Ankit Singh - Report - Ankit Singh
Ankit Singh - Report - Ankit Singh
Submitted by
ANKIT SINGH
(1613101144/16SCSE101472)
of
Bachelor of Technology
IN
Computer Science and Engineering With Specialization of Cloud
Assistant Professor
APRIL/MAY-2020
TABLE OF CONTENTS
1. Abstract 1
2. Introduction 2
3. Existing system 5
4. Proposed system 6
6. Result 16
7. Conclusion/Future Enhancement 18
8. References 19
ABSTRACT
Identification and verification of a person today is a common thing; which may
include door-lock system, safe box and vehicle control or even at accessing bank
accounts via ATM, etc which is necessary for securing personal information. The
conventional methods like ID card verification or signature does not provide
perfection and reliability. The systems employed at these places must be fast enough
and robust too. Use of the ATM (Automatic Teller Machine) which provides
customers with the convenient banknote trading is facing a new challenge to carry on
the valid identity to the customer. Since, in conventional identification methods with
ATM, criminal cases are increasing making financial losses to customers. : The main
purpose of our system to make online transaction more secure and user-friendly. Now
days Biometric technology is increasing rapidly. Biometric is used for personal
identification. Here we are using Fingerprint scanning biometric to provide access to
ATM machine. Data of a fingerprint is stored in database using the enrollment
process through the Bank.
A modern ATM is typically made up of the devices like CPU to control the
user interface and devices related to transaction, Magnetic or Chip card reader to
identify the customer, PIN Pad, Secure crypto-processor generally within a secure
cover, Display to be used by the customer for performing the transaction, Function
key buttons, Record Printer to provide the customer with a record of their transaction,
to store the parts of the machinery requiring restricted access -Vault , Housing for
aesthetics, Sensors and Indicators. Fingerprint technology is the most widely
accepted and mature biometric method.
To implement this concept, we have studied different research works and found
following information. For fingerprint recognition, a system needs to capture
fingerprint and then follow certain algorithm for fingerprint matching. The research
paper discusses a minutiae detection algorithm and showed key parameters of
fingerprint image for identification. For solving the bugs of traditional identification
methods, the author of designs a new ATM terminal customer recognition system.
The chip of S3C2440 is used for the core of microprocessor in ARM9 and an
improved enhancement algorithm of fingerprint image. If images of fingerprint are
poor-quality images, they result in missing features, leading to the degrading
performance of the fingerprint system. Thus, it is very important for a fingerprint
recognition system to estimate the quality and validity of the captured fingerprint
images. Existing approaches for this estimation are either to use of local features of
the image or to use of global features of the image . Traditional fingerprint
recognition approaches have demerits of easy losing rich information and poor
performances due to the complex type of inputs, such as image rotation, poor quality
image enrollment, incomplete input image, and so on. Thus in order to overcome
these shortcomings, in research paper , a new fingerprint recognition scheme based
on a set of assembled invariant moment (geometric moment and Zernike moment)
features to ensure the secure communications is proposed. In paper , fuzzy features
match (FFM) based novel method on a local triangle feature is set to match the
deformed fingerprints. Fingerprint here is represented by the fuzzy feature set: the
local triangle feature set. Fingerprint scanning is one of the type of biometrics system
.We are using finger for accessing the ATM machine for transaction. We are using
this system because its easy to install. We don't have to remove the current ATM
machine. The working process of ATM fingerprint deal with accessing the data from
server.
Before accessing process we need to get authentication from bank. Bank employee
scan fingerprint using biometric machine. Biometric machine extract the feature of
fingerprint and store in to database this complete process is called enrolment process.
When customer want to use the ATM machine with Biometric Scanned first he have
to place his finger at Biometric scanner will scan his feature and compare that
extracted feature with stored Feature, if feature matches than the person is allowed for
transaction otherwise it not process.
