Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
i i i i
Automatic iTeller iMachine(ATM) iis ione iof An iautomated iteller imachine i(ATM) iis ian
ithe ibest iways ito iaccess ibank iaccount, ielectronic ibroadcast icommunications i gadget
iregardless iof igoing ito ia ibank iitself, ifrom ithat ienables i clients ito i get ifiscal ifoundations ito
ianywhere iat iany itime. iSimilar ito ian iperform i monetary iexchanges, isimilar ito icash
ielectrical imedia itransmission igadget, iit iwithdrawals, i move ireserves, ior igetting iaccount
icauses iclients ito iperform ithe ibank idata, iwhenever iand i keeping i in i mind ithat inot
itransactions, iretreating iand idepositing ithe i need ifor idirect icollaboration i with ithe ibank
imoney, iby isimply itouching ia inumber iof iofficials. iIn ia ishell, i ATM igives iclients iquick
ibuttons ion ithe iscreen iwhile inot ihaving ia iand iadvantageous i gratitude ifor igetting ito itheir
icashier. iThe idevelopment iof ielectronic ifinancial ibalances iand ito i direct i money irelated
iprominent iinterest ifor iquick iand iexact iNumber(PIN) iis ione iimperative iside i of ithe
irecognizable iproof iand ivalidation iof ithe iATM isecurity iframework. iPIN i or isecret iphrase
iclient. iCurrently, ithere iis ionly ione-way iis i generally iused ito i verify iand ishield ithe
iATM iauthentication iand isecurity iworks, imonetary idata iof iclients ifrom iunapproved
iwhich iis iPersonal iIdentification iaccess. iJohn iShepphardbaren iinvented i ATM iat
iNumber(PIN). iNowadays, iPIN ican ialso ibe iUnited iKingdom i on iJune i1967. iATM iis ione i of
iextracted ithrough ivarious ifraudulent ithe iautomated isystems ibeing i employed isince
iactivities. iCard iskimming, ieavesdropping, i1967 iby iseveral ifolks. iIt ifirst icame ito iIndia iin
ifraudsters. iTo iprevent isuch imal-practices The ivast imajority iin ideveloped inations ihave
iand ito ihave iproper iauthentication iand iaccounts iin i many ibanks iand ihave ia ivarious
isecurity imeasures, ialong iwith ithe icurrent ibank icredit i card iwith ithem. iThey iregularly
itechnology, ibiometrics iis ithe ionly iviable icarry itheir icards iin ia isolitary iwallet i or ihandbag
isolution iavailable. iIn ithis ipaper, isecurity iand i most i of ithe itime, ithey iuse ia isimilar iPIN
iand iauthentication iof ithe iAutomatic iTeller inumber ifor i every ione i of itheir icards isince i it iis
iMachine ihave ibeen ifocused ion, iby ireplacing idifficult ito irecollect iall isuch i various iPINs iby ia
ithe iPIN iwith ibiometric isolutions. isolitary iindividual. i A ifew ipeople i like ito irecord
iAuthentication ican ibe isolved iby ifacial ithe iPIN i on ithe icard i itself. iMisfortune i or
irecognition iand ithe isecurity ican ibe isolved irobbery i of ia iwallet ieven ia icard iputs ithem iin
iby ithe ifingerprint iof ithe iuser. iIn ithe idanger iof i extortion. iWhile i in i developing
iproposed isystem iinfusing ibiometrics iinto icountries i like iIndia, ithere iare ihigh ichances i of
ithe iATM, ithe isystem ican ibring ia ichange iin icards igetting istolen i with ithe i wallets i itself. iThe
icustomer isecurity iand isatisfaction. iother iproblem i includes i many ipeople i do i not
Keywords i– iATM, iSecurity, iBiometrics, iPIN, iPIN, iincreases ithe i chances iof i having iblocked
iATM iAuthentication, iBanking iSecurity, ithe iATM iCard, iand iagain icustomers, ias iwell ias
iovercome isuch i issues ias inot iremembering ithe iany i wounds ito itheir iprints. iOtherwise, i it ican
iPIN, iand ito ihave isecurity ito ithe icustomers, iprevent iproper irecognition.
