Sei sulla pagina 1di 26

ABSTRACT

Automated Teller Machine (ATM) transactions are found safe, reliable and inevitable these days for
fulfilling our financial commitments. Traditional approach for using ATM mandates involve-ment of
Debit card. But however, people do experience times when their account lacks balance amount or
they forget to carry card and struggle to complete transaction. We know that, parallel to ATM usage,
mobile phones’ usage has also been an inevitable trend. Establishing a connection between these
e-gadgets has ignited a simple and effective approach to withdraw cash without the involvement of
debit card which can be referred to as card less cash withdrawal. Face detection and Fingerprint is
used for authentication of user. This along with Face detection comprises two levels of security.
When Face and Fingerprint are matched then customer’s account will open in ATM machine. LCD
display will display user name, debited money, authentication status etc.
Contents

CERTIFICATE FOR CONDUCTION OF EXAMINATION . . . . . . . . . . . . . . 1


ACKNOWLEDGEMENT ................................ 3
ABSTRACT........................................ 4
LISTOFFIGURES.................................... 7

1 Introduction 8
1.1 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2 LITERATURE REVIEW 10

3 SOFTWARE REQUIREMENTS SPECIFICATION 13


3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.1 Project Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.2 User Classes and Characteristics . . . . . . . . . . . . . . . . . . . . . . 13
3.2 Functional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.2.1 System Feature 1(Functional Requirement). . . . . . . . . . . . . . . . . 14
3.3 Nonfunctional Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.3.1 Performance Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.2 Safety Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.3 Security Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.3.4 Software Quality Attributes . . . . . . . . . . . . . . . . . . . . . . . . 15
3.4 System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.4.1 Database Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.4.2 Software Requirements(Platform Choice) . . . . . . . . . . . . . . . . . 16
3.4.3 Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.5 Analysis Models: SDLC Model to be applied . . . . . . . . . . . . . . . . . . . 17
3.6 System Implementation Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

4 SYSTEM DESIGN 20
4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2 Data Flow Diagrams: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.3 UML Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3.1 Use case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3.2 Class Diagram : . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
4.3.3 Activity Diagram: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
4.3.4 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.3.5 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

5 OTHER SPECIFICATIONS 27
5.1 Limitations: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.2 Advantages: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.3 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

6 CONCLUSIONS 28
6.1 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

7 REFERENCES 29
Chapter 1

Introduction

ATM is an electronic device which provides the user to perform transactions without the need of
cashier, bank teller. ATM services are popular because of their easiness for banking systems. In
modern ATMs, the customer account can be identified by inserting a plastic card with magnetic strip
that contains his or her account number. The customer then verifies his or her identity by entering a
passcode (i.e.) personal identification number (PIN) of four digits. If the number is entered
incorrectly several times consequently (usually the, most ATMs will retain the card as security
precaution to prevent an authorized user from assuming the PIN by guesswork and so on. Moreover
the customer has to pay transaction fees. By keeping all burdens aside, a novel approach bank
affinity card been proposed in this project. In the proposed system, the person with the card needs
to swipe the card first and then ATM asks for the fingerprint authentication.

1.1 Motivation
ATM requires user authentication for any transaction. Currently customers use’s smartcard
for the transaction which can be lost, duplicated, stolen or impersonated with accuracy. In
traditional ATM system, customer recognition only based on smartcards, passwords, and
some identity ver-ification methods which are not genuine. By unique feature or
characteristic biometric system provides automatic authentication for any customer.

1.2 Problem Definition


The needs for virtual card or card less ATM came to our mind after one of the authors left with
disappointment at the ATM. He was unable to locate his ATM card from his purse. Hence access to
his bank account for bank transaction was denied. When narrated his experience. One major
conclusion came to our mind after hours of thought and reasoning as regards the need for ATM card
before one can access his bank account through ATM, and major information that ATM card contain.
Consequently, as a lecturer, researcher, computer/electronic engineer and computer scientist with
keen interest in emerging new technology in electronic business, that EATM with virtual or no card
can be design to enhance the efficiency of ATM usage. Also, In recent time
many lapses (ranging from fraud, stealing, etc.) of ATM usage has been attributed to use of
ATM such as card cloning, card damaging, card expiring, cost of issuance and maintenance,
accessing customer account by third parties, waiting time before issuance card etc. all these
can be a bygone issues if card less EATM can be design and implement in future.
Chapter 2

