SlideShare a Scribd company logo
3
The present generation security issue is consider the
basic TCP/IP encryption and the other factor that
are provided by the network . but there was lack
of consistent identification of individual then
the newly develop technology “ BIOMETRIC “
biometric can be defined as recognizing and
identifying a person based on “ physiological “
or” behavioral” characteristic .
Most read
4
o An automated teller machine (ATM) is a computerized
telecommunications device that provides the customers
of a financial institution with access to financial
transactions in a public space without the need for a
human clerk or bank teller.
o In ATMs, the customer is identified by inserting a
plastic ATM card with a magnetic stripe or a plastic
smartcard with a chip, that contains a unique card
number and some security information
Most read
13
AUTHENTICATION
SUBSYSTEM
ENROLMENT
SUBSYSTEM
VERIFICATION
MATCH
IDENTIFICATION
THIS IS SHAHAB
BIOMETRIC
MATCHER
BIOMETRIC
READER
BIOMETRIC
MATCHER
BIOMETRIC
READER
DATABASE
DATABASE
ID
Most read
SHAHABUL ISLAM
B.TECH
C.S.E (6’th SEM)
Guided BY :
Mr. SHAILESH PATEL
COMPUTER SCIENCE & ENGINEERING
o INTRODUCTION
o ATM
o IMAGE PROCESSING
o BIOMETRIC
o HOW IT WORK
o APPLICATION
o ADVANTAGES
o DISADVANTAGES
o CONCLUSION
o REFERENCE
The present generation security issue is consider the
basic TCP/IP encryption and the other factor that
are provided by the network . but there was lack
of consistent identification of individual then
the newly develop technology “ BIOMETRIC “
biometric can be defined as recognizing and
identifying a person based on “ physiological “
or” behavioral” characteristic .
o An automated teller machine (ATM) is a computerized
telecommunications device that provides the customers
of a financial institution with access to financial
transactions in a public space without the need for a
human clerk or bank teller.
o In ATMs, the customer is identified by inserting a
plastic ATM card with a magnetic stripe or a plastic
smartcard with a chip, that contains a unique card
number and some security information
o It is defined in the “real world”, is considered to be
a function of two real variables, for example, a
(X,Y) with a as the amplitude (e.g. brightness) of
the image at the real coordinate position (X,Y).
o An image is considered to contain sub-images
referred to as regions-of-interest
Discretization and representation :
Converting visual information into a discrete form: suitable
for computer processing :to save storage space as well as
time requirement in subsequent processing.
Processing :
Improving image quality by filtering : compressing data to
save storage and channel capacity during transmission.
Analysis:
Extracting image features: qualifying shapes, interpretation and
recognition.
o A biometric is a unique, measurable characteristic of a
human being that can be used to automatically recognize
an individual or verify an individual’s identity.
o Biometrics can measure both physiological and behavioral
characteristics.
o Physiological Biometrics :- This biometrics is based on
measurements and data derived from direct measurement
of a part of the human body.
o Behavioral Biometrics :- this biometrics is based on
measurements and data derived from an action.
PHYSIOLOGICAL
a. Finger-scan
b. Facial Recognition
c. Iris-scan
d. Retina-scan
e. Hand-scan
BEHAVIORAL
a. Voice-scan
b. Signature-scan
c. Keystroke-scan
FACE
PALM VEIN
IRIS
FINGER
DATA COLLECTION
TRANSMISSION
SIGNAL PROCESSING
DATA STORAGE
DICISION
DECISION
FLOW CHART OF A BIOMETRIC SYSTEM
AQUIRED
BIOMATRIC SAMPLE
FEAUTER
EXTRACTION MATCHING
DATABASE
o Facial recognition uses a
software known as facelt ie.
based on ability to recognize
face and measure various
features of face.
o Every face has distinct peaks,
valleys that make up facial
features facelt identifies this
landmarks as nodal points.
o These nodal points are
measured creating a
numerical code called face
print representing face in
database
AUTHENTICATION
SUBSYSTEM
ENROLMENT
SUBSYSTEM
VERIFICATION
MATCH
IDENTIFICATION
THIS IS SHAHAB
BIOMETRIC
MATCHER
BIOMETRIC
READER
BIOMETRIC
MATCHER
BIOMETRIC
READER
DATABASE
DATABASE
ID
o TIME AND ATTENDANCE SYSTEM
o AIRPORTS
o LIBRARIES
o PC ACCESS
o Increase of reliability and identification quality,
while reducing FAR (False Acceptance Rate) error
rates.
o A variety of identifiers that can be used together or
separately.
o Useful for senior citizens and rural people
o Noise: unwanted disturbance(in single
modal system )
o Cost (w.r.t instruments)
o Time Consuming
Biometrics provides a higher level of security ,we thus
develop an ATM model that is more reliable in
providing security by using facial recognition software,
which avoids the various attacks in ATM system and
fraudulent activities are reduced. The chance given for
hackers to make use of fake biometrics to act as an
authorized user is strictly avoided, which makes the
ATM system more secure. But the cost spend to design
and implement this type of system is higher when
compared to the existing ATM system.
o . http ://airccj.org/CSCP/vol2/csit2316.pdf
o http://citeseer.ist.psu.edu/viewdoc/summary
o T. Kanade. Computer Recognition of Human
o Faces
o www.inttlelix.com- Application of face
o recognition
o ehwww.u.es/ ccwintco/uploads/e/ eb /PFC-
IonMarques.pdf
ATM System by image processing
ATM System by image processing

