Sie sind auf Seite 1von 9

Project proposal for DST & Texas

Instruments Inc. India Innovation


Challenge Design Contest 2018
Anchored by NSRCEL, IIM Bangalore
ATM Security with Illusion Pin using Raspberry
Pi

Sri Krishna College of Engineering and Technology


Name College ID UG/PG Course/Branch Semester
Supraja 17euec155 UG ECE 3
Arasu T
Samprita R V 17euec126 UG ECE 3
Srinithi K 17euec152 UG ECE 3
Subhashini B 17euec154 UG ECE 3
Karthika S EC18211
(Mentor)

Mandatory Supporting Document

Project Abstract:
Personal Identification Number (PIN) is a sequence of digits that confirms
the identity of a person when it is successfully presented. The maturity of PIN
authentication is a result of its continuous usage for years in a wide range of
everyday life applications, like mobile phones and banking systems. Illusion PIN
uses the technique of hybrid images to blend two keypads with different digit
orderings in such a way, that the user who is close to the device is seeing one
keypad to enter her PIN, while the attacker who is looking at the device from a
bigger distance is seeing only the other keypad.
To overcome the shoulder-surfing attacks on authentication schemes by
proposing Illusion PIN (IPIN) that operates by system keypad. The user’s
keypad is shuffled in every authentication attempt since the attacker may
memorize the spatial arrangement of the pressed digits. We have proposed the
new Smart Surveillance System using Raspberry Pi and Image Processing.
This system will serve as smart security module for monitoring. Traditional
surveillance systems only record the activities based on motion, but this system
serves the purpose of facial recognition so as to reduce the error caused due
to motion detection.
To avoid the anonymous activities in ATM centres, web camera is fixed
to capture the activities and if any illegal activities occur inside the ATM centres
automatically capture image are transferred to particular mobile number by
using cloud system.

Team Members – Roles & Responsibilities


S.No. Student Role (Choose one of the Justification
Member following – Marketing,
Name Technical, Operations &
Other Roles as
applicable)
1 Supraja Arasu T Marketing
2 Samprita R V Technical
3 Srinithi K Other roles as applicable
4 Subhasini B Operations
5 Karthika S Faculty Mentor

Market Analysis
A. Customer Need Identification

Nowadays more ATM thefts are increased due to high usage of ATMs among
people. Thefts are occurred due to unsecured PIN while typing. Authentication
schemes which are not resilient to observation are vulnerable to shoulder-
surfing. Shoulder-surfing is a big threat for PIN authentication. Easy for an
attacker to follow the PIN authentication process.

B. Serviceable Addressable Market (SAM) Identification & Justification


i) Identifying and alarming the criminal by template matching method. ii) Alarming
system when person enter inside an ATM with helmet, or masking the face with
kerchief or any such elements image. iii) By using Illusion pin technique the PIN
number will be more secured. iv) Alarming when prolonged usage of ATM i.e.
above 20 minutes.
C. Product Differentiation w.r.t. Competition & Justification

Sivakumar, Gajjila Ashok , “Design and Implementation of Security Based ATM


Theft Monitoring System”.
This paper deals with prevention of ATM theft from robbery’s overcome the drawback
found in existing technology in our society. When ever robbery occurs, Vibration
sensor is used here which senses vibration produced from ATM machine. This system
uses ARM controller based embedded system to process real time data collected
using the vibration sensor. Once the vibration is sensed the beep sound will occur
from the buzzer. DC Motor is used for closing the door of ATM. Stepper motor is used
to leak the gas inside the ATM to bring the thief into unconscious stage. Camera is
always in processing and sending video continuous to the PC and it will be saved in
computer. RTC used to capture the robber occur time and send the robbery occur time
with the message to the nearby police station and corresponding bank through the
GSM. Hear LCD display board using showing the output of the message continuously.
This will prevent the robbery and the person involving in robbery can be easily caught.
Here, Keil tools are used to implement the idea. keil tools is used for run the DC motor
and stepper motor for automatic door lock and also leak the gas inside the ATM.
Raj M , Anitha Julian, “Design and Implementation of Anti Theft ATM Machine
using Embedded System”.
The ATM center goes to the danger zone .the present day monitoring system is most
popular which turn to encourages the fraud ,crime & unknown activities in ATM centre.
This is high-time for the government and banking sector to join hands to weed out this
adversity in security system. so it becomes essential to strictly monitor the do’s and
don’ts inside the ATM centre, very specifically the facial recognition is considered to
authenticate the entry of any individual inside the ATM centre, it is achieved by
employing identifier technique. As an additional features, a combinational biometry
system is used to access the ATM machine .The entire security module is combine
with an easily detect the unknown activity and vibration sensor cum alarm, which alerts
the nearest police station as well as the bank security wing ,ensuring immediate
defense to the victims including strong physically challenged people .this overall
system proves to be an autonomous ,continuous and secured surveillance system.

