3 Factor Securities based on RFID, GSM and face
Recognition for Visitor Identification
Minakshi Gupta 1, Ketki Deshmukh 2
Electronics & Telecommunication Department, Mukesh Patel School of Technology and Management NMIMS University Bhakti Vedant Swami Marg, JVPD Scheme, Vile Parle (west) MUMBAI (Maharashtra)
Abstract- Now a day’s everything is moving from Manual to automatic so it is necessary to developed automatic security system involving more than one electronic device to make it more reliable. In the coming future ubiquitous society, RFID tags will be affixed to every person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify people and will automatically take advantage of contextual information. On the other hand, a problem is arising where the excellent tracking ability of RFID is abused and personal privacy is being violated. Due to this reason I have decided to build a system involving more security factor, which has fewer disadvantages and involve very less human resources. Existing security system has only one or two electronic Device which can be easily manipulated by anyone. so the system is not reliable and not highly secured so I have implement and add one more Electronic device in the existing system which will provide more security.This paper clarifies the active tag privacy problem and proposes a method for protecting personal privacy regarding the active RFID tags.
Keywords— RFID active tag, GSM, Microcontroller 89c51, PC, camera, RS232, Keypad 1. Introduction
The system for visitor identification consists of the following: RFID Tag, GSM Modem and a security camera monitors the front door of a building. RFID user insert the tag into the RFID Reader, which is read the code and transmit code on particular Mobile, mobile user enter this code through the keypad and simultaneously security camera front acquiring images of people as they enter; an automated system extracts faces from these images and quickly identifies them using a database of known individuals. If all factors will match with the database visitor identified and relay will operate and door access and open otherwise it door will not operated. The system must easily adapt as people are added or removed from its database, and the system must be able to recognize individuals in near-frontal photographs. This paper focuses on the RFID, GSM and face recognition technology that is required to address this real-world task.
2. Basic Components
2.1-Active RFID Tag
RFID is an automated data collection technology in which radio communication for data transfer across two entities: a reader and a tag. The tag has two sections: one for radio communication and other for data storage. Radio Frequency Identification (RFID), and automatic face recognition technology employing wireless communications, has recently drawn much attention. RFID tags, which are electronic tags that employ RFID technologies, can be broadly classified into passive and active types of tags. The passive type does not incorporate a battery and has a short communications range, but the cost is low. Conversely, the active type incorporates a battery and has a long communications range, but the cost is high.
In the coming future ubiquitous society, Radio Frequency Identification (RFID) tags will be affixed to every product and person. This technology is anticipated to be a key technology that will be utilized by various ubiquitous services where these tags will be used to identify things and people and will automatically take advantage of contextual information such as location. Radio Frequency Identification (RFID), and automatic recognition technology employing wireless communications...