Sie sind auf Seite 1von 14

GROUP ASSIGNMENT

CT098-3-2-RMCT

Research Method for Computing and Technology

NP2F1701IT
HAND OUT DATE: 31 AUGUST 2017

HAND IN DATE : 17 November 2017

WEIGHTAGE: 100%

INSTRUCTIONS TO CANDIDATES
1. Submit your assignment to the administration counter.
2. Students are advised to underpin their answers with the use of references (sites using the
Harvard Name System of Referencing)
3. Late submission will be awarded zero (0) unless Extenuating Circumstances (EC) are upheld
4. Cases of plagiarism will be penalized
5. The assignment should be bound in an appropriate style (Comb Bound or Stapled)
6. Where the assignment should be submitted in both hardcopy and softcopy, the softcopy of the
written assignment and source code (where appropriate) should be on a CD in an envelope/ CD
cover and attached to the hardcopy.
7. You must obtain 50% overall to pass this module

1
INDIVIDUAL ASSIGNMENT
LORD BUDDHA EDUCATION FOUNDATION

CT098-3-2-RMCT

Research Method for Computing and Technology

NP2F1701IT

Submitted By:

Name: KIRAN THAPA

Student ID: NP000034

Submitted To: Dipesh Khanal

2
Table of Contents
1. Introduction..............................................................................................................................2

2. Problem Statement...................................................................................................................3

3. Problem Background...............................................................................................................3

4. Project Aims and Objective.....................................................................................................5

Aims.............................................................................................................................................5

Objectives....................................................................................................................................5

5. Research Question...................................................................................................................6

Domain Research Questions:.......................................................................................................6

User question:..........................................................................................................................6

Researcher questions:..............................................................................................................6

Technical Questions.................................................................................................................6

6. Research Design......................................................................................................................6

Past Projects and Innovations......................................................................................................7

7. Conclusion...............................................................................................................................9

8. References..............................................................................................................................10

9. MARKING CRITERIA.........................................................................................................11

1
1. Introduction
The rise of technology bring into force loads of types of tools that aspire at more customer
pleasure. ATM is a machine which made money transactions effortless for customers. But it has
both advantages and disadvantages. Current ATMs make use of naught more than an access card
and PIN for uniqueness confirmation. This has ATM Using Face Recognition System that
demonstrate the way to a lot of fake attempt and mistreatment through card theft, PIN theft,
stealing and hacking of customer’s account details and other part of security. This is an ATM
with facial recognition system, all we need is walk to the ATM, its digital camera is on 24hours a
day, and its computer will automatically initiate a face recognition procedure, whenever the
computer detects a human face in camera obtains a picture user’s face, the computer compares
the image of user face to the images of registered customers in its database .If user’s face (as
seen by the ATMs camera) matches the picture of the in the database then the users are
automatically recognized by the machine. It provides a cordless, password-free way to get
money out of an ATM. A system can examine just the eyes, or the eyes nose and mouth, or ears,
nose, mouth and eyebrows, and so on.

One of the main objective of this system is to protect customers and other financial
institutions from ATM fraud and to reduce illegal ATM business. [ CITATION Int14 \l
1033 ]

The advantages of facial recognition over pin based system are:

 Deliver a practical and workable solution that addresses the requirements of the
regulatory authorities.
 Limit the financial risks given that they were forced to take responsibility for
financial loss
 Provide a framework that still allowed for high withdrawal limits to cater for the
demands of a cash-focused customer base
 Increase customer satisfaction [ CITATION Aru13 \l 1033 ]

2
2. Problem Statement
The development of technology has brought many positive changes in the IT industry. Official
works and many other activities can be done anywhere anytime. One of the advantage is ATM
through which money transactions can be done anytime. But there illegal and unauthorized
access and hacking of other ATM’s PIN number and access number is increasing day by day.
The major discovered problems regarding ATM security are mentioned below:

 Unsafe use unsecured ATM


 Easy access to unauthorized customer
 Illegal hacking of pin
 ATM frauds
 Use of duplicate ATM cards
 Inability to trace frauds, and illegal users

3. Problem Background
ATMs have brought so much relief to the financial world. Various problems are solved with the
use of these machines ranging from keeping the banking hall free of traffic with its attendant
issues. With the growing sector of banking, everyone is using ATM machines as these machines
are located in different places and the customer can access his account anytime anywhere. A
customer holding a bank account can access the account from ATM systems by getting a PIN or
password confidentially. By scratching the ATM card into the machine and entering PIN
number, one can easily perform transaction, transfer money, etc.[ CITATION Bad13 \l 1033 ].
PIN number is a crucial aspect used to secure information of customer’s account, thus should not
be shared with others. However, as man begins to realize the gains of technology brought about
by this machine to supplement human tellers, little did one know that the joy shall be short lived
by the various sharp practices leading to financial losses. As banks are losing, so are the
customers [ CITATION Knu07 \l 1033 ]. News Media are filled with various forms of
complaints on how users are losing money to fraudsters [ CITATION Raj15 \l 1033 ]. Some
have vowed never to come near usage of various cards – debit, credit or prepaid– local or
international. The problem may even go as deep as engaging in legal battle between banks and
their customers. The well-known cybercrime gang dubbed Buhtrap, which stole 1.8 billion
rubles ($28 million) from Russian banks from August 2015 to January 2016, because the two
3
groups use similar tools and techniques. This is one example of ATM attacks. Such attacks are
rapidly increasing because in ATM transactions. Another attack follows two ATM hacks in July:
$2.5 million was stolen from Taiwan’s First Bank and $350,000 from Thailand’s state-run
Government Savings Bank. (Finkle, 2016).