Sathana G, Robert Singh A, “Remote Theft Identification using Raspberry Pi


System based on Motion Detection”.
This paper would make just right use of latest technology that situated on Embedded
Linux board particularly Raspberry Pi and Smartphone android utility. This paper
proposed the method that works on GPS/GPRS/GSM SIM900A Module which entails
all of the three matters specifically GPS GPRS GSM. The GPS present vicinity of the
vehicle; GPRS for sending alert message to vehicle’sowner cellular. The method
approaches situation inside the vehicle whose position is to be determined on the
internet web page and monitored at actual time and evaluation between the current
vehicle route and already designated route into the file method of raspberry pi. Right
here within the proposed approach the already particular direction throughout the
raspberry pi’s file procedure taken from vehicleowner’s android smartphone using
android utility. Means the determination of route from place A to B takes position from
car owner’s android application which gives extra safety and secures touring to the
visitor. Henceforth the driver drives the vehicle only on the vehicle owner’s specified
path. If the driver drives the vehicle on the wrong path then the alert message will be
sent from the system to the vehicle’s owner mobile and also speakers alert driven
using Raspberry pi’s audio jack.
Yathiraj GR, Santosh VG, “A Smart User Interface to Prevent Shoulder Surfing
Attack Using Color Code”.
Classical PIN entry mechanism is broadly used for authenticating a user. It is a popular
scheme because it properly balances the usability and safety aspects of a organism.
However ,if this scheme is to be used in a public system then the design might endure
since accept surfing attack. In this attack, an unauthorized user can completely or
partially watch the login session .Even the activities of the login gathering can be
recorded which the attacker can use it soon after to get the actual PIN. this paper
suggested an intelligent user interface, known as Colour Pass to oppose the accept
surfing attack so that any authentic user can enter the session PIN without disclosing
the authentic PIN. The Colour Pass is based on a partially noticeable attacker model.
The experimental analysis shows that the Colour Pass interface is secure and simple
to use even for novice users. 5
Divya J , " Automatic Video Based Surveillance System for Abnormal Behavio
Detection ".
Security and surveillance are important issues in today’s world. Any behaviour which
is uncommon in occurrence and deviates from normally understood behaviour can be
termed as suspicious. The aim of this model is automatic detection of abnormal
behaviour in surveillance videos and create a system for the recognition of human
activity and behaviours, and extract new information of interest for end-users in highly
secured indoor surveillance system. The objective for about paper is to design a model
for detection of abandoned objects and track abnormal human behaviours. The multi-
object detection is done by background subtraction with the help of appropriate model
and then recognizing the person using HOG feature and SVM classifier. Face of a
detected person can be captured using Viola–Jones algorithm. Finally, anomaly
detection is done for tracking persons based on their individual appearance using
Mean Shift Technique. For change detection, Mean-ratio and Log Ratio operators are
used.

D. Understanding of your customer & user:


• To avoid the anonymous activities in ATM centres, web camera is fixed to
capture the activities and transferred to nearby police station. Shuffled pins are
included to be used by cardholders. If web camera send the captured image to
police station at the condition of same images are recorded frequently.
• This proposed project is to develop a system which will control the theft in
ATM centres and minimize the illegal activities.

E, Distribution Channel Identification


The system proposed for our project is explained in the following subdivisions.
FACE RECOGNITION
In the proposed system, the system is implemented to overcome this problem. It is
used to only monitor the user activity and store when the irrelevant activity is performed
the user. So it reduces the storage device. In this system first set the time for each
activity in the ATM. When the user enters and the camera detects the user, then it
starts the time of the particular event. The user finish the activity within the time the
camera only monitors the user. It start recording only when the user take the over time
compare to set time. It training the all irrelevant actions to the system. The recorded
video is first converted to the frames and it tracks or extract the edges (region of the
object) by using canny edge detection algorithm. After that, it constructs the feature
vectors from the extracted objects. It intimates the alarm or message to the
corresponded authority and nearest police station when the current actions are similar
to the abnormal behaviors.