More Related Content

What's hot (20)

Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Voice morphing-
Voice morphing-Voice morphing-
Voice morphing-
Navneet Sharma
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
atinav242
 
Brain gate
Brain gateBrain gate
Brain gate
Mayank Garg
 
EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
Priyad S Naidu
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 
IoT Networking
IoT NetworkingIoT Networking
IoT Networking
Hitesh Mohapatra
 
Eye tracker based HCI
Eye tracker based HCIEye tracker based HCI
Eye tracker based HCI
Saswati
 
Brain Computer Interfaces(BCI)
Brain Computer Interfaces(BCI)Brain Computer Interfaces(BCI)
Brain Computer Interfaces(BCI)
Dr. Uday Saikia
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
Khyravdhy Tannaya
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Diamond chip
Diamond chipDiamond chip
Diamond chip
PRADEEP Cheekatla
 
Exploring the Brain Computer Interface
Exploring the Brain Computer InterfaceExploring the Brain Computer Interface
Exploring the Brain Computer Interface
Jim McKeeth
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
Vikas Kumar
 
138693 28152-brain-chips
138693 28152-brain-chips138693 28152-brain-chips
138693 28152-brain-chips
jitendra k Singh
 
Screenless Display PPT Presentation
Screenless Display PPT PresentationScreenless Display PPT Presentation
Screenless Display PPT Presentation
Sai Mohith
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
atinav242
 
EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
Priyad S Naidu
 
Technical seminar on virtual smart phone
Technical seminar on virtual smart phoneTechnical seminar on virtual smart phone
Technical seminar on virtual smart phone
Akshitha Chutke
 
Eye tracker based HCI
Eye tracker based HCIEye tracker based HCI
Eye tracker based HCI
Saswati
 
Brain Computer Interfaces(BCI)
Brain Computer Interfaces(BCI)Brain Computer Interfaces(BCI)
Brain Computer Interfaces(BCI)
Dr. Uday Saikia
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Ppt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasactionPpt on use of biomatrix in secure e trasaction
Ppt on use of biomatrix in secure e trasaction
Devyani Vaidya
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Exploring the Brain Computer Interface
Exploring the Brain Computer InterfaceExploring the Brain Computer Interface
Exploring the Brain Computer Interface
Jim McKeeth
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
Vikas Kumar
 
Screenless Display PPT Presentation
Screenless Display PPT PresentationScreenless Display PPT Presentation
Screenless Display PPT Presentation
Sai Mohith
 

Similar to ATM System by image processing (20)