LITERATURE REVIEW

We know that One –Time – Passwords are becoming trend setters in the business
domains. We have proposed a style of cash withdrawal without the involvement of debit
card that can be accom-plished using OTP via SMS. As compared to the existing method
defined by ICICI bank ltd, our method is simple and effective and would definitely be
preferred by all kinds of users. As of now, the proposed method deals with the withdrawal
process in the same bank but can be extended for inter – branch transactions. [1]
The proposed second level authentication mechanism for ATMs will increase customer
satisfac-tion and also give customers the peace of mind they need considering the high
level of security applied to their accounts. Finally, it will limit the financial risks of
customers given that they most times [2]
The system proposed in [3] is based on AVR microcontroller is found to be more
compact, user friendly and less complex which can readily be used in order to perform
several tedious and repet-itive tasks. Though it is designed keeping in mind about the
need for industry it can extended for other purposes such as commercial and research
applications. Due to the probability of high technology (GSM) used this “Protected Cash
Withdrawal in ATM Using Mobile Phone” is fully software controlled with less hardware
circuit. The feature makes this system is the base for future systems.
Several problem are associated with the use of card such card cloning, card damaging, card expir-
ing, cast skimming, cost of issuance and maintenance, accessing customer account by third parties,
waiting time before issuance expiring or new card. This paper presents the conceptual framework of
design, specification, and model of the EATM system that uses no card. The proposed system will
use alphanumerical PIN, and biometric fingerprint to control access to the ATM. [4]
The Automated Teller Machine (ATM) is a selfservice machine that dispenses cash and performs
some human teller functions like balance enquiry, bills payments, mini statements, Fund Transfer,
Cash Deposit and so on. ATM transactions are carried out through the use of a debit/credit card
which enables the card holder(s) to access and carry out banking transactions without a teller [5].
With ATM, customers can access their bank deposit or credit accounts in order to make a variety of
transactions mentioned earlier. If the currency being withdrawn from the ATM is different from that in
which the bank account is denominated the money will be converted at an official exchange
rate. Thus, ATMs often provide the best possible exchange rates for foreign travelers, and ATM
is widely used for this purpose [6]. Paper [6] discusses several Biometric scan technologies:
finger-scan, facial-scan and retinal-scan and others. Retinal-scan IRIS technology is a relatively
new entrant to the biometric field and offers significant promise. One of the continuing
challenges for the banking industry is to reduce the fraud and security issues. Here we are
proposing card less security architecture for ATM using IRIS. Our proposed system provides
unique authentication technique to improve security of ATM machine over present system.
Cardless cash Biometric ATM System enables cash withdrawal at an ATM without using the ex-isting
magnetic swipe cards which makes it possible to quickly authorize a person to withdraw money.
Biometric Automatic Teller Machine (BioATMs) seems to be an effective way of pre-venting card
usage and is also a channel to expand our reach to rural and illiterate masses. These BioATMs can
talk to the people in their native languages and provides high security in authen-tication which
prevents service users from unauthorized access. In [7], the user is required to authenticate himself
with a two phase security solution by first providing an individual’s biomet-ric identification
(Thumb/Fingerprint/Iris etc.), followed by Personal Identification Number (PIN), and select the bank
branch from the displayed list if applicable. This system also provides an alter-native approach to
access cash via an OTP (One Time Password) generation on user’s cellphone in case of loss of
PIN. It saves time, cost and efforts compared with existing card based ATMs thereby eliminating
environmental problem of disposing plastic waste. It also reduces the user’s dependency on bank
officials in sending money to distant relatives at home and abroad.
A new system approach [8] for enhancing security and privacy in biometric applications
like face detection, IRIS scan, fingerprint, voice, signature, etc., in this biometric system
card-less opera-tion done by biometric technology for operating ATMs. Proposed model
provide high security in authentication which protects from illegal transactions. By this
user required to authenticate him/her self with biometric identification and personal
identification number. This proposed sys-tem is designed for illiterate, semi-literate and
literate people. System decreases complexity with authentication as —you as Security
with high security. It reduces the problem of an excess num-ber of plastic cards saves
environmental pollution. It saves time, cost, effort compared with a card-based system.
Most of the transactions at the Point of Sale (POS) terminals are carried out by
payments through Credit or Debit cards. Many leading banks have started the door step
banking service with the help of microATM device. The authentication system presented
in [9] uses fingerprint authentica-tion or PIN based authentication method. Biometric
features are unique for every individual and hence can be widely used in fusion for
enhancing the security system for micro-ATMS and POS terminals.
Financial institutions has registered loses because users are being unprotected of their assets and
card information. The ATM security authentication technique presented in [10] is dependent on pin-
based verification. Factors such as urgency, memorization of pins, speed of interaction, un-
intentional pin sharing affects the system diversely. Cards with magnetic chips are easy to
clone. This paper presents a comparative study of traditional Pin based authentication
technique and a proposed three-factor based authentication technique. The three-factor
authentication scheme proposed in this paper integrates biometric fingerprint, PIN and QR-
Code technologies to provide improved security for ATM authentication.
Chapter 3

