Sei sulla pagina 1di 5

Advanced ATM with Biometrics Security.

i i i i

Advance Implementation of Biometrics


i i i

Rohan iBuddhdev Prof. iDr. iMinesh iAde


MCA, Professor, iMCA,
MIT-WPU iSchool iof iManagement(PG), MIT-WPU iSchool iof iManagement(PG),
Pune, iIndia Pune, iIndia
Rohan.buddhdev08@gmail.com Minesh.ade@mitwpu.edu.in

I. ABSTRACT II. INTRODUCTION

Automatic iTeller iMachine(ATM) iis ione iof An iautomated iteller imachine i(ATM) iis ian
ithe ibest iways ito iaccess ibank iaccount, ielectronic ibroadcast icommunications i gadget

iregardless iof igoing ito ia ibank iitself, ifrom ithat ienables i clients ito i get ifiscal ifoundations ito

ianywhere iat iany itime. iSimilar ito ian iperform i monetary iexchanges, isimilar ito icash

ielectrical imedia itransmission igadget, iit iwithdrawals, i move ireserves, ior igetting iaccount

icauses iclients ito iperform ithe ibank idata, iwhenever iand i keeping i in i mind ithat inot

itransactions, iretreating iand idepositing ithe i need ifor idirect icollaboration i with ithe ibank

imoney, iby isimply itouching ia inumber iof iofficials. iIn ia ishell, i ATM igives iclients iquick

ibuttons ion ithe iscreen iwhile inot ihaving ia iand iadvantageous i gratitude ifor igetting ito itheir

icashier. iThe idevelopment iof ielectronic ifinancial ibalances iand ito i direct i money irelated

iexchanges ihas ibrought iabout imore iexchanges. iPersonal iIdentification

iprominent iinterest ifor iquick iand iexact iNumber(PIN) iis ione iimperative iside i of ithe

irecognizable iproof iand ivalidation iof ithe iATM isecurity iframework. iPIN i or isecret iphrase

iclient. iCurrently, ithere iis ionly ione-way iis i generally iused ito i verify iand ishield ithe

iATM iauthentication iand isecurity iworks, imonetary idata iof iclients ifrom iunapproved

iwhich iis iPersonal iIdentification iaccess. iJohn iShepphardbaren iinvented i ATM iat

iNumber(PIN). iNowadays, iPIN ican ialso ibe iUnited iKingdom i on iJune i1967. iATM iis ione i of

iextracted ithrough ivarious ifraudulent ithe iautomated isystems ibeing i employed isince

iactivities. iCard iskimming, ieavesdropping, i1967 iby iseveral ifolks. iIt ifirst icame ito iIndia iin

ishoulder isurfing, icash itrapping iare isome iof i1968.

ithe icommon imethods iused iby ithe

ifraudsters. iTo iprevent isuch imal-practices The ivast imajority iin ideveloped inations ihave
iand ito ihave iproper iauthentication iand iaccounts iin i many ibanks iand ihave ia ivarious

isecurity imeasures, ialong iwith ithe icurrent ibank icredit i card iwith ithem. iThey iregularly

itechnology, ibiometrics iis ithe ionly iviable icarry itheir icards iin ia isolitary iwallet i or ihandbag

isolution iavailable. iIn ithis ipaper, isecurity iand i most i of ithe itime, ithey iuse ia isimilar iPIN

iand iauthentication iof ithe iAutomatic iTeller inumber ifor i every ione i of itheir icards isince i it iis

iMachine ihave ibeen ifocused ion, iby ireplacing idifficult ito irecollect iall isuch i various iPINs iby ia

ithe iPIN iwith ibiometric isolutions. isolitary iindividual. i A ifew ipeople i like ito irecord

iAuthentication ican ibe isolved iby ifacial ithe iPIN i on ithe icard i itself. iMisfortune i or

irecognition iand ithe isecurity ican ibe isolved irobbery i of ia iwallet ieven ia icard iputs ithem iin

iby ithe ifingerprint iof ithe iuser. iIn ithe idanger iof i extortion. iWhile i in i developing

iproposed isystem iinfusing ibiometrics iinto icountries i like iIndia, ithere iare ihigh ichances i of

ithe iATM, ithe isystem ican ibring ia ichange iin icards igetting istolen i with ithe i wallets i itself. iThe

icustomer isecurity iand isatisfaction. iother iproblem i includes i many ipeople i do i not

iremember ithere iPIN. iNot iremembering ithe

Keywords i– iATM, iSecurity, iBiometrics, iPIN, iPIN, iincreases ithe i chances iof i having iblocked