isolve ithe iissue i of iauthentication iand isecurity iat Face iRecognition: iThis iis ione iof ithe imost
ithe isame itime. i Implementation iof ibiometrics iadaptable itechniques ias iit i very i well i may ibe
iof ifingerprint iand ifacial irecognition iinto i ATM imanaged i without iattention ito iindividual, ithat
iwould ibe i more ifeasible ito isolve ithe i mentioned ihe i is ibeing ichecked.
iproblems.
isolution, i let’s iget iinto ithe iadvantages iand icompletely i interesting iand i is irarely i evolving.
idisadvantages i of icurrent i ATM isystems. iThe idisadvantage i of ithis isystem i is ithat iit itakes
B. Disadvantages iof iATM iCard There iare istill ithe ichances iof ithe ifingerprint
i ibeing ispoofed i or icreating ifake ibiometrics, ibut
1. iATM icard ifrauds. iit iis iabsolutely i easier ito i make ia ireplica i of ia
"Biometric" iis ia iGreek iword ithat iis igotten ifrom iassociations isuch ias ithe iWestern iBank iin ithe
itwo iwords-bio i(life) iand i metric i(to i measure). iUSA, i Barclays iBank iin ithe i UAE, iGroupo
iBiometric i can ibe i expressed ias ia iproportion i of iFinanciero iBanorte iin iMexico, iBanco
iconduct iand iphysical i qualities ithat iare icaught iFalabella i in iChile iand i many i more ibanks
iand iput iaway iin ia idatabase iand ifurther iaround ithe i world iare iusing ibiometrics.[2] iWe
icontrasted iand ian ioccurrence ifor ichecking ican iuse ibiometrics ias ian iextra iadded iadvantage
ipurposes. iIt iis irobotized itechniques ifor iof i verification; iauthentication iand
iidentifying ian iindividual idependent i on ia iauthorization i method i which i makes isure ithat
iphysiological i or isocial itrademark. iIt iis ia ieven iafter i having ianother iperson's i ATM ior
iproportion i of ia iperson's i one iof ia ikind iphysical idebit icard, ia icheater iis inot iable ito icarry iout iany
ior iconduct iattributes ito iperceive i or iconfirm i its itype i of itransaction isince ithe ibiometric ifeatures
ipersonality. i[1] iBiometrics itechnologies iare ia iof iall i mankind iis i distinctive iand i is iunable ito
There iare ivarious iways iabout ihow iwe ican With ithe irise iin iInformation iTechnology, ithere
iimplement ibiometrics: i
iare ivarious itechnologies ithat iare iimplemented
iidentification i method, ibut iit ican ihappen ithat iWith ithe irise i in ithe iFintech icompanies ialong
icitizens i might inot iwant ito ilaser ithere ibeamed iwith ithe itechnology, ithere i is ia irise iin ithe iusage
ithere i eyes i every itime ithey istand ibefore ian iof i ATM. iThe iusage i of i ATM iin iIndia istarted
iATM isystem. iEven ipossible ithat iaged ipeople ialong iback, ibut iit irises irapidly. iCurrently, ithere
iand ichildren i might inot ibe iable ito iuse ithe iare i many iATM icrimes itaking iplace iworldwide
isystem, idue ito ithe i height iand ilaser ibeam ifactor. ieven ithough ithey iare iadvanced iwith i new
iThus, iusing ian iIris iand iRetina iScanner ifor itechnologies. iIn ithis ipaper, ithe iproposed
iATM isecurity i won’t ihelp. i isystem i is ijust ia imeasure ito ireduce ithe irisk i of
iATM ifrauds.