SOFTWARE REQUIREMENTS SPECIFICATION

3.1 Introduction

3.1.1 Project Scope


The basic aim of this research work is to design a card less ATM. If that can be
achieved and implemented, it could leads to the following objectives.
1. ATM fraud and criminal activities can be reduced or eliminate completely.
2. Enhance the use of ATM by banking customers.
3. It will eliminate financial burden placed on customers for issuance and maintenances
of ATM card.
4. It will also reduce stress emanated from complaint related to ATM cards at the
customers care of bank on bank staff, and customers that uses ATM.

3.1.2 User Classes and Characteristics


1. Scanning of a fingerprint image
The quality of the scanned image is the decisive factor for automatic identification
purposes. It is desirable to use a high-definition fingerprint scanner which is able to tolerate
different skin types, damages, dryness, as well as the humidity of the finger surface.
2. Image quality improvement.
By using image quality improvement, an optical improvement of the structures (ridges)
on the scanned image can be achieved.
3. Image processing
Image processing means the preparatory phase for feature extraction and
classification purposes. 4 Feature classifications
The fact is that all fingerprints show certain global similarities, which allow for rough classifica-tion
into three principal finger classes. However, classification is a rather difficult process both for
algorithm-based decisions as well as for man-made decisions since some fingerprints cannot be
clearly allocated to a concrete finger class. Nowadays, pattern classification is only used in
dactyloscopic systems, e.g. AFIS (Automated Fingerprint Identification System) of the Federal
Office of Criminal Investigation (BKA). This method is not feasible for access systems.
5. Feature extraction.
In this phase, the location of the minutiae (ridge bifurcations and ridge endings) in the
fingerprint is detected and extracted. In practice, scanned fingerprint images show differing
qualities. The algorithm performance is negatively influenced by a poor image quality.
6 Verification phase.
In the verification phase two feature vectors are being compared. The algorithm
performance strongly depends on the quality (significance) of the extracted minutiae
and on the comparison process. Below, we will describe in more detail the fingerprint
scanning, feature classification and fingerprint comparison processes.
7. Face Capturing, Face Detection Face Recognition and Matching

3.2 Functional Requirements

3.2.1 System Feature 1(Functional Requirement).


Registration

Login

Face Capturing, Face Detection Face Recognition and

Matching Scanning of a fingerprint image and Matching

3.3 Nonfunctional Requirements


The non functional requirements are as follows:
1) Security:
Each member is required to have an individual password Administrators have the
option of in-creasing the level of password security their members must use. For
maximum security, each member must protect their password.
2) Reliability:
System will prompt the user if any incorrect input is made. To handle data consistency,
DBMS software is used. User can easily work through the different menus and buttons.

