Tower of honai - PowerPoint PPT Presentation

About This Presentation
Title:

Tower of honai

Description:

Pdf report document – PowerPoint PPT presentation

Number of Views:3
Slides: 23
Provided by: Yokesh892001
Category: Other
Tags:

less

Transcript and Presenter's Notes

Title: Tower of honai


1
BIOMETRIC ATM SECURITY SYSTEM
MISBAN A S LECTURER IN ECE MGM PTC TECHNOLOGICAL
CAMPUS KILIMANOOR
PRESENTED BY SARATH S REG NO1720129
2
CONTENTS
1)INTRODUCTION 2)RELEVANCE 3)WORKING
4)APPLICATIONS 5)FUTURE ENHANCEMENT
6)CONCLUSION 7)REFERENCES
3
INTRODUCTION
  • Biometrics refers to the automatic identification
    of a person based on his physiological/behavioral
    characteristics.
  • Various types of biometric systems are being used
    for real time identification most popular are
    based on face recognition and finger print
    matching.
  • Most of the ATM in the past have been using ID
    cards to identify users but with the wide
    acceptance of Biometrics ,a new generation of
    Biometrics ATM are being deployed for wide range
    of applications worldwide.
  • Biometrics based authentication is a potential
    candidate to replace password-based
    authentication.

4
Issues in current ATM networks
  • ATM Card frauds
  • Use of ATM card duplicators
  • Card sharing by family and friends
  • Inability to trace the wrongful users
  • ATM PINs can be shared on phone or recorded using
    secret cameras

5
Biometric ATMs solve these issues offer
  • Single/Multi factor Biometric Authentication
    Fingerprint,
  • Iris, Face.
  • Multifactor Authentication Card PIN
    Biometrics
  • Online or offline Authentication using smart
    cards
  • Card less Authentication
  • Biometrics is combination of card or PIN

6
Typology of identification methods
7
How Biometric works?
  • Biometric systems work by recording and
    comparing biometric
  • characteristics.
  • When an individual first uses a biometric system
    , their identifying
  • features are enrolled as a reference for future
    comparison.This reference may be stored in a
    central database or on a card(or both) depending
    on the needs of the application.
  • When biometric recognition is required ,the
    individuals biometric characteristics are
    recorded again.This time however,the identifying
    features are compared by the system with the
    stored reference to determine if there is a close
    match

8
Biometric System
9
(No Transcript)
10
FINGER PRINT
  • A fingerprint scanner system has two basic jobs
  • It needs to get an image of your finger.
  • It needs to determine whether the pattern of
    ridges and valleys in this image matches the
    pattern of ridges and valleys in pre-scanned
    images.
  • Only specific characteristics, which are unique
    to every fingerprint, are filtered and saved as
    an encrypted biometric key or mathematical
    representation.

11
(No Transcript)
12
Identification
  • A one to many comparison of the captured
    biometric against a biometric database in
    attempt to identify an unknown individual.

Verification
  • A one to one comparison of a captured
    biometric with a stored template to verify that
    the individual is who he claims to be.
  • Verification is faster and performs better.
  • In a verification,the user must first enter his
    or her identify to the biometric system.User IDs
    can be forgotten and cards can be lost, making
    access impossible.

13
(No Transcript)
14
Applications of Biometric ATM
  • Banking Finance
  • Food coupons / Tickets / Canteen ATM
  • Membership Verification ATM
  • Transaction / Check Deposit ATM
  • Self Service ATM
  • Retail ATM

15
ADVANTAGES
  • While a criminal might be able to obtain a
    password illegally,getting a users fingerprint
    would be much more complicated.
  • In addition ,contrary to traditional ID cards or
    badges , you cant actually lose physical
    features , making maintenance more cost
    efficient for the business or organization,and
    the technology more convenient for users.

16
DISADVANTAGES
  • Biometric ATMs are traditionally more expensive
    to buy than traditional ones.
  • Biometric identification machines are not always
    entirely accurate.For example ,an individual with
    a cold may not be able to identify himself using
    a voice identification device,and people who gain
    or lose weight may suddenly lose access to a
    place protected by a system analyzing facial
    features

17
ATMs of the Future
  • Todays biometric scanners go far beyond basic
    fingerprint recognition.
  • In Poland and Japan, consumers are already using
    Hitachi's infrared scanners that capture the
    unique pattern of capillaries in the finger and
    hand.
  • The most secure biometric technology uses a
    device designed to perform an iris scan based on
    more than 2,000 unique measurement points.
  • According to developers, people and pets all over
    the world will be connected to a system that uses
    iris scan identification within the next decade.

18
Multibiometrics
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION An automatic personal
identification system based on fingerprints or
faces is often not able to meet the system
performance requirements. A MULTIMODEL
BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND
SPEECH This system takes the advantage of the
capabilities of each individual biometric. It can
be used to overcome some of the limitations of a
single biometrics.
19
Conclusion
  • Biometric tokens are the safest means of
    preventing ATM frauds.
  • The main reason for introducing biometric systems
    is to increase overall security.
  • Biometrics offers greater security and
    convenience than traditional methods of personal
    recognition.
  • In some applications, biometrics can replace or
    supplement the existing technology. In others, it
    is the only viable approach.
  • The biometric system is only one part of an
    overall identification or authentication process,
    and the other parts of that process will play an
    equal role in determining its effectiveness.

20
REFERENCES
  • Arpita Gopal,Chnadrani singh ,e-worldEmerging
    trends in information Technology ,excel
    publication ,New Delhi(2009)
  • James L.Wayaman , Anil K Jain , Davide Maltoni
    ,and Dario maio,Biometric systemsTechnology,Desig
    n and Perfomance Evalution, Springer.
  • Davide Maltoni,Dario Maio,Anil K. Jain,Salil
    Prabhakar,Handbook of Fingerprint
    Recognition,Springer.
  • John Chirillo,Scott Blaul,Implementing Biometric
    Security,Wiley Red Books

21
(No Transcript)
22
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com