EXISTING SYSTEM
ATMs extend traditional banking hours by dispensing cash and making other
transactions available 24 hours a day. At the beginning of 1974, there were only 1,656
operating ATMs. Today, online debit cardholders initiate approximately 12 billion
ATM transactions per year at thousands of ATMs. In modern cash machines, the
customer is identified by inserting a plastic ATM card with a magnetic stripe or a
plastic smart card with a chip that contains a unique card number and some security
information such as an expiration date. Authentication is provided by the customer
entering a personal identification number (PIN) [8-wiki]. PIN is a four digit number
which is generated by the respective financial institution. PIN is very easily
remembered and is also changeable according to the user and PINs are 4-digit numbers
in the range 0000-9999 resulting in 10,000 possible numbers, so that an attacker would
need to guess an average of 5000 times to get the correct . The PIN supplied by the
customer is always compared with the recorded reference PIN in the financial
institutions. In the present system, the user has to insert the card and the PIN number. If
PIN is correct, the system allows for transaction. Otherwise, the system asks for PIN
again and it allows maximum of three times to enter it.
PROPOSED SYSTEM
The proposal is to use fingerprints in ATMs as passwords involved with the PIN
number. Fingerprint recognition will make users relax by preventing unauthorized
account access and assuring security. Here, a fingerprint module generates 4-digit code
as a message to the customer’s assigned mobile number by placing finger on it and on
the basis of validation of this code, customers are allowed for further access.
1. Enrolment phase:
In the robust fingerprint application, 3-4 fingers should be enrolled. This enables the
system to set high security threshold and still be able to cope with everyday real life
issue like skewed finger placement dirty, wet dry, cut or worn fingers. Biometric
reference data is collected enrolment and stored in database or in portable data carrier
such
The Enrolment is crucial because the once recorded reference data will normally be
used over the active lifetime of user or his/her biometric hardware device.
Multiple Finger enrolment: It is strongly recommended enrolling more than one
finger. During daily life injuries can happen that turn a registered fingerprint currently
unusable while minor cuts not affect a robust sized sensor system
2. Authentication Phase
In these phase user can make transaction by using their fingers. User can place finger
on the Biometric scanner
and user’s finger scan can be matched through database, where all authenticated
user’s fingerprints are stored .If User wants to do transaction they simply place their
finger on biometric scanner and get their money in few seconds. If user’s fingerprint
cannot matched by database due to some accidental cuts on their fingers than they
can used their other fingers and we will also provide a 4 pin code option ,user can
also use this option with their convinces.
Feature extraction:
Feature extraction from a fingerprint image is generally categorized into three levels.
Feature can used to categorize into major pattern type such as loop or whorl. The
main objective of this system is to develop a system that will increase the ATM
security. However, despite the numerous advantages of ATM system, ATM fraud has
recently become more widespread. In recent years, biometric authentication has
grown in popularity as a means of personal identification in ATM authentication
systems.
AUTHENTICATION PHASE
IMPLEMENTATION
This software is implemented by the steps as follows: first of all. The system is
initialized to implement specific task, such as checking ATM system, GSM
communication and so on, and then each module reset for ready to run
commands. Before using ATM terminal, the mobile number and fingerprint of
the customer is
The first step was the acquisition of fingerprint image by above device
mentioned in the algorithm, and the results could be sent to the following
process. secondly, pre-processing the images acquired. After obtain the
fingerprint image, it must be pre-processing. Generally, pre-processing of one's
is filtering, histogram computing, image enhancement and image binarization.
Lastly, the characteristic value was extracted, and the results of the above
measures would be compared with the information of owner's fingerprint in the
database so as to verify whether the character is matched, and then the system
returned the results matched or not.
[3] Samir Nanavati, Michael Thieme, and Raj Nanavati, “Biometrics: Identity
Verification in a Networked World”, John Wiley & Sons, 2002.
[6] Peatman, John B., “Design with PIC Microcontrollers”, Pearson Education,
India, 1998.
BONAFIDE CERTIFICATE
Certified that this project. “FINGER PRINT BASED ATM SYSTEM”. Is the
bonafide work of. “ANKIT SINGH(1613101144)” who carried out the project