Sie sind auf Seite 1von 5

Embedded systems 7842522786/9948887244/9346934699

RECOGNITION TECHNIQUE FOR ATM BASED ON IRIS


TECHNOLOGY

AIM:
The main aim of this project is to giving high security while transactions in the ATMS.

PURPOSE:
The project entitled Recognition Technique for ATM based on IRIS Technology is
the one which is designed to develop a system by which the authentication is being provided by
making use of one RFID Technology and IRIS Recognition technology.

Email: info@purpletechnosolutions.com

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

BLOCK DIAGRAM:

LCD

POWER
SUPPLY

(ARM7
RFID
READER

TDMI)

KEYS

LPC2148
BUZZER

Micro
WEBC
AM

PC

Controller

DESCRIPTION:
In this project initially the users will enroll their eye images that will be saved in the data
base using webcam. In this project initially the user is made to show a RFID tag to the reader. If
it is a valid one then the user have to enter the correct password, if the user will entered the
wrong password it will not moves the next step and the buzzer will be on, if the password
accessing is continuously failed for three times means then process will move to the initial
condition i.e. RFID tag showing step. If the user will entered the correct password then controller
Email: info@purpletechnosolutions.com

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

asks for IRIS identification process. In the IRIS identification the person who ever want access
that particular accessories or things first he/she has to place his eye in front of the PC camera at
that time it will capture the image of eye and to access various options of ATM like mini
statement, balance enquiry, withdrawal etc. again taking the eye image of same person and
comparing with previous eye image in that same way we can access some others with matching
or compare of eye image and this whole process will done with the help of mat lab code. If it
matches then he or she will access to that Particular option of the ATM with switches or keys
and the process goes on. If captured image does not matched with first taken image then the
controller gives a halt to the process and moves to the initial step. Nevertheless, if RFID tag is an
invalid card then the controller stops the whole process.

TECHNOLOGY:
RFID:
RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a
means of identifying a person or object using a radio frequency transmission. In other words
RFID is an electronic method of exchanging data over radio frequency waves. The technology
can be used to identify, track, sort or detect a wide variety of objects.
There are three major components of an RFID system: the reader, the antenna, and the tags. Each
tag is associated with a unique number. When a tag is in the detection range of the reader, the
number is read. Two types of tags can be found: active tags with a longer detection range and
passive tags with a shorter detection range. An RFID tag is usually attached to an object and the
information of the object along with the RFID number are recorded in the database. Whenever
the RFID tag is sensed, the object can thus be identified.

IRIS
The Human Iris: The iris is a thin circular diaphragm, which lies between the cornea and the
lens of the human eye. A front-on view of the iris is shown in Figure below. The iris is

Email: info@purpletechnosolutions.com

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

perforated close to its centre by a circular aperture known as the pupil. The function of the iris is
to control the amount of light entering through the pupil, and this is done by the sphincter and the
dilator muscles, which adjust the size of the pupil. The average diameter of the iris is 12 mm, and
the pupil size can vary from 10% to 80% of the iris diameter.
The iris consists of a number of layers; the lowest is the epithelium layer, which
contains dense pigmentation cells. The stromal layer lies above the epithelium layer, and
contains blood vessels, pigment cells and the two iris muscles. The density of stromal
pigmentation determines the color of the iris. The externally visible surface of the multi-layered
iris contains two zones, which often differ in color. An outer ciliary zone and an inner pupillary
zone, and these two zones are divided by the collarette which appears as a zigzag pattern. The
iris is an externally visible, yet protected organ whose unique epigenetic pattern remains stable
throughout adult life. These characteristics make it very attractive for use as a biometric for
identifying individuals. Image processing techniques can be employed to extract the unique iris
pattern from a digitized image of the eye, and encode it into a biometric template, which can be
stored in a database. This biometric template contains an objective mathematical representation
of the unique information stored in the iris, and allows comparisons to be made between
templates. When a subject wishes to be identified by iris recognition system, their eye is first
photographed, and then a template created for their iris region. This template is then compared
with the other templates stored in a database until either a matching template is found and the
subject is identified, or no match is found and the subject remains unidentified.

SOFTWARE:
1. Embedded C
2. Keil IDE
3. Uc-Flash

HARDWARE:
1. Micro Controller (ARM 7)
2. RFID reader
Email: info@purpletechnosolutions.com

www.purpletechnosolutions.com

9030880909/101/202/505/606

Embedded systems 7842522786/9948887244/9346934699

3. Power supply
5. LCD
6. PC
7. WEB CAM
8. BUZZER

RESULT:
A step by step approach in designing the secured approach for authentication system
using fingerprint and iris identification giving security to the users banking system and providing
the security for the locker system using Iris..
The system has successfully overcome some of the aspects existing with the present
technologies, by the use of iris Biometric as the authentication Technology.

Email: info@purpletechnosolutions.com

www.purpletechnosolutions.com

9030880909/101/202/505/606

Das könnte Ihnen auch gefallen