VLSI Architecture of an Invisible Watermarking Unit for a Biometric-Based Security System in a Digital Camera

Author(s):  
Saraju P. Mohanty ◽  
O. B. Adamo ◽  
Elias Kougianos
Author(s):  
Oluwayomi Adamo ◽  
Saraju P. Mohanty ◽  
Elias Kougianos ◽  
Murali Varanasi ◽  
Wei Cai

This research aims to develop the higher security system at university’s computer laboratory room. The system integrated of EAS, Arduino and ESP32-cam in box which is created for this higher security system. Arduino microcontroller that are using as preliminary stand-alone box, then we program to control this device to send the notification to laboratory administrator via line application. The EAS used RFID tag as trigger to detect person to bring the RFID which attached to the valuable things across the EAS pole. Then the Arduino detect the signal from the EAS system if one of any RFID tags across the pole mean stealing occurs, then the Arduino will order the ESP32-cam to capture thief image, next send this photo and message to the laboratory administrator via the line application. The system is well performed, reliable, and give us with impressive results


notion for the actual-time imaginative and prescient-primarily based protection shape movements in putting on developing frightful lead ground these days, which evaluations impedance for excessive-safety areas in which the closeness of an unapproved person denied. The paper assesses at the dwindled introduced on key mercilessness execution of a form for alternate affirmation in wi-wi-fia wiwireless checked range. the winning paper suggests a fable based totally absolutely safety form that factors a Linux based totally objective board, net-virtual digicam, and suggestions to caution the involved purchaser. This work is acceptably made on embedded purpose organize centered indicated consciousness at same time because the contraption and the detail are c084d04ddacadd4b971ae3d98fecfb2a on the Linux aspect by way of manner of manner of porting flow into-facilitated correspondingly digital A photo is gotten from a web-digital camera relatively amongst instances & making use of a change-simple check device,., picture endeavors closingwireless painting the chief mass is exceeded on. the sector of the lowest regular is accumulated through calculating the imply of pixel % components. those estimations of the pass-piece a district are secludes and picked inclinations. At whatever factor picked developments fall within the degree of theoretical traits, it can be appeared as a human impedance. the ones tiers of speculative traits (the same antique pass-sectional place of a human) are delineated in Anthropology speculation. This shape has been scanned for after for c084d04ddacadd4b971ae3d98fecfb2a conditions, for example, an exploratory close watched place, and accomplishes over 86% vicinity fee at wi-wi-fiwiwireless-6 reducing-edges/s planning velocity.


2020 ◽  
Vol 3 (2) ◽  
pp. 182-186
Author(s):  
Lisnayani Silalahi ◽  
Anita Sindar

Data security and confidentiality is currently a very important issue and continues to grow. Several cases concerning data security are now a job that requires handling and security costs that are so large. To maintain the security and confidentiality of messages, data, or information so that no one can read or understand it, except for the rightful recipients, a data security system application with an encryption method using an algorithm is designed. The SHA-1 cryptographic hash function that takes input and produces a 160-bit hash value which is known as the message iteration is usually rendered as a 40-digit long hexadecimal number.


Sign in / Sign up

Export Citation Format

Share Document