Академический Документы
Профессиональный Документы
Культура Документы
11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
INTRODUCTION
As we know that over the past three decades, consumers have
been largely depending on and trust Automatic Teller
Machine, known as ATM machine to conveniently meet there
banking needs. Using an ATM, customers can access their
bank accounts in order to make cash withdrawals, debit card
cash advances, and check their account balances as well as
purchase prepaid cell phone credit. Most ATMs are connected
to interbank networks, enabling people to withdraw and
deposit money from machines not belonging to bank where
they have their accounts or in the countries where their
account are held. Despite the numerous advantages of ATM
system, ATM fraud has recently become more widespread.
Fraud technique such as card skimming, shoulders surfing etc
have been observed recently. In order to increase the level of
security of the ATM networks use of biometric technique for
verification along with existing PIN has been thought of a
solution to decrease the increasing number of frauds. Also in
rural areas people are not educated enough to use the ATM
machines so, use of only biometric verification can help those
people access the ATMs in an easier manner and hence
increase its popularity among rural masses. We tried to
purpose a prototype model for the same, which uses PIN
number along with the fingerprint verification scheme to
verify the user before he can access his/her account and make
the transactions. However ATMs using single layer of
verification i.e. biometric verification can also be developed
using our prototype model.
OBJECTIVES
There are two main objective of this paper, as follows:
i.
To integrate the fingerprint in access control for
ATM system.
ii.
To purpose a framework for the ATM system
using fingerprints verification.
CHARACTERISTIC
The fingerprint is the easiest something you are
characteristic to capture and process. It is also very easy for a
user to supply and the technology is neither invasive nor
inconvenient. In fact, among all the biometrics techniques,
finger base identification is the oldest method which has been
successfully used in many applications. Fingerprints are one of
the most mature technologies and considered legitimate
evidence in courts of law all over the world. It is also used in
forensic investigations. Recently an increasing number of
civilian and commercial applications are either using or
actively considering using finger based identification because
of the better understanding of finger prints and furthermore, its
matching performance is better than any other existing
biometrics technologies. A fingerprint is believed to be unique
to each person and also each finger. It is unique in terms of the
arrangement of its minutiae. Even identical twins have
different fingerprints and they do not change over time.
A. Hardware Design
Required hardware used should be easy to maintain,
implement and easily available. Proposed model consists
following parts: Finger print scanner; Computer(LCD);
Keyboard.
Finger print scanner will be used to input fingerprint of
customers into the computer software. LCD display will be
displaying the facilities that the customer can avail and make
the transactions. Computer software will be interfacing finger
print scanner and LCD. It will input finger print, will process
it and extract features for matching. After matching it will
update database entries of the customers and keep a record of
any transaction made by him/her.
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
B. Software Design
Our system integrate biometric identification into normal,
traditional authentication technique use by electronic ATM
machines nowadays to ensure a strong unbreakable security
and non-repudiate transactions. In order to increase the
security we are using the combination of three authentication
methods of card, PIN and fingerprint. The proposed software
design involves two phases namely: registration phase and
verification phase.
Start enrollment
Insert card to
the reader
Input the
required data
No
All
required
fields
Scan user
fingerprint.
No
Scan image
accepted
Finish
Fig: 1
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
otherwise, it is declined. After the verification process,
the user can carry on with his/her transactions such as
balance inquiry, balance withdrawal, balance transfer
etc.
FUTURE PROSPECTS
Though the use of biometric technology has its high
Start
verification
Mutual
authentication
between card and reader
Generate session
key
CONCLUSION
As our focus is on enhancing the process of identification and
authentication on ATM. This paper has proposed the use of
the fingerprint as a suitable substitution for the personal
identification number (PIN). As we know that fingerprints are
the most acceptable biometrics all over the world in
identifying a person. Some governments in the world are still
implementing fingerprints technique to identify their citizens
and the criminals from the scene of crimes in forensic work. In
this paper fingerprint are chosen for its uniqueness, ease of use
and also convenience to user; as fingerprints cant be stolen, it
is not transferable and the use dont need to remember.
Insert PIN
Encryption
Load fingerprint
data
Correct
PIN?
Scan user
fingerprint
Attempt
exceeds
limit?
No
Finger
print
match
Lock card
Perform
transaction
No
Terminate
Fig: 2
Cost implementation to banks, several other costs of
conventional ATMs like re-issuance of password, helpdesk etc
will be reduced, which will be a positive factor for bank to go
for biometric ATMs. If cost can be minimized, bank can think
of using more than one method of identification such as
combination of PIN and thumb impression to make the ATM
transaction full proof. Now since many banks are increasing
withdrawal of cash limit from ATMs, use of more than one
identification techniques for high value of transactions will
International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
restrict the fraud and minimize the risk to the bank as well as
customers.
REFERENCES
[1]. Pennnam Krishnamurthy and Mr. M. Maddhusudhan
Redddy. Implementation of ATM Security by Using
Fingerprint recognition and GSM,
International Journal of Electronics Communication
and Computer Engineering.Volume 3, Issue (1)
NCRTCST, ISSN 2249 071X
[2]. About Script ATMs: How do cash less ATM work?
Atmscrip.com.
[3].Automatic Teller Machine. The history of computing
project. Thocp.net. 17 April 2006
[4]. Wan, W.W.N.; Luk, C.L.; and Chow, C.W.C. (2005),
Customers Adoption of Banking Channels in Hong
K34rong, International Journal of Bank Marketing,
Vol. 23, No. 3, pp. 255-272
[5]. Singh, B. and Malhotra, P. (2004) Adoption of
Internet banking: An empirical investigation of Indian
banking Sector. Journal of Internet Banking and
Commerce, 9 (2).