z-logo
open-access-imgOpen Access
Coordinate Access System for Live Video Acquisition
Author(s) -
B. Annapurna,
T. Rama Reddy,
Ch. V. Raghavendran,
Raushan Kumar Singh,
Vedurai Veera Prasad
Publication year - 2020
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1712/1/012034
Subject(s) - password , biometrics , fingerprint (computing) , computer science , computer security , phone , digitization , internet privacy , smart card , identity theft , fingerprint verification competition , fingerprint recognition , the internet , world wide web , telecommunications , philosophy , linguistics
Biometric systems are the most advanced access technology developed so far in the 21 st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are protected by biometric recognition systems like fingerprint scans facial recognition, retina scans, voice matching, etc. Even our phones, laptops, and daily access devices are equipped with biometric systems. In banks, the PCs are secured by the combination of passwords and fingerprint scans. Biometric scans are considered the most secure access technology so far. Our paper is to examine whether they are secure? Should we rely on them with our hard-earned money and social identity? Is there any way we can use these services without actually compromising our data and security? Our observation is on our digital identity. Promoting digitization in every department brings our topic in the picture. All our information is saved in our phones, our daily routine, whom we talk, what we purchase, whom we chat, where we travel, etc. Almost every smartphone has biometric fingerprint locks which means our phones have our fingerprint scans in database and with internet blend it’s tethered worldwide. Our fingerprints are connected to our bank accounts, PAN Cards, Passport, and SIM Cards using Aadhar Cards. If someone has our fingerprint they can easily reach our Aadhar Card and through that to all our personal information. Most of the phone companies are Chinese, Korean, German, and American. As per their country policies, they must share their data with the governing authorities. We aim to create a security system without actually using the biometric scans. The system is an advancement of the biometric system but with better accuracy and intelligence. We interface image acquisition tools to live track the red color things. The web camera or inbuilt system lens can be used as the acquisition system. When the red color object is moved in front of the lens it shows the corresponding coordinate of the object shown. We use these x and y coordinate of the objects as the authentication points. If the correct value grant access is 120 ⩽ x ⩽ 122 means the system grants permission only if the value of x=120,121 or 122 is obtained. Now, this is tricky. Even if you know the correct value also, it is very difficult to bring the correct point. Think about if you don’t know the point and it is also possible to make it much difficult by adding y coordinate so if the desired point is x=10, y=12 (10, 12) it is way more difficult. Each point is a possible password candidate and the screen of any device have megapixels where 1 Megapixel=10 6 pixels. Each pixel is a possible key or password entry. It can keep all our information safe and secure. We use a microcontroller and motor driver connected gate to demonstrate the result.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here