Sie sind auf Seite 1von 21

AN ATM WITH

AN EYE
Computer Science 3rd Year
Mohammad Ali Jauhar University
Rampur

PRESENTED
BY:

MOHD AMAN PA
1

Outline

INTRODUCTION

NEED OF SECURITY

SOLUTION- An ATM with an Eye

TECHNIQUES

HOW IT WORKS

FUNCTION

CONCLUSION

ACKNOWLEDGEMENT

BIBLIOGRAPHY

INTRODUCTION
ATM stands for
Automated Teller
Machine
First modern ATM was
introduced in 1969 by
Chemical Bank, New York
ATM customers spend an
average of 20-40% more
than non-ATM
customers.
3

HOW IT WORKS

NEED OF AN
EYE

The chances of misuse of this much hyped 'insecure' baby


product (ATM) are manifold due to the exponential
growth of 'intelligent' criminals day by day.

There is an urgent need for improving security in banking


region. With the advent of ATM though banking became a
lot easier it even became a lot vulnerable.
Provide a cordless, password-free way to get their money
out of an ATM.

SOLUTION
BIOMETRIC IDENTIFICATION TECHNIQUES
Finger Printing
Retina Scanning
Facial Recognition
Iris Recognition

FINGER PRINTING
Fingerprint scanning system will be used along with
the traditional PIN system to curb ATM fraud.
With the fingerprint required to complete the
transaction, a fraudster will not be further able to
access the accounts after trapping the card details.
Fingerprint is the one unique thing fraudster cannot
steal from a banks customer.
After scanning the fingerprint it will match with the
data which was already submitted into the bank
database.
9

RETINA SCANNING
Developed in 1980s, most well-known yet less
deployed techniques.
It maps the unique pattern of persons retina.
Performed by casting an unperceived beam of lowenergy infrared light into persons eye.
Beam of light traces a standardized path on retina.
Specialized software then complies the unique
features into a template.
Highly dependable, accurate and difficult to spoof.
But difficult image acquisition, less users, and
discomfort to the users are some disadvantages.

10

FACIAL RECOGNITION
By forcing the ATM match a
live image of a customers face
with an image stored in a bank
database (associated with the
account number) when the
data matches(account image and
stored

image)

user

be

considered fully verified


A system can examine just the
eyes, or the eyes nose and mouth,
or

ears,

nose,

mouth

and

eyebrows, and so on.


11

Camera Installation On ATM


Machine

12

Camera Snapshots
Portrait camera

Cash slot(Dispenser) camera

13

IRIS RECOGNITION
A camera based in ash machine will
Detect the pattern in second
Compare it with one store in a central computer.
Or encode on to the cash card.
A sensor system examines the randomly
Formed features of the iris of the eye
as unique as a fingerprint.

14

Function

15/03/11

15
15

Iris code generation

16

Steps Of Iris Working

17

Where It Would Be Used

The development of such a system would


serve to protect consumers
financial institutions alike from fraud
other breaches of security.
18

Conclusion
We Thus Develop An ATM Model That Is

More reliable in providing security by using facial recognition


software.

By keeping the time elapsed in the verification process to a


negligible amount

Try to maintain the efficiency of this ATM system

19

ACKNOWLEDGEMENT

20

?
?
S
E
I
R
E
U
Q
21