Anda di halaman 1dari 4

HUMAN MACHINE INTRACTION BASED ON

AUTHENTICATION
Aruna V,Monisha K,Monisha P,Pooja M
Assistant Professor+, Students +
+
Department of Electronics Communication Engineering,
+
SA Engineering college, Chennai,
Tamilnadu, India
arunav@saec.ac.in,kmonisha79@gmail.com,monisha020997@gmail.com,poojam3997@gmail.com.

Abstract—Body gestures are an essential part of non- human-machine system (HMS); The term “machine”
verbal communication, and probably also one of the indicates any kind of technical system including its
most natural components of human–human interaction. In automation and decision support equipment and software –
several circumstances, gestural languages can be more and it relates to many different application domains.
effective than oral statements (e.g., when the The automation components of the technical system are
communication occurs at a distance). Therefore, it is not mentioned as supervision and control system. They interact
surprising that body gestures are increasingly being directly with the pure technical process. The decision making
considered for biometric applications, both for systems are more advanced, knowledge-based functionalities
identification (i.e., recognizing an individual) and for of the machine which provide advice for authorities.
verification (i.e., confirming or denying the claimed
identity of an individual).Among the different kinds of
body gestures, those involving the hands are probably the
most widespread. Explicit identification and verification
based on hand gestures seem therefore viable approaches,
either as additional verification mechanisms (besides more
traditional techniques such as those exploiting PINs) or
when the identity check must take place at a distance The application domains include all kinds of Industrial,
(e.g., in environments in which touch less procedures are Transportation, Medical field, Public service, Physically
mandatory).Gesture-based methods have advantages over challenged, Residential & Entertainment system. The more
other common identification and authentication conventional application domains of industrial and
techniques, as gestures may require lower attention and transportation systems have been supplemented by application
precision compared to other solutions while a wrongly domains from medical to entertainment systems. All
entered text password is automatically rejected, some application domains profit from advancements in the
inaccuracy may be tolerated in a gesture code. Here we are development of the HMI field. Human computer interaction
going to implement this Technology in the field of ATM (HCI) is characterized as human interaction with those
authentication. machines by real-time constraints, as it is always the case in
HMI. Application domains which are not determined by a
Keywords—Human interaction, Communication, TM, dynamic process or by real-time constraints, as it is always the
Security
case in HMI.
I. INTRODUCTION
Human-machine interaction is explained as a II. RELATED WORKS
interaction & communication between human users with
machine, a dynamic technical system, via a HMI. Good
ATM is an electronic device that is used by only
designs of HMI and systems have gained a important value in
bank customers to process account credits and debits. The
many products and services in application domains such as
users access their account through smartcard which is encoded
industrial, transportation, medical, and entertainment
with user information on a magnetic strip. The strip contains
systems.HMI with industries and other dynamic technical
with id code that is transmitted to the bank’s central server by
systems has nowadays been identified as important for
modem. The users insert the card into ATMs and they have to
process safety, quality, and efficiency. It comprises all aspects
enter password to access the account and process their account
of interaction and communication between human users and
transactions. Another thing is PC based digital media or study
their machines via HMI. The whole system of human users,
contents, these details are read only with PC or LAPTOP or
the human-machine interface, and the machine is the so-called
NOTEPAD or any mobile devices, normal people can easily gestures, so our proposed system no ATM card and there is no
access this but physically challenged person(paralyzed) person separate password customer hand gesture going to be work as
have problem to handle it without other’s help Paralyzed a identification and authentication. And also there is no need
person can’t handle above machines without another person’s for mouse or keyboards. So it have following advantages,
help • More secure compare to existing ATM systems
• More reliable
• No need for technical knowledge
III. PROPOSED SYSTEM • Physically challenged person also can use this
without others help.