iwhich i was iperformed iby iusing i10 itypes iof ibio- iis ia ibiometric-based iautomated iteller i machine
metrics ifeatures, iwhich iare iextracted ifrom ithe ifor ibanks iand i other ifinancial iorganizations
ikeystroke iprovided iin ian i ATM ioperation. iwhich icontrols ibiometric itechnology ito iallow
iMoreover, iit icalculates ithe isimilarity ibetween isafe iand isecure i ATM itransactions. iThis iis ithe
ithe icurrent i ATM ioperators iand i genuine iusers ifirst itime i in iIndia’s ihistory ithat iany icompany
iin iconsideration iof ikey-press itiming. ihas ideveloped isuch itype i of i ATM imachine. iThe
[4] iBin iLi, iKuan-Quan iWang, iand iDavid icard iand ipin-based iauthentication i ATM
isystem. i
itaking iplace. iThus, iminimizing ithe irisk i of ithe itransaction iis i validated iand isecured iby ithe
Face irecognition iis ia ibiometric iscan ibiometric idata iis ipresented ito ithe i capturing
iextracted ifeatures i with isamples irecorded iin ithe 4. iTemplate icreation: iAfter ithe ifeature
idatabase. iextraction iprocess i is icomplete, ia itemplate iis
iand ithe iprobability i of i getting ithe isame ifile isize iand iprotect ithe iprivacy iand isecurity iof
iuser iidentity. i
ibiometrics ifeature ito itwo idifferent i humans iis
inear ito i0. iThere iis ino i way ipossible ithat itwo
ihumans iare ihaving ithe isame ifinger-prints. iDue 5. iStorage iof ithe itemplate: iHere itemplate iis iget
ito ithis ifeature, iwe ican iuse ibiometric idata ias ia istored iin ia ireusable idatabase, iwhich ican iis
iunique iidentification i or irecognition i of ithe ineeded iat ithe itime i of i execution i of ithe i matching
ican idevelop ia ibiometric isecurity isystem. i 6. iMatching iphase: iThis iis ithe ilast istep ithat
iinvolves ian ialgorithm ito iperform ia icomparison
ifurther iactions. i
isteps iinvolved i in ithe irecognition i of ithe ito iinsert ihis iATM iCard iinto ithe islot ifor ithe
ifingerprint iauthentication. iSteps iare i described iaccount iinformation. i After ithat, ihe i needs ito
ibelow i in ia ichronological i order. i istand iagainst ithe icamera ifacing ithe i ATM,
iwhere ihis iface irecognition iwill icommence. iKeystroke iMotion iand iKey iPress iTiming ifor
iThe iresults iwould ifetch iwithin iten iseconds, iATM iUser iAuthentication," iInternational
iwhere ithe i identity i of ithe iuser i would ibe iSymposium i on iIntelligent iSignal iProcessing
imatched. iThe iidentity i would ibe i matched iand iCommunication iSystems i(ISPACS2006)
iaccording ito ithe i data istored iin ithe isystem iYonago iConvention iCenter, iTottori, iJapan,
idatabase. i2006.
Once ithe iface irecognition iis icompleted, ithe [4] iBin iLi, iKuan-Quan iWang, iand i iD. iZhang, i
ifurther iprocess iof ithe i money i withdrawal i would i“On-line iSignature i Verification ifor iE-Finance
itake iplace. iAfter ithe icompletion iof ithe i money iand iE-Commerce iSecurity iSystem,” iMachine
iwithdrawal iprocess iuntil ithe istep i of iLearning iand iCybernetics, i2003 iInternational
iauthentication iof ithe itransaction. iFor ithe iConference i on i5-5 iNov. i2003, ipp. i3002-3007.
ihigh-end isecurity. i
VI. REFERENCES
[1]https://www.scribd.com/document/9207805
2/Paper-12-ATM-Security-Using-Fingerprint-
Biometric-Identifer-an-Investigative-Study
[2]https://www.researchgate.net/publication/27
4256399_Biometrics_to_Control_ATM_scams
_A_study