iATM iAuthentication, iBanking iSecurity, ithe iATM iCard, iand iagain icustomers, ias iwell ias

iFingerprint, iFace iRecognition. ibank i officials, ineed ito i go ithrough ia icertain


i
iprocedure ito iunblock ithe iATM iCard ior ito iissue ichanged iin ia ilifetime. iBut ifor ithis imethod ito
inew iATM iCards. iwork iaccurately, ione iprecondition iis iwhich iis
To iprevent ithe ifraud iof isuch iATM iscams iand ito irequired i is ito i have isafe ihands i without i having

iovercome isuch i issues ias inot iremembering ithe iany i wounds ito itheir iprints. iOtherwise, i it ican

iPIN, iand ito ihave isecurity ito ithe icustomers, iprevent iproper irecognition.

ihaving ibiometrics iinto ian i ATM isystem ican

isolve ithe iissue i of iauthentication iand isecurity iat Face iRecognition: iThis iis ione iof ithe imost
ithe isame itime. i Implementation iof ibiometrics iadaptable itechniques ias iit i very i well i may ibe

iof ifingerprint iand ifacial irecognition iinto i ATM imanaged i without iattention ito iindividual, ithat

iwould ibe i more ifeasible ito isolve ithe i mentioned ihe i is ibeing ichecked.

iproblems.

Scanning iof iRetina: i[2] iThe ipattern iof ithe


Before ientering iinto ithe ireal ibiometrics iblood i vein iat ithe ibehind iof i every i eye iis

isolution, i let’s iget iinto ithe iadvantages iand icompletely i interesting iand i is irarely i evolving.

idisadvantages i of icurrent i ATM isystems. iThe idisadvantage i of ithis isystem i is ithat iit itakes

iaround i20 iseconds iof icontinuous iattention ito

A. Advantages iof iATM iCard icomplete ia idecent iscan.


i

1. iNo ineed ifor ipaperwork iat ithe itime iof ithe


itransaction.
Iris iScanning: iIris iitself iis ione iof ia ikind iand iit
iabout idifficult ito ireplicate iand iremains ithe
2. iAccess ianywhere iat iany itime.
iequivalent i with i your i whole i lifetime. i Yet, ithe
3. iTime-saving.
iundeniable ithing iis, iit iis i hard ifor ikids iand
4. iBanking iand ifinance.
iwiped i out iindividuals.
5. iCard isharing iby ifamily iand ifriends. i

B. Disadvantages iof iATM iCard There iare istill ithe ichances iof ithe ifingerprint
i ibeing ispoofed i or icreating ifake ibiometrics, ibut

1. iATM icard ifrauds. iit iis iabsolutely i easier ito i make ia ireplica i of ia

2. iUse iof iATM icard iduplicate. icard inumber. i

3. iInability ito itrace ithe iwrongful iusers. i


4. iATM ipin ican ibe ishared ion iphone ior irecorded Numerous inations iare iutilizing ibiometrics
iusing isecret icameras.
iinnovation i(fingerprint iauthentication ito ibe

iprecise) iand i it ihas ibeen i effective ito ibattle

Biometric iATM i misrepresentation iby i money irelated

"Biometric" iis ia iGreek iword ithat iis igotten ifrom iassociations isuch ias ithe iWestern iBank iin ithe

itwo iwords-bio i(life) iand i metric i(to i measure). iUSA, i Barclays iBank iin ithe i UAE, iGroupo

iBiometric i can ibe i expressed ias ia iproportion i of iFinanciero iBanorte iin iMexico, iBanco

iconduct iand iphysical i qualities ithat iare icaught iFalabella i in iChile iand i many i more ibanks

iand iput iaway iin ia idatabase iand ifurther iaround ithe i world iare iusing ibiometrics.[2] iWe

icontrasted iand ian ioccurrence ifor ichecking ican iuse ibiometrics ias ian iextra iadded iadvantage

ipurposes. iIt iis irobotized itechniques ifor iof i verification; iauthentication iand

iidentifying ian iindividual idependent i on ia iauthorization i method i which i makes isure ithat

iphysiological i or isocial itrademark. iIt iis ia ieven iafter i having ianother iperson's i ATM ior

iproportion i of ia iperson's i one iof ia ikind iphysical idebit icard, ia icheater iis inot iable ito icarry iout iany

ior iconduct iattributes ito iperceive i or iconfirm i its itype i of itransaction isince ithe ibiometric ifeatures

ipersonality. i[1] iBiometrics itechnologies iare ia iof iall i mankind iis i distinctive iand i is iunable ito

isecure i means i of iauthentication ibecause iduplicate.

