Online ISSN: 2515-8260

Keywords : Fingerprint


Smart ATM Security Using Face Recognition

Darwin Nesakumar A; T Suresh; Nivedha T; K Nivedha S; Priyadharshini G; P Mugilan

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 1349-1354

In this modern world, every people use ATM machines for withdrawal and transferring cash. This research is based on implementing recognizing Fingerprint mechanism in the ATM System. We selected this in order to increase the security of the customers to make easy transaction. Each human being has different fingerprint minutiae characteristics hence this process will be more applicable. There is no fear of losing the ATM card and no requirement to carry ATM card always. By comparing various technologies that are used so far in ATM security, it is observed that fingerprint recognition technology performs better and safer than other technologies. This is making easy and protected transaction and also maintaining user-friendly environment with the user.
This process is one of the most promising technologies at electronic money transaction. The growth in the field of electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. People greatly depend on the Automated Teller Machine (ATM) for conveniently meeting their banking needs. However, there are numerous advantages in this system, the ATM fraud has recently become more threatening issue. This system helps in preventing the ATM robberies and misused by wrong person. We proposed the system to prevent the actions of breaking or damaging the machines, threating the ATM user’s denial of transactions and any other ATM user by invalid users or mask.

Real time Personalized Security Engine for Securing Privacy in Social Networking Data

Udhaya Kumar. R; Uma Maheshwari. N; Venkatesh. R

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 3, Pages 981-1005

One of the most important words, we hear these days is Social Networks as online applications that allow their users to connect with a variety of links. The use of cookies to identify people has raised serious concerns about security and privacy. Several countries have enacted laws to protect privacy to address these issues. In this paper, we introduce novel detection methods and the results of ongoing tracking strategies, including: fingerprint typing, cookie synchronization, and cookie updates. Our findings include more sophisticated fingerprint imaging techniques that have never been measured in the wild. We've found that almost every new API is being abused by fingerprint trackers. Abuse is often not visible to users and publishers alike, and in many cases the developers of the API were not expected. This paper comes with some important security features on an online social networking site. Research in this field is in its early years. We say that various privacy issues are in place and that privacy research on OSNs will benefit from a comprehensive process.

QR BASED AADHAR ELECTRONIC VOTING SYSTEM WITH BLOCK CHAIN TECHNOLOGY USING INTERNET OF THINGS

K KAUSALYA; ANUSHA J R; GOKULADHARSHINI B; SUBHASHINI D

European Journal of Molecular & Clinical Medicine, 2020, Volume 7, Issue 4, Pages 2952-2962

This system allows people to vote electronically in public elections with security system using Block chain technology.Progressively the application of scientific knowledge for the practical purpose within the idea helps many folks live. This methodology set out an Associate in legal organization for native election on blockchain knowledge dealing with applied sciences and Aadhar affirmation. The fact of being free from threat and dispositive may be a danger from extensive election with this prevailing methodology. A number of issues that may persist within the prevailing methodology are with a corporation, that has management over the information. It can be done to meddle with the information for a good time. The projected methodology is principally designed for our native supported Aadhar affirmation. To make sure a lot of security, fingerprint of elector is employed. A Single system will act as registering module and voting module. The system will act as registering module on activating switch by the super admin. For registering module, the QR code of Aadhar is scanned (which is brought by the use) followed by the fingerprint verification. The system permits the elector to vote through his fingerprint when they cast their vote, block chain technology comes into existence that is integrated within the machine. Each vote is added into each block encrypted by 256-bit SHA hash codes, the hashed block cannot be tampered by any individual as more security is added to the system. By adopting Blockchain within the distribution of information will scale back one in every of the cheating sources of database manipulation.