4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
J1076975
J1076975J1076975
J1076975
IJERD Editor
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
MdAminulkhan1
 
best face detection technology ppt
best face detection technology pptbest face detection technology ppt
best face detection technology ppt
Dharmendra Prajapat
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
siva23143
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
1A255Gauravwankar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
A86eseminar on biometrics
A86eseminar on biometricsA86eseminar on biometrics
A86eseminar on biometrics
Chill Chaithanya
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
John Williams
 
face-recognition-technology-08012013131029-face-recognition-technology.doc
face-recognition-technology-08012013131029-face-recognition-technology.docface-recognition-technology-08012013131029-face-recognition-technology.doc
face-recognition-technology-08012013131029-face-recognition-technology.doc
AjijahamadKhaji
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
4.report (biometric security system)
4.report (biometric security system)4.report (biometric security system)
4.report (biometric security system)
JIEMS Akkalkuwa
 
Alaa elbeheri research_presentation
Alaa elbeheri research_presentation Alaa elbeheri research_presentation
Alaa elbeheri research_presentation
alaabebe
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
MdAminulkhan1
 
best face detection technology ppt
best face detection technology pptbest face detection technology ppt
best face detection technology ppt
Dharmendra Prajapat
 
Biometrics verification techniques combine
Biometrics verification techniques combineBiometrics verification techniques combine
Biometrics verification techniques combine
siva23143
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
1A255Gauravwankar
 
Biometrics Research/Thesis Paper
Biometrics Research/Thesis PaperBiometrics Research/Thesis Paper
Biometrics Research/Thesis Paper
Sumaiya Ismail
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
face-recognition-technology-08012013131029-face-recognition-technology.doc
face-recognition-technology-08012013131029-face-recognition-technology.docface-recognition-technology-08012013131029-face-recognition-technology.doc
face-recognition-technology-08012013131029-face-recognition-technology.doc
AjijahamadKhaji
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
raihansikdar
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
Fingerprint detection
Fingerprint detectionFingerprint detection
Fingerprint detection
Mudit Mishra
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 

Recently uploaded (20)

Unit 6 Message Digest Message Digest Message Digest
Unit 6  Message Digest  Message Digest  Message DigestUnit 6  Message Digest  Message Digest  Message Digest
Unit 6 Message Digest Message Digest Message Digest
ChatanBawankar
 
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notesBEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
VarshithaP6
 
UNIT-1-PPT-Introduction about Power System Operation and Control
UNIT-1-PPT-Introduction about Power System Operation and ControlUNIT-1-PPT-Introduction about Power System Operation and Control
UNIT-1-PPT-Introduction about Power System Operation and Control
Sridhar191373
 
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
ManiMaran230751
 
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 / HIFLUX Co., Ltd.
 
Department of Environment (DOE) Mix Design with Fly Ash.
Department of Environment (DOE) Mix Design with Fly Ash.Department of Environment (DOE) Mix Design with Fly Ash.
Department of Environment (DOE) Mix Design with Fly Ash.
MdManikurRahman
 
"The Enigmas of the Riemann Hypothesis" by Julio Chai
"The Enigmas of the Riemann Hypothesis" by Julio Chai"The Enigmas of the Riemann Hypothesis" by Julio Chai
"The Enigmas of the Riemann Hypothesis" by Julio Chai
Julio Chai
 
world subdivision.pdf...................
world subdivision.pdf...................world subdivision.pdf...................
world subdivision.pdf...................
bmmederos10
 
1. Mix Design M20 CT.pdf for M20 Grade mix design
1. Mix Design M20 CT.pdf for M20 Grade mix design1. Mix Design M20 CT.pdf for M20 Grade mix design
1. Mix Design M20 CT.pdf for M20 Grade mix design
smghumare
 
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCHUNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
Sridhar191373
 
module 2 - Minerals and Internal Structure of Earth - ERMS.pdf
module 2 - Minerals and Internal Structure of Earth - ERMS.pdfmodule 2 - Minerals and Internal Structure of Earth - ERMS.pdf
module 2 - Minerals and Internal Structure of Earth - ERMS.pdf
shivamkumarsharma441
 
Video Games and Artificial-Realities.pptx
Video Games and Artificial-Realities.pptxVideo Games and Artificial-Realities.pptx
Video Games and Artificial-Realities.pptx
HadiBadri1
 
[HIFLUX] Lok Fitting&Valve Catalog 2025 (Eng)
[HIFLUX] Lok Fitting&Valve Catalog 2025 (Eng)[HIFLUX] Lok Fitting&Valve Catalog 2025 (Eng)
[HIFLUX] Lok Fitting&Valve Catalog 2025 (Eng)
하이플럭스 / HIFLUX Co., Ltd.
 
