Вы находитесь на странице: 1из 22

BIOMETRIC ATM SECURITY

SYSTEM

MISBAN A S
LECTURER IN ECE PRESENTED BY
MGM PTC SARATH S
TECHNOLOGICAL CAMPUS KILIMANOOR REG NO:1720129
CONTENTS
1)INTRODUCTION

2)RELEVANCE

3)WORKING

4)APPLICATIONS

5)FUTURE ENHANCEMENT

6)CONCLUSION

7)REFERENCES
INTRODUCTION
Biometrics refers to the automatic identification of a
person based on his physiological/behavioral
characteristics.
Various types of biometric systems are being used for real
time identification most popular are based on face
recognition and finger print matching.
Most of the ATM in the past have been using ID cards to
identify users but with the wide acceptance of Biometrics
,a new generation of Biometrics ATM are being deployed
for wide range of applications worldwide.
Biometrics based authentication is a potential candidate to
replace password-based authentication.
Issues in current ATM networks
• ATM Card frauds

• Use of ATM card duplicators

• Card sharing by family and friends

• Inability to trace the wrongful users

• ATM PINs can be shared on phone or recorded using secret cameras


Biometric ATMs solve these issues
& offer
Single/Multi factor Biometric Authentication: Fingerprint,
Iris, Face.

Multifactor Authentication: Card + PIN + Biometrics

Online or offline Authentication using smart cards

Card less Authentication

Biometrics is combination of card or PIN


Typology of identification methods
How Biometric works?
 Biometric systems work by recording and comparing biometric
characteristics.

 When an individual first uses a biometric system , their identifying


features are enrolled as a reference for future comparison.This
reference may be stored in a central database or on a card(or
both) depending on the needs of the application.

 When biometric recognition is required ,the individual’s biometric


characteristics are recorded again.This time however,the
identifying features are compared by the system with the stored
reference to determine if there is a close match
Biometric System
FINGER PRINT
A fingerprint scanner system has two basic jobs :

 It needs to get an image of your finger.

 It needs to determine whether the pattern of ridges and valleys


in this image matches the pattern of ridges and valleys in pre-
scanned images.

 Only specific characteristics, which are unique to every


fingerprint, are filtered and saved as an encrypted biometric
key or mathematical representation.
Identification
 A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown individual.

Verification
 A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.

 Verification is faster and performs better.

 In a verification,the user must first enter his or her identify to the


biometric system.User ID’s can be forgotten and cards can be
lost, making access impossible.
Applications of Biometric ATM
• Banking & Finance

• Food coupons / Tickets / Canteen ATM

• Membership Verification ATM

• Transaction / Check Deposit ATM

• Self Service ATM

• Retail ATM
ADVANTAGES
 While a criminal might be able to obtain a password
illegally,getting a user’s fingerprint would be much more
complicated.

 In addition ,contrary to traditional ID cards or badges , you


can’t actually lose physical features , making maintenance
more cost efficient for the business or organization,and the
technology more convenient for users.
DISADVANTAGES
 Biometric ATMs are traditionally more expensive to buy
than traditional ones.

 Biometric identification machines are not always entirely


accurate.For example ,an individual with a cold may not be
able to identify himself using a voice identification
device,and people who gain or lose weight may suddenly
lose access to a place protected by a system analyzing facial
features
ATMs of the Future
• Today’s biometric scanners go far beyond basic
fingerprint recognition.
• In Poland and Japan, consumers are already using
Hitachi's infrared scanners that capture the unique pattern
of capillaries in the finger and hand.
• The most secure biometric technology uses a device
designed to perform an iris scan based on more than 2,000
unique measurement points.
• According to developers, people and pets all over the
world will be connected to a system that uses iris scan
identification within the next decade.
Multibiometrics
INTEGRATING FACES AND FINGER PRINTS
FOR PERSONAL IDENTIFICATION
An automatic personal identification system based on
fingerprints or faces is often not able to meet the system
performance requirements.

A MULTIMODEL BIOMETRIC SYSTEM USING


FINGERPRINT, FACE AND SPEECH
This system takes the advantage of the capabilities of each
individual biometric. It can be used to overcome some of the
limitations of a single biometrics.
Conclusion
• Biometric tokens are the safest means of preventing
ATM frauds.
• The main reason for introducing biometric systems is
to increase overall security.
• Biometrics offers greater security and convenience than
traditional methods of personal recognition.
• In some applications, biometrics can replace or
supplement the existing technology. In others, it is the
only viable approach.
• The biometric system is only one part of an overall
identification or authentication process, and the other
parts of that process will play an equal role in
determining its effectiveness.
REFERENCES
 Arpita Gopal,Chnadrani singh ,e-world:Emerging
trends in information Technology ,excel publication
,New Delhi(2009)

 James L.Wayaman , Anil K Jain , Davide Maltoni


,and Dario maio,Biometric
systems:Technology,Design and Perfomance
Evalution, Springer.

 Davide Maltoni,Dario Maio,Anil K. Jain,Salil


Prabhakar,Handbook of Fingerprint
Recognition,Springer.

 John Chirillo,Scott Blaul,Implementing Biometric


Security,Wiley Red Books

Вам также может понравиться