The above given examples are some of the big ATM attacks lately. Most of the studies and
research regarding cyber-attacks today are based on illegal ATM pin hacking to unauthorized
card access. (Sackett, January 1997) Literature Review

The literature of behavioral studies on ATMs has mainly focused on adoption and diffusion of
technology, impact of technology adoption from customers‟ perspective, suppliers‟ perspective,
and bankers‟ perspective. Security Experts says that Automatic Teller Machine (ATM) in future
will have biometric authentication techniques to verify identities of customer during transaction.
In South America, there are companies that have introduced fingerprint technology as an
embedded part of ATM systems, where citizens have already started using fingerprint in place of
PIN or Password for general identification with their ID cards. [ CITATION Gre11 \l 1033 ]
Said- “Banks will move to smart cards and biometric will be next step as fingerprint verification
and face identification technique. Bank has already been moved to smart cards and now is the
time to implement biometric authentication approach in ATM systems. Nowadays, there are
devices to perform biometric identification and authentication of following: fingerprint, hand,
retina, iris, face, and voice. Rowley says, “Most insecure is a magnetic stripe with a PIN, more
secure is a smart card with a PIN, also secure is a smart card with biometrics and even more
secure is ATM security with facial recognition. Most of the countries are still lacking in
implementing facial recognition with smart card as a safety approach. Various ideas are given by
researchers for biometric and facial authentication including- fingerprint, iris and retina, voice,
etc. Fingerprint approach for identification given by [CITATION Oko12 \l 1033 ]not proved
efficient as when citizen will move to ATM system, fingers may become dirty from natural
environment and will not be able to access his account with ATM system, since fingerprints will
not match from the one that was traced during identification. Secondly, an iris and retina
approach proposed by [ CITATION Bho12 \l 1033 ]as an identification method, but citizens
might not want a laser beamed into their eyes for retina scan at every time he wants to access
account through ATM. Thus, iris and retina as identification authentication proved inefficient.

4
Vibration detector sensors were also proposed as a security system for ATM machines
by[CITATION Aja13 \l 1033 ]. Voice was also proposed for security in ATM systems as a
biometric with smart card[ CITATION Ojh11 \l 1033 ]. The cons were there at the same time as
two citizens can have same voice and one can easily hack and can fraud with another’s account.
Thus, this project came with an idea of face recognition technique with 3 different angles as a
biometric authentication that cannot be lost, stolen, harmful, dirty, copied, forgotten and is
always available. Thus, biometric device is ultimate attempt in trying to prove whoever the user
is [ CITATION TSU15 \l 1033 ].

4. Project Aims and Objective


The ATM security Research was done with the following aims and objectives.

Aims
• To protect customers and other financial institutions from ATM fraud.

• To reduce illegal ATM business

• More reliable in providing ATM security by using facial recognition software.

• Reduce in Illegal transactions of money

• Increase the efficiency of ATM Machines

Objectives
The objective of this research are:-

 To reduce crimes related to Illegal ATM transactions


 To protect customer ATM banking's from fraud
 To improve financial transactions in banking sectors

5
5. Research Question
There are a lists of questionnaires prepared during the time of survey and interview. These are
the question to be asked direct to people on the basis of research design methods. The questions
are listed below:

Domain Research Questions:


User question:
1. What type of software will be used in Facial recognition system?
2. Will this system more or less secured than available Security systems?

Researcher questions:
1. Are you satisfied with the ATMs you use? (Security based)
2. How do you compare your ATM service with other bank’s service?
3. What do you think of Facial Recognition system in ATMs?

Technical Questions
1. When do you require ATMs mostly?
2. Do you know about ATM attacks and Security system?
3. What security systems can be deployed in ATMs?
4. Which biometric system do you use currently?

6. Research Design
The major purpose of this research is to implement facial recognition system for all the financial
transactions in banks. There are many process involved for designing this project. The different
kind of data collection technique are as follows:-

 Interviews
 Questionnaires and Surveys, various journals
 Observations
 Past projects and innovations

6
 Documents and Records

This is the primary stage of the research. Without the above data collection methods the
project was impossible. Overviewing the past projects and innovations is best on the data
collection mechanism for ATM security. [ CITATION Jyo11 \l 1033 ]

Past Projects and Innovations


The research on ATM Security is done using various methodologies. Among all the methods
used, past projects and innovations is used most in obtaining the information and completion of
this project. This method has been used as it provides all the basic requirements and necessary
information for ATM security. For the proposed system i.e. Facial recognition for ATM
Security, many biometric systems, voice systems and other known systems were developed and
implemented already in the late 20’s. But the efficient and reliable system difficult to develop
and the software price was so high. Thus, these systems came to use only in limited areas and
people.

