Preview

secure atm by using image processing

Good Essays
Open Document
Open Document
1267 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
secure atm by using image processing
SECURE ATM BY IMAGE PROCESSING
-AN ADVANCED APPLICATION OF IMAGE PROCESSING &BIOMETRICS

GRANDHI VARALAKSHMI VENKATARAO INSTITUTE OF TECHNOLOGY
BHIMAVARAM
PRESENTED BY:
D.L.PRATHYUSHA
10JH1A0412
IV E.C.E
REGISTRATION ID:0130072354
Email:prathyusha.dasika@gmail.com

ABSTRACT:
There is an urgent need for improving security in banking region. With the advent of atm though banking became a lot easier it become a lot vunerable .
The chances of misuse of this much hyped insecure baby product (atm) are manifold due to the exponention growth of intelligent criminals day by day
INTRODUCTION:
This paper process an atm insecurity model that would combine a physical access card, apin and electronic facial recognition
It encloses the information regarding the image processing . and discussed one of the major application of image processing in biometrics . bio metrics technology turns your body into your password. We discussed various biometric techniques like finger scan ,retina scan , facial scan , hand scan etc..
Face recognition technology may solve the problem since a face is undeniably connected to its owner making impenetrable system
AUTOMATED TELLER MACHINE(ATM):
An auto mated teller machine (ATM) is a computerized tel communications device that provides the customer4s of a finantial transcations in public space with out the need of a human clerk
On most modern ATMs, the customer is identified by interesting of a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information , such as an expiratiom date or cvv. Security is provided by the customer entering a personal identification number(PIN)
PROPOSAL:
Cameras in use at automatic teller machines should take stil images of users
A facial recognition scheme should be added to the software used to verify the users at ATMs
This scheme should match a picture of user at the ATM with a picture of the account

You May Also Find These Documents Helpful

  • Better Essays

    Biometric scanners should be used for all sensitive areas as a second method to prevent card cloning . Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors will be issued a Personal Identity Verification…

    • 1902 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Use Cases

    • 1184 Words
    • 5 Pages

    In this use case the basic flow of events consists of the following: (1) the use case begins when bank customer inserts their bank card; (2) Use Case: Validate User is performed; (3) The ATM displays the different alternatives that are available on this unit. In this case the Bank Customer always selects “Withdraw Cash”; (4) the ATM prompts for an account; (5) the bank customer selects an account; (6) the ATM prompts for an amount: (7) the bank customer enters an amount;(8) card id, pin, amount and account is sent to Bank as a transaction. The Bank Consortium replies with a go/no go reply telling if the transaction is ok; (9) then money is dispensed; (10) the bank card is returned; (11) the receipt is printed; and finally (12) the use case ends successfully.…

    • 1184 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Bis/220 It Acts Paper

    • 590 Words
    • 3 Pages

    The increasing popularity of online shopping, automated teller machines (ATMs), online banking, point-of-sale terminals, telephone bill payments, and many other monetary devices that use the internet created major security issues. The threat of identity theft, stolen banking information, and other personal information was cause for major concern. With these threats looming, the Electronic Fund Transfer Act (EFTA) was created to protect people who were entering a new age of technology. This act protects people while using access devices. According to The Federal Reserve (2008), an “Access device is a card, code, or other means of access to a consumer’s account or a combination used by the consumer to initiate EFTs. Access devised include debit cards, personal…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometric systems are technologies that can scan physiological, chemical or behavioral characteristics of a subject for the sake of verifying or in other words authenticating their identity. It is the latest weapon in the fight against computer crime and identity theft. These technologies work with the help of sampling distinctive biological features, such as tracing patterns of blood vessels in the retina, voice recognition or fingerprinting. Later biological features are extracted and then converted into mathematical codes which are then stored as a biometric template. In order to confirm the identity of the user, they will be required to interact with the system scanner which will process the users identitywith the help of an iris or fingerprint scan. This sample is then compared with the template for a positive match and therefore, access is either granted or denied accordingly.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Atm Case

    • 964 Words
    • 4 Pages

    ("ADT Code of Conduct," 2013, Chapter 3) Billions of dollars have been stolen from hardworking citizens over the past few years without much of a outcry from the general public. If someone broke into a house and stole thousands of dollars and terrified the family living there then they would be front page news on every major local news channel. The money stolen from ATMs is insured thru the Federal Deposit Insurance Corporation (FDIC) so much of the monies are recovered and no face to face contact between criminal and victim ever occurs. ("Consumer Protection," 2013, p. 12) Maybe to failing economy over the past few years and the opinions the public has of the banks as a result of their treatment of families who could no longer afford their mortgage. Many fell that we paid in the taxes that bailed out the banks so that they could reposes the American dream and pull the foundation from in under so many. So does the public view the billions of dollars stolen each year from ATM’s differently since the banks and FICA must…

    • 964 Words
    • 4 Pages
    Good Essays
  • Good Essays

    There is a massive disagreement in the present day concerning the biometric identification technology which is used to boost the security through travel. The research inside these technologies has been used to extend ways in how the individuals identify faces for detection and develop the similar strategy in a replicated mechanical system that will scan faces and conclude their likeness with those in a database.…

    • 990 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Facial Recognition software has been used in many atmospheres to assist in security. There has been controversy as to wither or not facial recognition is an accurate tool. The software has been in existence for many years but still can be defeated by criminals, terrorists, and even by citizens in general without malice.…

    • 3118 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Fingerprint Identification

    • 4430 Words
    • 18 Pages

    When compared with the conventional authentication methods that are based on “what only the person possesses” or “what only the person knows”, biometrics authentication offers two distinctive advantages:…

    • 4430 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Technology is on an up rise, as is the act of terrorism and other various crimes. Countries such as the United States are taking many precautions to prevent these heinous crimes. One prevention technique that the United States has started using is facial recognition. The freedictionary.com website defines facial recognition as: "biometric identification by scanning a person 's face and matching it against a library of known faces," (The Free Dictionary, 2012) "they used face recognition to spot known terrorists." This paper will help one understand what facial recognition is, who uses facial recognition, and when they use it. This paper will take a look into a couple of cases where facial recognition has been used. Also, it will look into the controversies that happen with the of the facial recognition software. Facial recognition may not be on the top tier of criminal investigations, but it certainly has come a long way since its inception.…

    • 2694 Words
    • 11 Pages
    Better Essays