ibiometrics i data iare iunique, icannot ibe ishared,

icannot ibe i copied iand icannot ibe i lost. i


III. LITERATURE iREVIEW

There iare ivarious iways iabout ihow iwe ican With ithe irise iin iInformation iTechnology, ithere
iimplement ibiometrics: i
iare ivarious itechnologies ithat iare iimplemented

ithroughout ithe iworld. iMany icountries i have


Fingerprint iVerification: iFingerprints iof ione ialready i implemented iBio-metrics i in i ATM,
iperson i will ialways ibe iunique iand icannot ibe
iwith i different i modifications iall iround. iIndia iis
istill ilacking iin iimplementing iBio-metrics iin
iATM. iAs isuggested iby ithe iBhosale iS. iand Nowadays ibiometrics itechnology iis ibecoming
iSawant iB.(2012) iIris iand iRetina iscan ias ian icheaper ifor iboth i its iapplication iand ipractice.

iidentification i method, ibut iit ican ihappen ithat iWith ithe irise i in ithe iFintech icompanies ialong

icitizens i might inot iwant ito ilaser ithere ibeamed iwith ithe itechnology, ithere i is ia irise iin ithe iusage

ithere i eyes i every itime ithey istand ibefore ian iof i ATM. iThe iusage i of i ATM iin iIndia istarted

iATM isystem. iEven ipossible ithat iaged ipeople ialong iback, ibut iit irises irapidly. iCurrently, ithere

iand ichildren i might inot ibe iable ito iuse ithe iare i many iATM icrimes itaking iplace iworldwide

isystem, idue ito ithe i height iand ilaser ibeam ifactor. ieven ithough ithey iare iadvanced iwith i new

iThus, iusing ian iIris iand iRetina iScanner ifor itechnologies. iIn ithis ipaper, ithe iproposed

iATM isecurity i won’t ihelp. i isystem i is ijust ia imeasure ito ireduce ithe irisk i of

iATM ifrauds.

[3] iAs isuggested iby ithe iAkio iOgihara,


iHiroyuki iMatsumura iand i Akira iShiozaki [6] iA iPune, iIndia, ibased itechnology icompany,
iproposed ian i ATM iauthentication isystem, iAxis isoftware, ihas ideveloped iBio-ATM, iwhich

iwhich i was iperformed iby iusing i10 itypes iof ibio- iis ia ibiometric-based iautomated iteller i machine

metrics ifeatures, iwhich iare iextracted ifrom ithe ifor ibanks iand i other ifinancial iorganizations

ikeystroke iprovided iin ian i ATM ioperation. iwhich icontrols ibiometric itechnology ito iallow

iMoreover, iit icalculates ithe isimilarity ibetween isafe iand isecure i ATM itransactions. iThis iis ithe

ithe icurrent i ATM ioperators iand i genuine iusers ifirst itime i in iIndia’s ihistory ithat iany icompany

iin iconsideration iof ikey-press itiming. ihas ideveloped isuch itype i of i ATM imachine. iThe

iBio i ATM iprovides ian i option ito ithe itraditional

[4] iBin iLi, iKuan-Quan iWang, iand iDavid icard iand ipin-based iauthentication i ATM

iZhang iproposed ia ilow-cost i on-line isignature isystems.

iverification i method ibased ion ithe i matching i of

icurves iabout ix-axis iand iy-axis iattaching isome

idynamic ifeatures. i iJust ias ia ihuman ibeing's

ibehaviour, idifferent i local iweight, iand iunfixed

ithreshold iare i introduced ito i improve ithe

iperformance i of ithe isignature iverification

isystem. i

[5] iThere iwas ia isurvey iconducted iin i2012,


iabout ithe ireliability iand ipopularity iof ithe ibio-

metrics imethod iknown. i74 ipercent iof ithe


ipopulation iis ifamiliar iwith ifingerprint

ibiometric. i63 ipercent iof ithe ipopulation

istrongly ibelieved ithat iwith ithe iincorporation iof

ifingerprint ito ithe i existing i ATM icard iand iPIN,


Figure i1: iRise iof iBiometrics iTechnology

iwill iprovide ibetter isecurity ito ithe i ATM. i

From ithe ifigure i1 iwe ican isee ithe ipopularity iand


ithe iusage iof ibio-metrics iin ithe i growing inear
Thus, iwith ia idetailed istudy iand iresearch ifor ithe
ifuture. iFingerprint isensing iis ithe i most iviable
isecurity i of ithe i Automated iTeller iMachine, iin
ioption i when icompared ito ithe i other iavailable
ithis ipaper ia iproposed isystem i with ithe iuse iof
ibio-metrics iidentification i when icompared ito
ithe i different icombinations i of ithe ibio-metrics
ithe iprice, iscalability iand iidentification isuccess
irecognition isystem ito iauthenticate iand ito
iratio, ifollowed iby ifacial irecognition.
iprovide isecurity i of ithe isystem. iWhere iface-