In our proposed system is worked completely based on
Paper Title Author Year Techniques Flex Sensor:
1)Understandin Yanyan 2018 In this paper
g Secure and Li and IEEE they designed This flex sensor is a variable resistor like no other. The
Usable Gestures Menguin to create their resistance of the flex sensor increases as the body of the
For Real time Xie personalized component bends. Flex sensors are available in two sizes:
Motion based 3D motion one 2.2" (5.588cm) long and another coming in at 4.5"
Authentication gesture (11.43cm) long.Left flat, these sensors will look like a 30kΩ
showing resistor. As it bends, the resistance between the two terminals
authentication will increase to as much as 70kΩ at a 90° angle.
result on the By combining the flex sensor with a static resistor to create
smart watch in a voltage divider, you can produce a variable voltage that can
real time. be read by a microcontroller’s analog-to-digital converter.
2)At Your Zaire Ali 2016,Za This paper
Fingertips: and ire Ali, proposed the A voltage divider is a simple circuit which turns a large
Considering Jamie Under position of the voltage into a smaller one. Using just two series resistors and
Finger Payton License phone to an input voltage, we can create an output voltage that is a
Distinctness in Vincent to identify the fraction of the input. Voltage dividers are one of the most
Continuous Sritapan IEEE.D finger used to fundamental circuits in electronics.
Touch-Based OI10.11 perform a
Authentication 09/SPW touch-based Arduino Uno is a microcontroller board based on the
for Mobile .2016.2 gesture. ATmega328P. It has 14 digital input/output pins (of which 6
Devices 9 can be used as PWM outputs), 6 analog inputs, a 16 MHz
3) Behavior 1536- In this paper quartz crystal, a USB connection, a power jack, an ICSP
Based Human Muham 12339(c they proposed header and a reset button. It contains everything needed to
Authentication mad )2016 BEAT, a support the microcontroller
On Touch Shazad, IEEE gesture and
Screen Devices Alex signature
Using Gestures X.Liu, based
and Signatures Arjmand authentication
Samuel scheme for
touch screen
devices.
4)Multi-touch Liwen 2014 This paper
Gesture Xu firstly
introduces
early
researches of
multi-touch
and gesture.
5) Playful User Ekaterina 2009 This paper
Interfaces Kuts provides an
review of user
interface The Arduino Uno can be programmed with the (Arduino
characteristics Software (IDE)). Select "Arduino/Genuino Uno from the
that can be Tools > Board menu (according to the microcontroller on your
considered as board).
playful.
6)A Gesture Roger 1989 This paper
Based User B.Danne ACM0- introduced a
Interface nberg 89791- system GID
Prototyping and Dale 335- support input
System Amon 3/89/00 from both a
11/0127 mouse and free
hand sensor
can track
multiple
fingers.
Comput. Syst., Toronto, ON, Canada, May 2014,pp.
2937–2946.
[3] J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M.
Smith, “Smudge attacks on smartphone touch
screens,” in Proc. 4th USENIX Conf.Offensive
Technol., Berkeley, CA, USA, 2010, pp. 1–7.
[4] S. Cha, S. Kwag, H. Kim, and J. H. Huh, “Boosting
the guessing attack performance on Android lock
patterns with smudge attacks,” in Proc. ACM Asia
Conf. Comput. Commun. Secur., Abu Dhabi, United
Arab Emirates, Apr. 2017, pp. 313–326.
[5] Maiti, M. Jadliwala, J. He, and I. Bilogrevic,
“(Smart)watch your taps: Side-channel keystroke
inference attacks using smartwatches,” in Proc. ACM
Int. Symp. Wearable Comput., Osaka, Japan, Sep.
2015,pp. 27–30.
[6] Wang, X. Guo, Y. Wang, Y. Chen, and B. Liu,
“Friend or foe?: Your wearable devices reveal your
personal pin,” in Proc. 11th ACM Asia Conf.
Comput. Commun. Secur., Xi’an, China, Jun. 2016,
pp. 189–200.
[7] Sarkisyan, R. Debbiny, and A. Nahapetian,
“WristSnoop: Smartphone pins prediction using
smartwatch motion sensors,” in Proc. IEEE Int.
Workshop Inf. Forensics Secur. (WIFS), Nov. 2015,
pp. 1–6.
Experimental results: [8] R. Song, Y. Song, Q. Dong, A. Hu, and S. Gao,
“WebLogger: Stealing your personal PINs via mobile
Web application,” in Proc. 9th Int. Conf. Wireless
Commun. Signal Process. (WCSP), Oct. 2017, pp. 1–
6.
