at any other time in order to provide improved insight to their customers, particularly with the new directions in Connected vehicles, which provide information both inside and outsidethevehicle,and Autonomous vehicles, which require virtually no human involvement in detecting their development and climate. Today, the automobile industry employsanactual validation framework, such as a critical coxcomb, whichisvulnerable to theft and tragedy. [11] The goal of this article is to suggest how the automobile industry may use various biometrics to verify and approve their automobiles, and how this can simply expand into providing different outsider administrations while maintaining client security. In this paper, we'll start by illustrating several biometrics, such as fingerprints, faces, hands, irises, retina scans,voice,andECG, as well as plausible, implementable biometrics for automobiles, before evaluating ideas for biometrics that aren't likely to be as appropriate. Biometric recognition (Biometrics) is based onthe recognitionofa person'snatural and social characteristics. Voice, iris, face, palm prints, finger/palm veins, fingerprints, and voice are just a few examples of biometrics that have been successfully implemented.Such use of biometrics in automobiles might prevent nefarious burglaries in which the owner has left the keys unattended, as well as verifying in-vehicle purchases such as petrol, charges, and espresso or other food-based administrations. [2] Following recognisable proof, the framework will provide customised adaptations, such as seating and backrest alterations, as well as a customised playlist. We can extend the administrationstooutsiders with authorisation. 1. BRIEF METHODOLOGY As shown by Jain et al. Biometrics recognitioncan be used to verify a person's claimed personality (confirmation mode) or to differentiate a person by comparing the biometric layouts of a large number of characters in a data set for a match (ID mode). The mode is dependent on how the programmeisrun.Inapplicationslike network confirmation, the client asserts his or her identity and proves it by providing a biometric that the framework compares to an all-around enrolled biometric. Confirmation mode is the name given to this mode. The biometric framework operates in distinguishing proof mode by
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 448 coordinating the biometric with the known biometrics in reconnaissanceactionswhenhiddentasksarenecessary.The phases of a common biometric framework are described, as well as the differences between check and enrollment. [3] Four main parts are envisioned for a biometric framework. 1. Sensor module: The device that records an individual's biometric data. For example, a facial recognition sensor that detects the user's face. 2. Element extraction module: This module analyses the biometric data obtained in order to eliminate a slew of restrictive regulations. 3. Matcher module: Separated pieces are compared to put- away layouts to generate a coordinating score. 4. Framework data set module: This module holds the enrolled clients' biometric forms. Fig1: Block diagram of enrollment, verification and identification tasks. Various bio-metrics exist and are utilised in various applications; however, only oneoutofeveryoddbiometricis appropriate for all applications, and each has its own set of strengths and weaknesses. Fig2: Examples of various biometrics 2 Working & Implementation 2.1. Finger print as a bio-metric Fingerprints are one of the oldest biometrics that is still set up and commonly used bylawenforcementagencies who use the "ink-procedure." When a finger is pushed against a sensor, the sensor detects the underlying properties of a unique mark - for example, edges and valleys. The finger imprint design has at least one region, whichisreferredtoas a singularity, and is divided into three types: circle, delta, and whorl. Although the size and cost of unique finger impression scanners have dropped, enabling the employment of innovation for client applications, there are some unique challenges in the management of finger impression explicit photos, such as estimating commotion due to wrinkles, dryness, and wounds.Most unique mark biometrics are now detected by scanning the surface of the finger on a finger imprint scanner. This is known as a "live output." [4] A appropriate sensor to get the biometric is required for live-filter detection. The sensors are usually assigned to one of the three families. Ultrasound,optical,and strong state Fig3: Ridges and valleys on a fingerprint. 2.2. Iris as a Bio-metric The iris of the eye has a surface that may be used to perceive a person. It was initially offered as a strategy for ID based on eye tone and surface, and then developed as a technique for ID based on iris samples. Daugman invented the main camera to capture the iris in the 1990s. It was originally delivered by the UAE for line control in 2001,andithassince been used by countries as diverse as Belgium and theUnited Kingdom, as well as the United States, India, Mexico, and Indonesia. [5] In their public ID systems, each of them has used the iris. Imaging innovation has accelerated with the
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 449 advancement of camerasand imagingsensors. Camerashave gotten more compact and user-friendly. Participation from the subject is essential to capture a photograph; otherwise, the photograph is considered "debased." In 2006, the Iris Moving Framework was introduced, which could capture images of the iris from a distance of 3 metres as the client walked at a speed of 1 metre per second. A-Optix and Delta- ID have made significantadvancementsintheircameras, and it should now be feasible to do so using a mobile phone. [6] Fig4: Evolution of IRIS biometrics 2.3. Voice as a Bio-metric The findings of the 2012 NIST Speaker Recognition Evaluation (SRE) reveal a TAR of about 93 percent with a FAR of 0.1 percent. Despite the demanding notion of the NIST SRE 2012 evaluation, which needed the computations to identify if an objective speaker had talked in a specifictest discourse fragment with significant foundation turmoil, this indisputable level of precision was achieved. [7] However, the rise of smart speakers such as Amazon Alexa, Google Home, and voice partners such as Apple'sSiriandSamsung's Bixby are examples of models that employ speech detecting technology and are similar to those used in the automobile industry for voice instructions. Fig5: Voice recognition model 2.4. Facial Recognition as a Bio-metric Face is the most often used biometric, aside from finger impressions, because it does not require direct touch or commitment from the customer. Face biometrics plays an important role in areas such as security,accessmanagement, and human-robot interaction. [8] The most common use of face biometrics is facial recognition, which is the process of identifying a face from a photograph and comparing it to a pre-programmed framework for determining evidence or confirmation reasons. Fig6: Timeline of facial recognition 2.5. ECG as a Bio-metric Electrocardiogram (also known as ECG or EKG) is a noninvasive method of recording the cardiovascular electrical indications produced by the heart that is also intriguing to everyone. ECG has traditionallybeenusedinthe medical field forheart monitoring, but it is now being usedin biometrics. [9] Electrical channels, also known as terminals, are placed on the body to measure pulses, which are electrical indications that begin with the depolarization and repolarization of the myocardium, or heart muscle. An ECG signal is a cyclic redundancy with 1-1.5 pulses per second recurrence. P, Q, R, S, and T waves are present in a solid ECG signal [10].