Most of the biometric systems were previously developed which also work out in the facial
recognition system. So, combining the techniques and gathering other information, this system
was proposed. Face Recognition is a biometric scan technology. Face Recognition includes face
scan system that can range from a high-resolution camera, workstations, and software and back-
end processors. Face scan technology is used to analyze and capture facial characteristics such as
distance between eyes, mouth or nose, and face cut of person. The ATM system will consist of
embedded camera in machine that will recognize the face standing about 2 feet far in front of
system and perform matches against the facial database. The system will usually come to a
decision in less than 5 seconds. It is very important that the face is at proper distance from
camera or system, at proper angle and lighting is appropriate, otherwise distance from camera
will reduce facial size and thus resolution of image. Facial-scan technology has unique
advantage, over all other biometrics in the area of surveilling large groups and the ability to use
pre-existing static image

7
Fig showing working of facial-recognition

Qualitative data analysis is used for analyzing the collected data. In this research, interviews,
surveys and questionnaires and past projects and innovations were used. Data analysis is going to
involve identifying common patterns within the responses and critically analyzing them in order
to achieve research aims and objectives. This analysis is done by identifying the patterns,
techniques, primary and secondary data comparisons and other process. And last method used
for qualitative data analysis is summarizing the data. In this last stage we need to link research
findings to hypotheses or research aim and objectives. When writing data analysis we can use
noteworthy quotations from the transcript in order to highlight major themes within findings and
possible contradictions [ CITATION Tha10 \l 1033 ].

8
Gantt chart used for developing the project

7. Conclusion
As we all know, these days most of the ATM has been attacked by the robberies. Also gradual
increases the theft of ATM after the year by year. This project demonstrates how an automation
of “ATM THEFT” prevention from robbery or theft can be implemented using facial recognition
in ATM Machines center. By implementing this project we can catch thief and robberies’ in
ATM itself and also we can save our precious time.

Also from the above proposed conceptual model, it has been concluded that Facial recognition
ATM systems is highly secure as it provides authentication with the information of body part i.e.,
face recognition from different angles. A camera based in ATM machine will detect the pattern
in second and compare it with one store in a central computer. A sensor system examines the
randomly facial recognition as unique as a fingerprint

9
8. References
Anon., december 2014. International Journal of Scientific and Research Publications. Face
Recognition Technique: Enhanced Safety Approach, 4(12), p. 6.

Aru, O. E. I. G., 2013. American Journal of Engineering Research (AJER). Facial Verification
Technology for Use In Atm Transactions, 2(5).

Badal Bhat, V. V. J., 11-12 april 2013. Theft prevention ATM model using dormant monitoring
for transactions. Tamil Nadu, India, IEEE.

Bhavnani, R., 2015. ATM MAchine , s.l.: www.Quora.com.

Bhosale S. and Sawant B, 2012 . Iris and retina identification, 4(6), p. 23.

Finkle, J., 2016. Hackers target ATMs across Europe as cyber threat grows. Cyber Criminals.

Knut M. Tande, k. j. H., 2007 . ATM System. IEEE Security & Privacy (, 5(6).

Kumar, A. M. A. B., 2013. ATM security System. vibration detector, Volume 2.

Niranjan, J., 2011. ATM Security detection. Literature review on ATM security from key
stakeholders, 5(6), p. 23.

Omkar, O., 2011. Voice security. biometric voice security, 4(6), p. 8.

Oruh, O. S. a., 2012. Fingerprint aproach. s.l., IEEE.

Rowley, G., 2011. Atm security proposol, USA: s.n.

Sackett, G. C., January 1997. ATM and Multiprotocol Networking. 2nd ed. s.l.:s.n.

Surendar, T., 2010. transactions, Ney York: s.n.

T. SUGANYA, T. N., 2015. International Journal of Scientific Research Engineering &


Technology. SECURING ATM BY IMAGE PROCESSING – FACIAL, 4(8), p. 4.

10
9. MARKING CRITERIA
The research proposal will be evaluated in 3 main sections:

Problem Definition (Forum 1) 15%


Criteria Marks Allocated
Title, Aims and Objectives 5%
Problem Statement & Preliminary Research 5%
Presentation 5%

Research Proposal Report 70%


Criteria Marks Allocated
Final Problem Background Research and Discussion 10%
Literature Review 20%
Research Questions 5%
Research Design 10%
Personal Reflection 10%
Documentation Standards 5%
Referencing 10%

Presentation of Proposal 15%


Criteria Marks Allocated
Explanation & Justification of proposal 5%
Q&A 5%
Presentation 5%

Student Name Work Allocation Signature


KIRAN THAPA 100%
(NP000034)

11
12