[9] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang,
V CONCLUSION
“When good becomes evil: Keystroke inference with
By using this project we can prove that the gesture is one smartwatch,” in Proc. 22nd ACM SIGSAC Conf.
of the very easy and secure communication methods among Comput. Commun. Secur., Denver, CO, USA, Oct.
various methods in human machine interaction. There is no 2015,pp. 1273–1285.
need of any technical knowledge to work with these machines. [10] ] H. Wang, T. T.-T. Lai, and R. Roy Choudhury,
Hardware unit is dynamic one, so a same structure can used “Mole: Motion leaks through smartwatch sensors,” in
for multiple applications in various manners. For physically Proc. 21st Annu. Int. Conf. Mobile Comput. Netw.,
challenged persons this project make feel them as a normal Paris, France, Sep. 2015, pp. 155–166.
humans while accessing and authorizing devices using [11] W. He and S. Zhang, “Control design for nonlinear
gestures, For normal persons it works like an add on, which flexible wings of a robotic aircraft,” IEEE Trans.
reduce their work and time of access. Control Syst. Technol., vol. 25, no. 1,pp. 351–357,
Jan. 2017.
[12] W. He, Z. Yan, C. Sun, and Y. Chen, “Adaptive
neural network control of a flapping wing micro
aerial vehicle with disturbance observer,” IEEE
REFERENCES Trans. Cybern., vol. 47, no. 10, pp. 3452–3465, Oct.
[1] F. Schaub, R. Deyhle, and M. Weber, “Password 2017.
entry usability and shoulder surfing susceptibility on [13] W. He, T. Meng, S. Zhang, Q. Ge, and C. Sun,
different smartphone platforms,” in Proc. 11th Int. “Trajectory tracking control for the flexible wings of
Conf. Mobile Ubiquitous Multimedia, Ulm, a micro aerial vehicle,” IEEE Trans. Syst., Man,
Germany,Dec. 2012, Art. no.13. Cybern., Syst., vol. 99, pp. 1–14, Jul. 2017.
[2] De Luca et al., “Now you see me, now you don’t: [14] G. Cho, J. H. Huh, J. Cho, S. Oh, Y. Song, and H.
Protecting smartphone authentication from shoulder Kim, “Syspal:System-guided pattern locks for
surfers,” in Proc. SIGCHI Conf. Human Factors Android,” in Proc. IEEE Symp. Security Privacy
(SP), May 2017, pp. 338–356.
[15] E.Owusu, J. Han, S. Das, A. Perrig, and J. Zhang,
“Accessory: Password inference using
accelerometers on smartphones,” in Proc. 12th
Workshop Mobile Comput. Syst. Appl., San Diego,
CA, USA, 2012, Art. no. 9.
[16] V. Matyas and Z. Riha, “Toward reliable user
authentication through biometrics,” IEEE Security
Privacy, vol. 99, no. 3, pp. 45–49,May/Jun. 2003.
[17] Y. Song, Z. Cai, and Z.-L. Zhang, “Multi-touch
authentication using hand geometry and behavioral
information,” in Proc. IEEE Symp. Security Privacy
(SP), San Jose, CA, USA, May 2017, pp. 357–372.
[18] Shen, Y. Zhang, X. Guan, and R. A. Maxion,
“Performance analysis of touch-interaction behavior
for active smartphone authentication,”IEEE Trans.
Inf. Forensics Security, vol. 11, no. 3, pp. 498–
513,Mar. 2016.
[19] O. J. Räsänen and J. P. Saarinen, “Sequence
prediction with sparse distributed hyperdimensional
coding applied to the analysis of mobile phone use
patterns,” IEEE Trans. Neural Netw. Learn. Syst.,
vol. 27,
[20] no. 9, pp. 1878–1889, Sep. 2016.
[21] Y. Nakada, M. Wakahara, and T. Matsumoto,
“Online Bayesian learning with natural sequential
prior distribution,” IEEE Trans. Neural Netw.Learn.
Syst., vol. 25, no. 1, pp. 40–54, Jan. 2014.

Anda mungkin juga menyukai