Paper The following article is Open access

Coordinate Access System for Live Video Acquisition

, , , and

Published under licence by IOP Publishing Ltd
, , Citation B. Annapurna et al 2020 J. Phys.: Conf. Ser. 1712 012034 DOI 10.1088/1742-6596/1712/1/012034

1742-6596/1712/1/012034

Abstract

Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are protected by biometric recognition systems like fingerprint scans facial recognition, retina scans, voice matching, etc. Even our phones, laptops, and daily access devices are equipped with biometric systems. In banks, the PCs are secured by the combination of passwords and fingerprint scans. Biometric scans are considered the most secure access technology so far. Our paper is to examine whether they are secure? Should we rely on them with our hard-earned money and social identity? Is there any way we can use these services without actually compromising our data and security? Our observation is on our digital identity. Promoting digitization in every department brings our topic in the picture. All our information is saved in our phones, our daily routine, whom we talk, what we purchase, whom we chat, where we travel, etc. Almost every smartphone has biometric fingerprint locks which means our phones have our fingerprint scans in database and with internet blend it's tethered worldwide. Our fingerprints are connected to our bank accounts, PAN Cards, Passport, and SIM Cards using Aadhar Cards. If someone has our fingerprint they can easily reach our Aadhar Card and through that to all our personal information. Most of the phone companies are Chinese, Korean, German, and American. As per their country policies, they must share their data with the governing authorities. We aim to create a security system without actually using the biometric scans. The system is an advancement of the biometric system but with better accuracy and intelligence. We interface image acquisition tools to live track the red color things. The web camera or inbuilt system lens can be used as the acquisition system. When the red color object is moved in front of the lens it shows the corresponding coordinate of the object shown. We use these x and y coordinate of the objects as the authentication points. If the correct value grant access is 120 ⩽ x ⩽ 122 means the system grants permission only if the value of x=120,121 or 122 is obtained. Now, this is tricky. Even if you know the correct value also, it is very difficult to bring the correct point. Think about if you don't know the point and it is also possible to make it much difficult by adding y coordinate so if the desired point is x=10, y=12 (10, 12) it is way more difficult. Each point is a possible password candidate and the screen of any device have megapixels where 1 Megapixel=106 pixels. Each pixel is a possible key or password entry. It can keep all our information safe and secure. We use a microcontroller and motor driver connected gate to demonstrate the result.

Export citation and abstract BibTeX RIS

Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.

Please wait… references are loading.
10.1088/1742-6596/1712/1/012034