recognition iwill iwork ias ian iauthentication


itechnique iwhile ifingerprint i verification ican
In ithe icurrent, iproposed isystem iauthentication
iis idone i with ithe iface irecognition isystem iand
iwork ias ithe i measure i of ithe isecure itransaction

itaking iplace. iThus, iminimizing ithe irisk i of ithe itransaction iis i validated iand isecured iby ithe

ifingerprint iscanning i mechanism. iIntegrating


iATM ifrauds iand ifailures.
iboth i of ithe ibio-metrics ifeatures ito ithe isame

iATM iwill i help i in iachieving ithe i maximum


IV. PROPOSED iSYSTEM
ipossible iuser iidentification.
1. iCapturing ibiometric idata: iWhen ithe iuser
FACE iRECOGNITION iplaces ithe ifinger i or ipalm iat ithe isensor, ithe

Face irecognition iis ia ibiometric iscan ibiometric idata iis ipresented ito ithe i capturing

itechnology. iFace irecognition i includes ia isystem idevice.


i
ithat ican irecognize ithe iface ifor ithe
2. iPre-processing istage: iThis iis ithe istage
iauthentication ithat ican irange ifrom ia ihigh-end
ibefore ithe ifeature i extraction. iHere ibiometric
iresolution i camera, iworkstations, isoftware, iand
idata iis irecorded iand ipre-processed iby
iback-end iprocessors. iFace irecognition isystem
iimproved iinput ifrom ithe isensor. iIt iremoves
imeasure ithe i distance ibetween ithe i eyes, inose
iextra inoises iand i distortions. iThe iinput iis
ilips, i eyebrows i etc., ito irectify ithe iauthenticity
imaintained ito iget ithe irequired iformat ifor
iof ithe ipersonnel. iThe i ATM isystem i will ibe
imaximum i extraction. i
iembedded i with ithe i high-end iresolution

icamera, iwhich ican icapture ithe iface i distancing


3. iFeature iextraction: iIn ithis istage, ithe ipre-
iabout itwo ifeet ifrom ithe icamera. iThe i new i ATM
processed idata iis iextra iprocessed iand ifeatures
isystem i will i match ithe isame idata iwith ithe
iare i extracted iin ithe ibest ipossible iway. iBecause
idatabase, iand i it i would ifetch iresults i within iten
inot iall ithe idata icaptured i is irequired ifor
iseconds iof istanding. iThe ibiometrics iprocess iof
ibiometric iassessment.
ithe irecognition iinvolves i matching ithe i

iextracted ifeatures i with isamples irecorded iin ithe 4. iTemplate icreation: iAfter ithe ifeature
idatabase. iextraction iprocess i is icomplete, ia itemplate iis

icreated ifrom ithe i entire isignificant

icharacteristics itaken i out ifrom ithe iusers. iThe


FINGERPRINT iSCANNING
iunnecessary i data iwhich iis i not irequired ifor ithe
Biometrics iis isuch ia ifeature iwhere ithere iis ia
idifferent i identity iof i every isingle ihuman ibeing icomparison ialgorithm iis i washout ito ireduce ithe

iand ithe iprobability i of i getting ithe isame ifile isize iand iprotect ithe iprivacy iand isecurity iof

iuser iidentity. i
ibiometrics ifeature ito itwo idifferent i humans iis

inear ito i0. iThere iis ino i way ipossible ithat itwo

ihumans iare ihaving ithe isame ifinger-prints. iDue 5. iStorage iof ithe itemplate: iHere itemplate iis iget
ito ithis ifeature, iwe ican iuse ibiometric idata ias ia istored iin ia ireusable idatabase, iwhich ican iis

iunique iidentification i or irecognition i of ithe ineeded iat ithe itime i of i execution i of ithe i matching

iperson. iIf i we iamalgamate ibiometric idata iand iprocess. i

ibiometric iidentification itechnologies, ithen i we

ican idevelop ia ibiometric isecurity isystem. i 6. iMatching iphase: iThis iis ithe ilast istep ithat
iinvolves ian ialgorithm ito iperform ia icomparison

ibetween ithe itemplate ialready istored iin ithe

idatabase iand ithe itemplate i obtained ifor idecision

imaking. i i After ithe idecision i making ithe iresult iis

ithen ipassed i on ito isome iapplication idevice ifor

ifurther iactions. i

Since iwe ihave istudied ithe iworking iof ithe iFace


irecognition iand iFingerprint iscanner, iwe ican

inow isee ithe i working i of ithe i Advanced i ATM

isystem. iIn ithis isystem, iit iis isuggested ito

iimplement iboth iof ithe ibiometric ifeatures i one

iafter ianother i eliminating ithe iuse i of iPIN ifrom

ithe i ATM isystems. i

Figure i2: iDiagram ifor ithe ifingerprint irecognition.