3) Maintainability:
Proper documentation is available for further upgradation and maintenance. User will
be trained enough to handle the minor changes required.
4) Availability:
The system shall be available all the time i.e 24*7*365.
5) Portability:
System is independent of hardware specification. It can run on any operating system System is
independent of browser compatibility because web pages will be designed by JSP and Servlet.
6) Performance:
The performance of our product is at its best if stored locally, as the response time will
be much faster. If the product accessed via Internet, the performance is limited by the
connection speed. The only foreseen limitation is that of web server response.

7) User Friendly:
Our system is very easy to use and user friendly. Its GUI is very attractive and
understandable to the common users.

3.3.1 Performance Requirements


The performance of the system lies in the way it is handled. Every user must be given
proper guidance regarding how to use the system. The other factor which affects the
performance is the absence of any of the suggested requirements.

3.3.2 Safety Requirements


To ensure the safety of the system, perform regular monitoring of the system so as to trace
the proper working of the system. An authenticated user is only able to access system.

3.3.3 Security Requirements


Any unauthorized user should be prevented from accessing the system. Password
authentication can be introduced.

3.3.4 Software Quality Attributes


Accuracy: -
The level of accuracy in the proposed system will be higher. All operation would be done correctly
and it ensures that whatever information is coming from the center is accurate. Result is organic
results.
Reliability: -
The reliability of the proposed system will be high due to the above stated reasons. The reason for
the increased reliability of the system is that now there would be proper storage of information
and Text Classification model.

3.4 System Requirements

3.4.1 Database Requirements


The following options can be placed after any datatype, adding other characteristics
and capabili-ties to them.

Primary Key. Used to differentiate one record from another. No two records can
have the same primary key. This is obviously useful when it is imperative that no
two records are mistaken to be the other.

Auto Increment. A column with this function is automatically incremented one


value (pre-vious + 1) when an insertion is made into the record. The datatype is
automatically incre-mented when ’NULL’ is inserted into the column.

NOT NULL. Signifies that the column can never be assigned a NULL value. ex.

soc sec number INT PRIMARY KEY;No two


soc sec number records can hold the same value.
ID NUMBER INT AUTO INCREMENT;Automatically increments in value, starting at ’1’,
with every subsequent insertion.

3.4.2 Software Requirements(Platform Choice)


platform: Raspberry pi

Operating System: Raspbian OS

Server: Putty, VNC

Programming Language: Python

3.4.3 Hardware Requirements


1. Raspberry Pi

2. Camera

3. Fingerprint module

4. LCD Screen
5. Keyboard

3.5 Analysis Models: SDLC Model to be applied

The Waterfall Model is sequential design process, often used in Software development
processes, where progress is seen as flowing steadily download through the phase of
conception, Initia-tion, Analysis, Design, Construction, Testing, Production/Implementation
and Maintenance. This Model is also called as the classic Life cycle model as it suggests a
systematic sequential approach to software developments. This one of the oldest model
followed in software engineering. The process begins with the communication phase where
the customer specifies the requirements and then progress through other phases like
planning, modeling, construction and deployment of the software.

There are 5 Phase of water fall model:

The Waterfall Model is sequential design process, often used in Software development pro-
cesses, where progress is seen as flowing steadily download through the phase of conception,
Initiation, Analysis, Design, Construction, Testing, Production/Implementation and Maintenance. This
Model is also called as the classic Life cycle model as it suggests a systematic sequential ap-proach
to software developments. This one of the oldest model followed in software engineering. The
process begins with the communication phase where the customer specifies the requirements
and then progress through other phases like planning, modeling, construction and
deployment of the software.

There are 5 Phase of water fall model:

1. COMMUNICATION
In communication phase the major task performed is requirement gathering which helps
in find-ing out exact need of customer. Once all the needs of the customer are gathered
the next step is planning.

2. PLANNING
In planning major activities like planning for schedule, keeping tracks on the processes
and the estimation related to the project are done. Planning is even used to find the
types of risks involved throughout the projects. Planning describes how technical tasks
are going to take place and what resources are needed and how to use them.

3. MODELING
This is one the important phases as the architecture of the system is designed in this
phase. Anal-ysis is carried out and depending on the analysis a software model is
designed. Different models for developing software are created depending on the
requirements gathered in the first phase and the planning done in the second phase.

