ATM Security Using Fingerprint Biometric Identifier
ATM Security Using Fingerprint Biometric Identifier
Abstract
The growth in electronic transactions has resulted in a greater demand for fast and
accurate user identification and authentication. Access codes for buildings, banks accounts and
computer systems often use personal identification numbers (PIN's) for identification and
security clearances. Conventional method of identification based on possession of ID cards or
exclusive knowledge like a social security number or a password are not all together reliable. An
embedded fingerprint biometric authentication scheme for automated teller machine (ATM)
banking systems is proposed in this paper. In this scheme, a fingerprint biometric technique is
fused with the ATM for person authentication to ameliorate the security level.
INTRODUCTION
Fingerprints have been in use for biometric recognition since long because of their high
acceptability, immutability and individuality. Immutability refers to the persistence of the
fingerprints over time whereas individuality is related to the uniqueness of ridge details across
individuals. The probability that two fingerprints are alike is 1 in 1.9 x 1015. These features
make the use of fingerprints extremely effective in areas where the provision of a high degree of
security is an issue. The major steps involved in automated fingerprint recognition include a)
Fingerprint Acquisition, b) Fingerprint Segmentation, c) Fingerprint Image Enhancement,
d)Feature Extraction e) Minutiae Matching, f) Fingerprint Classification. Fingerprint acquisition
can either be offline (inked) or Online (Live scan). In the inked method an imprint of an inked
finger is first obtained on a paper, which is then scanned. This method usually produces images
of very poor quality because of the non-uniform spread of ink and is therefore not exercised in
online AFIS. For online fingerprint image acquisition, capacitative or optical fingerprint scanners
such as URU 4000, etc. are utilized which make use of techniques such as frustrated total
internal reflection (FTIR) , ultrasound total internal reflection , sensing of differential
capacitance and non contact 3D scanning for image development. Live scan scanners offer much
greater image quality, usually a resolution of 512 dpi, which results in superior reliability during
matching in comparison to inked fingerprints. Segmentation refers to the separation of
fingerprint area (foreground) from the image background .Segmentation is useful to avoid
extraction of features in the noisy areas of fingerprints or the background. A Simple thresholding
technique proves to be ineffective because of the streaked nature of the fingerprint area.
EXISTING SYSTEM
Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.
Draw Backs
The Strangers will easily theft the money from User’s Account
The ATM card will be easily duplicated by using skimmers.
If he forgot his PIN number mean he don’t transact the money from the ATM.
If problem with credit card you can not withdraw you money
Machine may not recognize your Credit card
Objectives
Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.
Draw Back
The Strangers will easily theft the money from User’s Account
The ATM card will be easily duplicated by using skimmers.
If he forgot his PIN number mean he don’t transact the money from the ATM.
If problem with credit card you can not withdraw you money
Machine may not recognize your Credit card
Now the ATM Machines are working with ATM card and personal identification number (PIN)
based technology. And the Fraudulent card readers, called skimmers, are placed over the
authentic reader to transfer numbers and codes to nearby thieves. Spy cameras are also used hack
the User’s password. Lost access cards are another potential for fraud transaction. Consumers
may lose all funds in an account, if notice is not given before money transfers are made. Some
people from the villages don’t know how to access the ATM Machine, so that people taking the
help of others for operating the ATMS. This leads to fraudulent transactions. So Strangers takes
money easily from the ATM Machine. ATMs do not know the transaction person is the
authenticated user or strangers. The person must only insert a bank card and enter a personal
identification number. If the bank card is stolen and the number ascertained, an unauthorized
person can easily access the account.
Requirement specification
3.3 Software and Hardware specification
SYSTEM CONFIGURATION
HARDWARE SPECIFICATION:
Processor : Intel I3 Core Processor
Ram : 4 GB (or) Higher
Hard disk : 1TB
SOFTWARE REQUIREMENTS
Operating system : Windows 7 Ultimate.