Intellegent Employee Authentication using RFID and Face Detection

Kalyani Kadlag, Prerana Kale, Kalyani Pagar

Abstract


In most of highly secured industries employees are
provided with radio frequency identity. As finger print systems are
also available. But there are many tricks to hack the finger print and
use then to access the entry. Here we are implementing the RFID
based employee authentication system with image recognition(face
detection). The employees are made to pass through the
Authentication Systems at the main entry. The authenticity of
employee is being checked by means of RFID credentials being
carried by the employee in their RFID based Identity Card. When
card will be detected at that time image of the employee will be
captured and will be send to personal computer to verify it with the
original database of the detected RFID card. Once system detects the
RFID credentials then it will automatically display all the
information about the employee and image recognition is done then
security at the entry gate can identify whether the employee is
authorized or not. If it is unauthorized then proper action will be
taken such as sounding the buzzer.

Full Text:

PDF

References


Saurabh Chatterjee and Prof. Balram Timande, “Public transport ticketing

system using RFID and ARM processor”, International Journal of Electronics

and Computer Science Engineering, 2009

G.Prabhakara Rao, Suresh Chandra Patidar, P.Balaji, P.Arumugam,

S.A.V.Satyamurty, “Design and Implementation of Intelligent Employee

Authentication System[IEAS]”, Conference of IEAS, 2015

Christoph Jechlitschek, “A survey paper on Radio Frequency identification

(RFID) trends ”, 24 April 2006.

Archana Thange, “Rfid Authentication Protocol for security and privacy

Maintenance in Cloud Based Employee Management System”,2009

D.V.S Chandra Babu. “Wireless intelligent billing trolley for supermarket”,

International Journal of Advanced Research in Technology, vol.3, issue 1, Aug.

Kamran Ahasan, Paul Kingston “RFID applications: an introductory and

exploratory study”,IEEE paper.

T. Dimitriou. A lightweight RFID protocol to protect against traceability and

cloning attacks. In Conference on Security and Privacy for Emerging Areas in

Communication Networks – Secure Comm., IEEE. Athens, Greece, September


Refbacks

  • There are currently no refbacks.


Copyright © IJETT, International Journal on Emerging Trends in Technology