Вы находитесь на странице: 1из 4

International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.

11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm

ATM Security By Using Fingerprint Recognition


1

Mrs. Nitasha Soni, 2Mrs. Jyoti


Lingayas university, India
1
Soni_nitasha@yahoo.in
2
jyotidixit.25@gmail.com

Abstract- The main objective of this system is to develop a


system that will increase the ATM security. The software t be
designed will control a simulated automated teller machine
(ATM) with a customer console for interaction with the
customer. The ATM will communicate with the bank
computer over an appropriate communication link. The ATM
will service one customer at a time. A customer will be
required to enter a login id and validate his finger print and
both will be sent to the bank for validation as part of each
transaction. This makes the developed ATM software more
secure as compared to the software that authenticates the user
merely by using a PIN or password.
Keyword- Atm Terminal, Finger Print Recognition, Biometric
Verification, PIN.

INTRODUCTION
As we know that over the past three decades, consumers have
been largely depending on and trust Automatic Teller
Machine, known as ATM machine to conveniently meet there
banking needs. Using an ATM, customers can access their
bank accounts in order to make cash withdrawals, debit card
cash advances, and check their account balances as well as
purchase prepaid cell phone credit. Most ATMs are connected
to interbank networks, enabling people to withdraw and
deposit money from machines not belonging to bank where
they have their accounts or in the countries where their
account are held. Despite the numerous advantages of ATM
system, ATM fraud has recently become more widespread.
Fraud technique such as card skimming, shoulders surfing etc
have been observed recently. In order to increase the level of
security of the ATM networks use of biometric technique for
verification along with existing PIN has been thought of a
solution to decrease the increasing number of frauds. Also in
rural areas people are not educated enough to use the ATM
machines so, use of only biometric verification can help those
people access the ATMs in an easier manner and hence
increase its popularity among rural masses. We tried to
purpose a prototype model for the same, which uses PIN
number along with the fingerprint verification scheme to
verify the user before he can access his/her account and make
the transactions. However ATMs using single layer of
verification i.e. biometric verification can also be developed
using our prototype model.

OBJECTIVES
There are two main objective of this paper, as follows:
i.
To integrate the fingerprint in access control for
ATM system.
ii.
To purpose a framework for the ATM system
using fingerprints verification.

CHARACTERISTIC
The fingerprint is the easiest something you are
characteristic to capture and process. It is also very easy for a
user to supply and the technology is neither invasive nor
inconvenient. In fact, among all the biometrics techniques,
finger base identification is the oldest method which has been
successfully used in many applications. Fingerprints are one of
the most mature technologies and considered legitimate
evidence in courts of law all over the world. It is also used in
forensic investigations. Recently an increasing number of
civilian and commercial applications are either using or
actively considering using finger based identification because
of the better understanding of finger prints and furthermore, its
matching performance is better than any other existing
biometrics technologies. A fingerprint is believed to be unique
to each person and also each finger. It is unique in terms of the
arrangement of its minutiae. Even identical twins have
different fingerprints and they do not change over time.

PROJECT DESIGN AND IMPLEMENTATION


The design of entire system consisted of two part which are
hardware and software. The hardware are designed by the
rules of embedded system, and the steps of software consisted
of three parts. The more details are shown as follows [1].

A. Hardware Design
Required hardware used should be easy to maintain,
implement and easily available. Proposed model consists
following parts: Finger print scanner; Computer(LCD);
Keyboard.
Finger print scanner will be used to input fingerprint of
customers into the computer software. LCD display will be
displaying the facilities that the customer can avail and make
the transactions. Computer software will be interfacing finger
print scanner and LCD. It will input finger print, will process
it and extract features for matching. After matching it will
update database entries of the customers and keep a record of
any transaction made by him/her.

International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
B. Software Design
Our system integrate biometric identification into normal,
traditional authentication technique use by electronic ATM
machines nowadays to ensure a strong unbreakable security
and non-repudiate transactions. In order to increase the
security we are using the combination of three authentication
methods of card, PIN and fingerprint. The proposed software
design involves two phases namely: registration phase and
verification phase.

Start enrollment

Insert card to
the reader

1) Registration phase- the objective of this process is to


create the profile of the user. This process is carried out
by the administrator of the system. As shown in fig 1. The
process consists of the following two steps:

Input the
required data

No

Sample Capture- the user allows three biometric


readings by placing a finger on a fingerprint reader.
The quality of the samples, together with the number
of samples taken, will influence the level of accuracy
at the time of validation. Not all samples are stored;
the technology analyzed and measured various data
points unique to each individual. The numbers of
measured data points varies in accordance to the type
of device.

