0% found this document useful (0 votes)
9 views

ATM Security Using Fingerprint Biometric Identifier

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

ATM Security Using Fingerprint Biometric Identifier

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

ATM Security Using Fingerprint Biometric Identifier: An Investigative Study

Abstract
The growth in electronic transactions has resulted in a greater demand for fast and
accurate user identification and authentication. Access codes for buildings, banks accounts and
computer systems often use personal identification numbers (PIN's) for identification and
security clearances. Conventional method of identification based on possession of ID cards or
exclusive knowledge like a social security number or a password are not all together reliable. An
embedded fingerprint biometric authentication scheme for automated teller machine (ATM)
banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is
fused with the ATM for person authentication to ameliorate the security level.

INTRODUCTION

Fingerprints have been in use for biometric recognition since long because of their high
acceptability, immutability and individuality. Immutability refers to the persistence of the
fingerprints over time whereas individuality is related to the uniqueness of ridge details across
individuals. The probability that two fingerprints are alike is 1 in 1.9 x 1015. These features
make the use of fingerprints extremely effective in areas where the provision of a high degree of
security is an issue. The major steps involved in automated fingerprint recognition include a)
Fingerprint Acquisition, b) Fingerprint Segmentation, c) Fingerprint Image Enhancement,
d)Feature Extraction e) Minutiae Matching, f) Fingerprint Classification. Fingerprint acquisition
can either be offline (inked) or Online (Live scan). In the inked method an imprint of an inked
finger is first obtained on a paper, which is then scanned. This method usually produces images
of very poor quality because of the non-uniform spread of ink and is therefore not exercised in
online AFIS. For online fingerprint image acquisition, capacitative or optical fingerprint scanners
such as URU 4000, etc. are utilized which make use of techniques such as frustrated total
internal reflection (FTIR) , ultrasound total internal reflection , sensing of differential
capacitance and non contact 3D scanning for image development. Live scan scanners offer much
greater image quality, usually a resolution of 512 dpi, which results in superior reliability during
matching in comparison to inked fingerprints. Segmentation refers to the separation of
fingerprint area (foreground) from the image background .Segmentation is useful to avoid
extraction of features in the noisy areas of fingerprints or the background. A Simple thresholding
technique proves to be ineffective because of the streaked nature of the fingerprint area.

EXISTING SYSTEM

Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.

Draw Backs

 The Strangers will easily theft the money from User’s Account
 The ATM card will be easily duplicated by using skimmers.
 If he forgot his PIN number mean he don’t transact the money from the ATM.
 If problem with credit card you can not withdraw you money
 Machine may not recognize your Credit card

Objectives

Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.

Draw Back

 The Strangers will easily theft the money from User’s Account
 The ATM card will be easily duplicated by using skimmers.
 If he forgot his PIN number mean he don’t transact the money from the ATM.
 If problem with credit card you can not withdraw you money
 Machine may not recognize your Credit card

Purpose scope and applicability

In the proposed system, I am implementing the concept is Biometric Authentication. If the


number of biometric ATM’s are introduced at every place. Since the cost of the Multiple
Recognition scanner is high, the system alternates by processing with previously scanned
images.. The scanned Multiple Recognition image database is used in the system for processing
the system can work with images of low level of resolution as well as high resolution images.
The system works under the offline Recognition due to economical factors in buying the
Multiple Recognition scanners and CCD (charge coupled devices) cameras and digital scanners.
The application takes very less time to process the Multiple Recognition output..The possibility
of fraudulent transactions may be minimized. So it is the safest way for securing the money in
the ATM machine. In the project we use Biometrics Finger Print and retina Concept these are
very secured. Thus the ATM Card theft can be minimized.

REQUIREMENT AND ANALYSIS

Problem and definition

Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.

Requirement specification
3.3 Software and Hardware specification
SYSTEM CONFIGURATION
HARDWARE SPECIFICATION:
 Processor : Intel I3 Core Processor
 Ram : 4 GB (or) Higher
 Hard disk : 1TB

SOFTWARE REQUIREMENTS
 Operating system : Windows 7 Ultimate.

 Coding Language : ASP.Net with C#

 Front-End : Visual Studio 2010 Professional.

 Data Base : SQL Server 2008.

You might also like