4. CONSTRUCTION
The actual coding of the software is done in this phase. This coding is done on the basis of the
model designed in the modeling phase. So in this phase software is actually developed and tested.

5. DEPLOYMENT
In this last phase the product is actually rolled out or delivered installed at customer’s end and
support is given if required. A feedback is taken from the customer to ensure the quality of the
product. From the last two decades Waterfall model has come under lot of criticism due to its
efficiency issues. So let’s discuss the advantages and disadvantages of waterfall model.
Chapter 4

SYSTEM DESIGN

4.1 System Architecture


We analyzed what is the problem people faced in the existing technology. This project helps to
overcome the problem of complexity and provides easiest way to secure the ATM transaction.

Fig. 4.1: System Architecture

Block diagram of proposed system is as shown in figure above. Camera is used for authen-
tication of user. We are using Keypad and camera of PC/laptop. Whenever a person enters in ATM
camera captures image and display information about him. GUI (Graphical User Interface) is
developed for user and system interactions. An Fingerprint, which along with face recognition
comprises two levels of security. When face and Fingerprint are matched then customer’s account
will open in ATM machine. GUI will display user name, debited money, authentication status etc
4.3 UML Diagrams

4.3.1 Use case Diagram


A use case diagram is a graphical representation of a user’s interaction with the system and depict-
ing the specifications of a use case. A use case diagram can show the different types of users of a
system and the various ways in which they interact with the system. Use case diagrams are used to
gather the requirements of a system including internal and external influences. These requirements
are mostly design requirements. So when a system is analyzed to gather its functionality use cases
are prepared and actors are identified. The purposes of use case diagrams can be as follows:
Used to gather requirements of a system.
Used to get an outside view of a system.
Identify external and internal factors influencing the
system. Show the interaction among the actors.

Fig. 4.2: USE CASE

4.3.2 Class Diagram :


The class diagram is a static diagram. It represents the static view of an application. Class diagram
is not only used for visualizing, describing and documenting different aspects of a system but also
for constructing executable code of the software application. The class diagram
describes the attributes and operations of a class and also the constraints imposed on
the system. The class diagrams are widely used in the modeling of object oriented
systems because they are the only UML diagrams which can be mapped directly with
object oriented languages. The class diagram shows a collection of classes, interfaces,
associations, collaborations and constraints. It is also known as a structural diagram.
The purpose of the class diagram is to model the static view of an application.

Fig. 4.3: Class Diagram


4.3.3 Activity Diagram:
Activity diagrams are graphical representations of workflows of stepwise activities and actions
with support for choice, iteration and concurrency. In the Unified Modeling Language, activity
diagrams are intended to model both computational and organizational processes (i.e.
workflows). Activity diagrams show the overall flow of control. Activity diagrams are constructed
from a lim-ited number of shapes, connected with arrows. The most important shape types:
Rounded rectangles represent actions;
Diamonds represent decisions;
Bars represent the start (split) or end (join) of concurrent activities; A black circle
represents the start (initial state) of the workflow;
An encircled black circle represents the end (final state).
Arrows run from the start towards the end and represent the order in which activities
happen. Hence they can be regarded as a form of flowchart. Typical flowchart
techniques lack constructs for ex-pressing concurrency. However, the join and split
symbols in activity diagrams only resolve this for simple cases; the meaning of the
model is not clear when they are arbitrarily combined with decisions or loops.
Fig. 4.4: Activity Diagram

4.3.4 Component Diagram


A Component Diagram displays the structural relationship of components of a software system.
These are mostly used when working with complex systems that have many components. Compo-
nents communicate with each other using interfaces. The interfaces are linked using connectors.
Fig. 4.5: Component Diagram
4.3.5 Deployment Diagram
Deployment diagrams are used to visualize the topology of the physical components of a system
where the software components are deployed. So deployment diagrams are used to describe the
static deployment view of a system. Deployment diagrams consist of nodes and their relationships.