2. CT M35 Grade Concrete Mix design ppt.pdf
2. CT M35 Grade Concrete Mix design  ppt.pdf2. CT M35 Grade Concrete Mix design  ppt.pdf
2. CT M35 Grade Concrete Mix design ppt.pdf
smghumare
 
Highway Engineering - Pavement materials
Highway Engineering - Pavement materialsHighway Engineering - Pavement materials
Highway Engineering - Pavement materials
AmrutaBhosale9
 
ISO 5011 Air Filter Catalogues .pdf
ISO 5011 Air Filter Catalogues      .pdfISO 5011 Air Filter Catalogues      .pdf
ISO 5011 Air Filter Catalogues .pdf
FILTRATION ENGINEERING & CUNSULTANT
 
Tesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia - A Leader In Her IndustryTesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia
 
ENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdfENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdf
TAMILISAI R
 
Air Filter Flat Sheet Media-Catalouge-Final.pdf
Air Filter Flat Sheet Media-Catalouge-Final.pdfAir Filter Flat Sheet Media-Catalouge-Final.pdf
Air Filter Flat Sheet Media-Catalouge-Final.pdf
FILTRATION ENGINEERING & CUNSULTANT
 
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITSDIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
Sridhar191373
 
Unit 6 Message Digest Message Digest Message Digest
Unit 6  Message Digest  Message Digest  Message DigestUnit 6  Message Digest  Message Digest  Message Digest
Unit 6 Message Digest Message Digest Message Digest
ChatanBawankar
 
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notesBEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
BEC602- Module 3-2-Notes.pdf.Vlsi design and testing notes
VarshithaP6
 
UNIT-1-PPT-Introduction about Power System Operation and Control
UNIT-1-PPT-Introduction about Power System Operation and ControlUNIT-1-PPT-Introduction about Power System Operation and Control
UNIT-1-PPT-Introduction about Power System Operation and Control
Sridhar191373
 
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
Forensic Science – Digital Forensics – Digital Evidence – The Digital Forensi...
ManiMaran230751
 
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 락피팅 카달로그 2025 (Lok Fitting Catalog 2025)
하이플럭스 / HIFLUX Co., Ltd.
 
Department of Environment (DOE) Mix Design with Fly Ash.
Department of Environment (DOE) Mix Design with Fly Ash.Department of Environment (DOE) Mix Design with Fly Ash.
Department of Environment (DOE) Mix Design with Fly Ash.
MdManikurRahman
 
"The Enigmas of the Riemann Hypothesis" by Julio Chai
"The Enigmas of the Riemann Hypothesis" by Julio Chai"The Enigmas of the Riemann Hypothesis" by Julio Chai
"The Enigmas of the Riemann Hypothesis" by Julio Chai
Julio Chai
 
world subdivision.pdf...................
world subdivision.pdf...................world subdivision.pdf...................
world subdivision.pdf...................
bmmederos10
 
1. Mix Design M20 CT.pdf for M20 Grade mix design
1. Mix Design M20 CT.pdf for M20 Grade mix design1. Mix Design M20 CT.pdf for M20 Grade mix design
1. Mix Design M20 CT.pdf for M20 Grade mix design
smghumare
 
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCHUNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
UNIT-4-PPT UNIT COMMITMENT AND ECONOMIC DISPATCH
Sridhar191373
 
module 2 - Minerals and Internal Structure of Earth - ERMS.pdf
module 2 - Minerals and Internal Structure of Earth - ERMS.pdfmodule 2 - Minerals and Internal Structure of Earth - ERMS.pdf
module 2 - Minerals and Internal Structure of Earth - ERMS.pdf
shivamkumarsharma441
 
Video Games and Artificial-Realities.pptx
Video Games and Artificial-Realities.pptxVideo Games and Artificial-Realities.pptx
Video Games and Artificial-Realities.pptx
HadiBadri1
 
2. CT M35 Grade Concrete Mix design ppt.pdf
2. CT M35 Grade Concrete Mix design  ppt.pdf2. CT M35 Grade Concrete Mix design  ppt.pdf
2. CT M35 Grade Concrete Mix design ppt.pdf
smghumare
 