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 450 Fig7: The five different wave forms from an ECG signal 3. CONCLUSIONS Because of the time constraint, our job is limited to a period of thought based on research andinformationgatheredfrom many examination sources. Fostering this framework and really conducting an evaluation to determine the exactness of the framework, in general, might be considered as future effort. Additionally,[12] a more in-depth examination of employing butt-based biometrics to recognise the client when positioned should be conducted. This biometric technology will be effective in cases when the car owner (under escort conditions) is seated in the secondary lounge and their driver routinely opens and closes the door for them.Similarly, a second technique for verification apart from Biometrics may be necessary at times -eitherwhatyou know (password) or what you know youhave,andthese will be useful in situations when Biometrics cannot be provided, such as cuts on fingers. Biometrics in the automobile industry is still in its early stages of development, and it has a wide range of applications. Biometrics' unique characteristics, current advancements in both equipment and calculations, and client acceptance in everyday life create a new client market for associated vehicles.[13] The biometrics frameworks market is expected to be valued at $969 million by 2023. REFERENCES [1].A. K. Jain, A. Ross and S. Prabhakar, "An introduction to biometric recognition," in IEEE Transactions on Circuitsand Systems for Video Technology, vol. 14, no. 1, pp. 4-20, Jan. 2004. [2].Apple (2018) Apple T2 Security Chip Security Overview. Retrieved August 16, 2019, from https://www.apple.com/euro/mac/shared/docs/Apple_T2_ Security_Chip_Overview.pdf [3].Robust Iris Recognition in Unconstrained Environments, Journal of AI and Data Mining, A. Noruzi1, M. Mahlouji2, Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom, Iran *and A. Shahidinejad Department of Electrical and ComputerEngineering,Kashan Branch, Islamic Azad University, Kashan, Iran. Received 06 September 2018; Revised 22 February 2019; Accepted 08 May 2019 [4].Bhatia, R. (2013). Biometrics and Face Recognition Techniques. International Journal of Advanced Research in Computer Science and Software Engineering, 3(5),pp.93-99 [5].Jain, A., Nandakumar, K. and Ross, A. (2016). 50 years of biometric research: Accomplishments, challenges, and opportunities. Pattern Recognition Letters, 79, pp.80-105. [6].J. Ribeiro Pinto, J. S. Cardoso and A. Lourenço, "Evolution, Current Challenges, and Future Possibilities in ECG Biometrics," in IEEE Access, vol. 6, pp. 34746-34776, 2018. [7].I. Odinaka, P. Lai, A. D. Kaplan, J. A. O'Sullivan, E. J. Sirevaag and J. W. Rohrbaugh,"ECGBiometricRecognition:A Comparative Analysis," in IEEETransactionson Information Forensics and Security, vol. 7, no. 6, pp. 1812-1824, Dec. 2012. [8].Kulkarni, V. and Babu, V. (2015). Embedded Smart Car Security System on Face Detection. Special Issue of IJCCT, 4(1), pp.112-116. [9].Santos, Alex & Medeiros, Iago & Resque, Paulo &Rosário, Denis & Nogueira, Michele & Santos, Aldri & Cerqueira, Eduardo & Roy Chowdhury, Kaushik. (2018). ECG-Based User Authentication and Identification Method on VANETs. 119-122 [10].Goodeintelligence.com. (2019). Biometrics for the Connected Car: Identifying Who You Are and How You Are. [online] [11].Singh, S. (2019). The role of speech technology in biometrics, forensics and man-machine interface. International Journal of Electrical and Computer Engineering, 9(1), 281-288. [12].R. A. Rashid, N. H. Mahalin, M. A. Sarijari and A. A. Abdul Aziz, "Security system using biometric technology: Design and implementation of Voice Recognition System (VRS)," 2008 International Conference on Computer and Communication Engineering, Kuala Lumpur, 2008, pp. 898- 902. [13].Yang, J. and Xie, S. (2012). New trends and developments in biometrics. Rijeka, Croatia:InTech,pp.149- 169.
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 01 | Jan 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 451 BIOGRAPHIES Pursuing B.Tech Final year in Electronics and Communication Engineering at Jain Deemed-to be University, Bangalore as well student member in IEEE. Pursuing B.Tech Final year in Electronics and Communication Engineering at SRM University, Chennai. Working as a assistant professorat Jain Deemed-to be University, Bangalore in Computer Science & Engineering(Data Science- Specialization)
Download now