Fig. 4.6: Deployment Diagram


Chapter 5

OTHER SPECIFICATIONS

5.1 Limitations:
If the User finger pattern has some cut or got damaged the system might not recognize the user.

5.2 Advantages:
1. Fingerprint based ATM System is more secure than ATM card

2. User can make transaction using his fingerprint anywhere and at any time he
need not have to carry ATM card.

5.3 Applications
ATM machine
Home security system
Chapter 6

CONCLUSIONS

6.1 Conclusions
The adoption of the ATM as an electronic banking channel has positively impacted the banking
industry worldwide because it is very effective and convenient for bank customers. The advent
of ATM fraud has however been a menace for many banks all over the world and many banks
now aim to eradicate fraud costs to the bank. The proposed system can provide a practical and
workable solution that addresses the requirements of the regulatory authority of the banks. The
adopted technology of the proposed system is also cheaper to deploy than the face detection
authentication technique because it utilizes the components of the existing system. The model
can also provide for high withdrawal limits to cater for the demands of a cash-focused customer
base. In general, it will positively impact the banking industry and the society by reducing the
rising levels of crimes that are associated with ATM transactions.
Chapter 7

REFERENCES

1. Nischaykumar Hegde Sharath K R, Card less ATM Cash Withdrawal: A simple and
Alter-nate Approach (IJCSIT) International Journal of Computer Science and
Information Tech-nologies, Vol. 7 (1) , 2016, 126-128

2. Madhuri More 1 , Sudarshan Kankal2 , Akshaykumar Kharat3 , Rupali Adhau, “CARD-


LESS AUTOMATIC TELLER MACHINE (ATM) BIOMETRIC SECURITY SYSTEM
DESIGN USING HUMAN FINGERPRINTS”, International Journal of Advance Engineer-
ing and Research Development Volume 5, Issue 05, May -2018, 2348-6406.

3. Harshad Joshi , Priyanka Keche , Isha Padiya “GSM Based Anti-theft Transaction
Sys-tem”, International Journal of Advanced Research in Electrical, Electronics
and Instrumen-tation Engineering Vol. 4, Issue 1, January 2015 Copyright to
IJAREEIE 10.15662/ija-reeie.2015.0401015 144

4. Alebiosu M. Iyabode, Yekini N. Nureni, Adebari F. Adebayo, Oloyede A. Olamide,


“Card-Less Electronic Automated Teller Machine (EATM) With Biometric
Authentication”, Inter-national Journal of Engineering Trends and Technology
(IJETT) – Volume 30 Number 2 - December 2015

5. Pranav Gebad1 , Prof. N. A. Dawande International Journal of Advanced


Research in Com-puter and Communication Engineering ISO 3297:2007 Certified
Vol. 5, Issue 7, July 2016 ATM Transaction without Debit Card

6. Nachiket Sainis1 , Reena Saini “Biometrics: Cardless Secured Architecture for


Authen-tication in ATM using IRIS Technology” International Journal of Innovative
Research in Computer and Communication Engineering Vol. 3, Issue 6, June 2015

7. Neenu Preetam. I, Harsh Gupta “Cardless Cash Access Using Biometric ATM
Security System”, International Journal of Enhanced Research in Science
Technology Engineering, Vol. 3 Issue 11, November-2014, Page — 13
8. Priya Sharma, Pawan Kumar Chaurasia, “Proposed Algorithm for Secured Transaction
us-ing 3-Tier Architecture”, International Journal of Computer Sciences and Engineering
Open Access Research Paper Vol.-6, Issue-6, June 2018 E-ISSN: 2347-2693

9. Priya Tawd, Dr. G. Prasanna Lakshm “Enhancing Micro-ATMs and POS Terminals
Au-thentication System Using Advanced Biometric Techniques”, IOSR Journal of
Computer Engineering (IOSR-JCE) 74 — Page

10. Ojekudo Nathaniel, Macarthy Osuo-Genseleke, “A Comparative Study of PIN


Based and Three-factor Based Authentication Technique for Improved ATM
Security”, International Research Journal of Engineering and Technology (IRJET)
Volume: 05 Issue: 05 — May 2018 Page 3749

Potrebbero piacerti anche