All
required
fields

Populate the card with details

Scan user
fingerprint.

Conversion and Encryption- the individual


measurements and data points are converted to a
mathematical algorithm and encrypted. These
algorithms are extremely complex and cannot be
reversed engineered to obtain the original image. This
algorithm is further stored in the database or server.

No
Scan image
accepted

2) Identification and verification process- once the


individual has been enrolled in a system he/she can start
the use of biometric technology to have access to his
account via the ATM machine to authorize transaction.
As shown in Fig:2

Populate the fingerprint data


to card

Lock all data

Identification- it is one to many match. The user


provides a biometric sample and the system looks at all
user templates in the database. if there is a match, the
user is granted access, otherwise it is declined.

Finish

Fig: 1

Verification- it is one to one match requiring the user


provides identification such as PIN and valid ATM
card in addition to the biometric sample. In other
words the user is establishing who he/she is and the
system simply specify verifies if this is correct. The
biometric sample with the provided identification is
compared to the previously stored information in the
database. if there is a match, access is provided,

International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
otherwise, it is declined. After the verification process,
the user can carry on with his/her transactions such as
balance inquiry, balance withdrawal, balance transfer
etc.

COMPARISON WITH OTHER ATM MACHINES


Typically a user inserts into the ATM a special plastic card
that is encoded with information on a magnetic strip. The PIN
number is also enters by the user by using a keypad. The
computer then permits the ATM to complete the transition.
Integrated ATM system with the biometric authentication
techniques is a solution to avoid the fraud. Biometric
authentication ensures that a person is actually present rather
than their cards and passwords without requiring the user to
remember anything. Banks can choose different authentication
schemes for their customers at their ATMs

FUTURE PROSPECTS
Though the use of biometric technology has its high
Start
verification

Insert card to reader


No
Card
valid?

Mutual
authentication
between card and reader

Generate session
key

CONCLUSION
As our focus is on enhancing the process of identification and
authentication on ATM. This paper has proposed the use of
the fingerprint as a suitable substitution for the personal
identification number (PIN). As we know that fingerprints are
the most acceptable biometrics all over the world in
identifying a person. Some governments in the world are still
implementing fingerprints technique to identify their citizens
and the criminals from the scene of crimes in forensic work. In
this paper fingerprint are chosen for its uniqueness, ease of use
and also convenience to user; as fingerprints cant be stolen, it
is not transferable and the use dont need to remember.

Insert PIN
Encryption

Load fingerprint
data

Correct
PIN?

Scan user
fingerprint
Attempt
exceeds
limit?

No
Finger
print
match

Lock card

Perform
transaction
No
Terminate

Fig: 2
Cost implementation to banks, several other costs of
conventional ATMs like re-issuance of password, helpdesk etc
will be reduced, which will be a positive factor for bank to go
for biometric ATMs. If cost can be minimized, bank can think
of using more than one method of identification such as
combination of PIN and thumb impression to make the ATM
transaction full proof. Now since many banks are increasing
withdrawal of cash limit from ATMs, use of more than one
identification techniques for high value of transactions will

International Journal of Applied Engineering Research, ISSN 0973-4562 Vol.7 No.11 (2012)
Research India Publications;
http://www.ripublication.com/ijaer.htm
restrict the fraud and minimize the risk to the bank as well as
customers.

REFERENCES
[1]. Pennnam Krishnamurthy and Mr. M. Maddhusudhan
Redddy. Implementation of ATM Security by Using
Fingerprint recognition and GSM,
International Journal of Electronics Communication
and Computer Engineering.Volume 3, Issue (1)
NCRTCST, ISSN 2249 071X
[2]. About Script ATMs: How do cash less ATM work?
Atmscrip.com.
[3].Automatic Teller Machine. The history of computing
project. Thocp.net. 17 April 2006
[4]. Wan, W.W.N.; Luk, C.L.; and Chow, C.W.C. (2005),
Customers Adoption of Banking Channels in Hong
K34rong, International Journal of Bank Marketing,
Vol. 23, No. 3, pp. 255-272
[5]. Singh, B. and Malhotra, P. (2004) Adoption of
Internet banking: An empirical investigation of Indian
banking Sector. Journal of Internet Banking and
Commerce, 9 (2).

Вам также может понравиться