Intellegent Employee Authentication using RFID and Face Detection
Abstract
provided with radio frequency identity. As finger print systems are
also available. But there are many tricks to hack the finger print and
use then to access the entry. Here we are implementing the RFID
based employee authentication system with image recognition(face
detection). The employees are made to pass through the
Authentication Systems at the main entry. The authenticity of
employee is being checked by means of RFID credentials being
carried by the employee in their RFID based Identity Card. When
card will be detected at that time image of the employee will be
captured and will be send to personal computer to verify it with the
original database of the detected RFID card. Once system detects the
RFID credentials then it will automatically display all the
information about the employee and image recognition is done then
security at the entry gate can identify whether the employee is
authorized or not. If it is unauthorized then proper action will be
taken such as sounding the buzzer.
Full Text:
PDFReferences
Saurabh Chatterjee and Prof. Balram Timande, “Public transport ticketing
system using RFID and ARM processor”, International Journal of Electronics
and Computer Science Engineering, 2009
G.Prabhakara Rao, Suresh Chandra Patidar, P.Balaji, P.Arumugam,
S.A.V.Satyamurty, “Design and Implementation of Intelligent Employee
Authentication System[IEAS]”, Conference of IEAS, 2015
Christoph Jechlitschek, “A survey paper on Radio Frequency identification
(RFID) trends ”, 24 April 2006.
Archana Thange, “Rfid Authentication Protocol for security and privacy
Maintenance in Cloud Based Employee Management System”,2009
D.V.S Chandra Babu. “Wireless intelligent billing trolley for supermarket”,
International Journal of Advanced Research in Technology, vol.3, issue 1, Aug.
Kamran Ahasan, Paul Kingston “RFID applications: an introductory and
exploratory study”,IEEE paper.
T. Dimitriou. A lightweight RFID protocol to protect against traceability and
cloning attacks. In Conference on Security and Privacy for Emerging Areas in
Communication Networks – Secure Comm., IEEE. Athens, Greece, September
Refbacks
- There are currently no refbacks.
Copyright © IJETT, International Journal on Emerging Trends in Technology