ILLUSION PIN
Shoulder-surfing is a big threat for PIN authentication in particular, because it is
relatively easy for an observer to follow the PIN authentication process. PINs are short
and require just a small numeric keypad instead of the usual alphanumeric keyboard.
In addition, PIN authentication is often performed in crowded places, e.g., when
someone is unlocking her mobile phone on the street or in the subway. Shoulder-
surfing is facilitated in such scenarios since it is easier for an attacker to stand close
to the user while escaping her attention. Illusion PIN is a PIN-based authentication
scheme for touch screen devices which offers shoulder-surfing resistance. The design
of Illusion PIN is based on the simple observation that the user is always viewing the
screen of her device from a smaller distance than a shoulder-surfer. Based on this,
the core idea of Illusion PIN is to make the keypad on the touch screen to be
interpreted with a different digit ordering when the viewing distance is adequately
large. This way, when the shoulder surfer is standing far enough, he is viewing the
keypad as being different from the one that the user is utilizing for her authentication,
and consequently he is unable to extract the user’s PIN. IPIN uses the technique of
hybrid images to blend two keypads with different digit orderings in such a way, that
the user who is close to the device is seeing one keypad to enter her PIN, while the
attacker who is looking at the device from a bigger distance is seeing only the other
keypad. To overcome shoulder-surfing attacks on authentication schemes by
proposing Illusion PIN,a PIN-based authentication method that operates on touch
screen devices. Also, the keypad is shuffled in every authentication attempt to avoid
disclosing the spatial distribution of the pressed digits. We create the keypad of Illusion
PIN with the method of hybrid images and we call it a hybrid keypad.

Proposed Design
A. Objective
The objectives are
• To avoid the anonymous activities in ATM centres, web camera is fixed to
capture the activities and transferred to nearby police station. Shuffled pins are
included to be used by cardholders. If web camera send the captured image to
police station at the condition of same images are recorded frequently.
• This proposed project is to develop a system which will control the theft in
ATM centres and minimize the illegal activities.

B. Proposed Solution

System Architecture of illusion pin


Flow diagram of illusion pin

Activity diagram of illusion pin


Flow chart of face recognition
C. Component Used

HARDWARE REQUIREMENTS

ILLUSION PIN
Processor : Dual core processor 2.6.0 GHZ

RAM : 1GB
Hard disk : 160 GB
Compact Disk : 650 Mbs
Keyboard : Standard keyboard
Monitor : 15 inch color monitor

INTERNET OF THINGS(IOT)
Raspberry pi model 3b
Web camera

SOFTWARE REQUIREMENTS
ILLUSION PIN
Operating System : Windows OS
Front End : JAVA
IDE : NetBeans
Back End : SQL SERVER
FACE RECOGNITION
Operating System : Windows OS 7
Front End : Python
IDE : Pycharm
Back End : MySQL

Link to the Part Number (link all How is it being


the parts to their respective their used in the
Category TI Part Number respective product page on the TI proposed Available in TI
Qty
( IC/EVM) website) solution? Explain E Store ( Y/N)
its
role/functionality

The TI MSP family ofYes ,its available


ultra-low-power in TI store.
microcontrollers
Part http://m.ti.com/product/MSP430A consists of several
IC 2MSP430AFE222 FE222 1 devices featuring
(ACTIVE) 16-bit different sets of
peripherals targeted for
Ultra-Low-Power various applications.
Microcontroller, The architecture,
4KB Flash, 256B combined with five
RAM, 2x SD24 low-power modes, is
optimized to achieve
extended battery life in
portable measurement
applications. The
device features a
powerful 16-bit RISC
CPU, 16-bit registers,
and constant
generators that
contribute to maximum
code efficiency.

How is it being used in the proposed solution? Explain


Non - TI Parts
its role/functionality
Web Camera Training a neural network is incredibly compute intensive, and takes days
of processing time even on a server (but you don't have to use a neural
network for every image recognition task).
Python Python is designed with features to facilitate data analysis and
visualization.so its being used in our project
Matlab 2018 MATLAB is a high-performance language for technical computing. It
integrates computation, visualization, and programming in an easy-to-use
environment where problems and solutions are expressed in familiar
mathematical notation. Typical uses include: Application development,
including Graphical User Interface building.
Memory Card It is used to download software and other advanced applications in order to
make the project with good storage standard