Whenever ithe iuser, ienters ithe iATM ipremises ito
According ito ithe iFigure i2, ithere ican ibe ivarious iwithdraw icash ifrom ithe iaccount. iHe i is irequired

isteps iinvolved i in ithe irecognition i of ithe ito iinsert ihis iATM iCard iinto ithe islot ifor ithe

ifingerprint iauthentication. iSteps iare i described iaccount iinformation. i After ithat, ihe i needs ito

ibelow i in ia ichronological i order. i istand iagainst ithe icamera ifacing ithe i ATM,
iwhere ihis iface irecognition iwill icommence. iKeystroke iMotion iand iKey iPress iTiming ifor
iThe iresults iwould ifetch iwithin iten iseconds, iATM iUser iAuthentication," iInternational
iwhere ithe i identity i of ithe iuser i would ibe iSymposium i on iIntelligent iSignal iProcessing

imatched. iThe iidentity i would ibe i matched iand iCommunication iSystems i(ISPACS2006)

iaccording ito ithe i data istored iin ithe isystem iYonago iConvention iCenter, iTottori, iJapan,

idatabase. i2006.

Once ithe iface irecognition iis icompleted, ithe [4] iBin iLi, iKuan-Quan iWang, iand i iD. iZhang, i
ifurther iprocess iof ithe i money i withdrawal i would i“On-line iSignature i Verification ifor iE-Finance

itake iplace. iAfter ithe icompletion iof ithe i money iand iE-Commerce iSecurity iSystem,” iMachine

iwithdrawal iprocess iuntil ithe istep i of iLearning iand iCybernetics, i2003 iInternational

iauthentication iof ithe itransaction. iFor ithe iConference i on i5-5 iNov. i2003, ipp. i3002-3007.

itransaction ito i happen, ithere ishould ibe ia

ifingerprint iscanner ithat iwould irequire ito [5]https://www.researchgate.net/publication/26


ifinally i withdraw ithe i money. iThe ifingerprint iof 7265597/ i
ithe iuser iwould i match ithe i data irecorded i in ithe

idatabase iof ithe ibank isystem. iThis i will [6]https://www.researchgate.net/publication/27


ieliminate ithe i frauds iof i ATM iCards iand iPIN. i 4256399_Biometrics_to_Control_ATM_scams
_A_study
V. CONCLUSION iAND iFUTURE
iWORK
[7]https://www.tractica.com/newsroom/pre
ss-releases/it-security-applications-will-
As iwe ihave iseen ithat iwith ithe irise iin ithe drive-growth-in-enterprise-adoption-of-
itechnologies i we i have ialso iseen ia irise i in ithe biometrics-technology-during-the-next-10-
iways i of icommitting ifraud. iNo i matter ihow years/
imuch iadvanced iwe ibecome i with itechnologies

ithere iare i going ito ibe iflaws iin ithe isystems.

iAdvanced i ATM iwith i Biometric iSystem i is ia

imore isecure i ATM isystem i in i comparison ito ithe

itraditional iPIN iauthentication. iAbove i model iis

ia iconceptual i model, iit i has ibeen iconcluded ithat

ihaving ia ibiometric isystem ican iprove ito igive

ihigh-end isecurity. i

In ithe ifuture, iif ithis imodel iis iimplemented, iwe


icould iupgrade i its ialgorithms i which i matches

ithe iface irecognition iand ifingerprint i matching

ialgorithms. iUpgrading i it iwith ithe i various i new

ifraudulent itechniques i would ihelp ius iin

ibuilding ia i more isecure isystem.

VI. REFERENCES

[1]https://www.scribd.com/document/9207805
2/Paper-12-ATM-Security-Using-Fingerprint-
Biometric-Identifer-an-Investigative-Study

[2]https://www.researchgate.net/publication/27
4256399_Biometrics_to_Control_ATM_scams
_A_study

[3] iAkio iOgihara, iHiroyuki iMatsumura iand


iAkira iShiozaki, i "Biometric i Verification i Using

Potrebbero piacerti anche