Highway Engineering - Pavement materials
Highway Engineering - Pavement materialsHighway Engineering - Pavement materials
Highway Engineering - Pavement materials
AmrutaBhosale9
 
Tesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia - A Leader In Her IndustryTesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia - A Leader In Her Industry
Tesia Dobrydnia
 
ENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdfENERGY STORING DEVICES-Primary Battery.pdf
ENERGY STORING DEVICES-Primary Battery.pdf
TAMILISAI R
 
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITSDIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
DIGITAL ELECTRONICS: UNIT-III SYNCHRONOUS SEQUENTIAL CIRCUITS
Sridhar191373
 

ATM System by image processing

  • 1. SHAHABUL ISLAM B.TECH C.S.E (6’th SEM) Guided BY : Mr. SHAILESH PATEL COMPUTER SCIENCE & ENGINEERING
  • 2. o INTRODUCTION o ATM o IMAGE PROCESSING o BIOMETRIC o HOW IT WORK o APPLICATION o ADVANTAGES o DISADVANTAGES o CONCLUSION o REFERENCE
  • 3. The present generation security issue is consider the basic TCP/IP encryption and the other factor that are provided by the network . but there was lack of consistent identification of individual then the newly develop technology “ BIOMETRIC “ biometric can be defined as recognizing and identifying a person based on “ physiological “ or” behavioral” characteristic .
  • 4. o An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. o In ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information
  • 5. o It is defined in the “real world”, is considered to be a function of two real variables, for example, a (X,Y) with a as the amplitude (e.g. brightness) of the image at the real coordinate position (X,Y). o An image is considered to contain sub-images referred to as regions-of-interest
  • 6. Discretization and representation : Converting visual information into a discrete form: suitable for computer processing :to save storage space as well as time requirement in subsequent processing. Processing : Improving image quality by filtering : compressing data to save storage and channel capacity during transmission. Analysis: Extracting image features: qualifying shapes, interpretation and recognition.
  • 7. o A biometric is a unique, measurable characteristic of a human being that can be used to automatically recognize an individual or verify an individual’s identity. o Biometrics can measure both physiological and behavioral characteristics. o Physiological Biometrics :- This biometrics is based on measurements and data derived from direct measurement of a part of the human body. o Behavioral Biometrics :- this biometrics is based on measurements and data derived from an action.
  • 8. PHYSIOLOGICAL a. Finger-scan b. Facial Recognition c. Iris-scan d. Retina-scan e. Hand-scan BEHAVIORAL a. Voice-scan b. Signature-scan c. Keystroke-scan
  • 11. DECISION FLOW CHART OF A BIOMETRIC SYSTEM AQUIRED BIOMATRIC SAMPLE FEAUTER EXTRACTION MATCHING DATABASE
  • 12. o Facial recognition uses a software known as facelt ie. based on ability to recognize face and measure various features of face. o Every face has distinct peaks, valleys that make up facial features facelt identifies this landmarks as nodal points. o These nodal points are measured creating a numerical code called face print representing face in database
  • 14. o TIME AND ATTENDANCE SYSTEM o AIRPORTS o LIBRARIES o PC ACCESS
  • 15. o Increase of reliability and identification quality, while reducing FAR (False Acceptance Rate) error rates. o A variety of identifiers that can be used together or separately. o Useful for senior citizens and rural people
  • 16. o Noise: unwanted disturbance(in single modal system ) o Cost (w.r.t instruments) o Time Consuming
  • 17. Biometrics provides a higher level of security ,we thus develop an ATM model that is more reliable in providing security by using facial recognition software, which avoids the various attacks in ATM system and fraudulent activities are reduced. The chance given for hackers to make use of fake biometrics to act as an authorized user is strictly avoided, which makes the ATM system more secure. But the cost spend to design and implement this type of system is higher when compared to the existing ATM system.
  • 18. o . http ://airccj.org/CSCP/vol2/csit2316.pdf o http://citeseer.ist.psu.edu/viewdoc/summary o T. Kanade. Computer Recognition of Human o Faces o www.inttlelix.com- Application of face o recognition o ehwww.u.es/ ccwintco/uploads/e/ eb /PFC- IonMarques.pdf