Title: Tower of honai
1BIOMETRIC ATM SECURITY SYSTEM
MISBAN A S LECTURER IN ECE MGM PTC TECHNOLOGICAL
CAMPUS KILIMANOOR
PRESENTED BY SARATH S REG NO1720129
2CONTENTS
1)INTRODUCTION 2)RELEVANCE 3)WORKING
4)APPLICATIONS 5)FUTURE ENHANCEMENT
6)CONCLUSION 7)REFERENCES
3INTRODUCTION
- Biometrics refers to the automatic identification
of a person based on his physiological/behavioral
characteristics. - Various types of biometric systems are being used
for real time identification most popular are
based on face recognition and finger print
matching. - Most of the ATM in the past have been using ID
cards to identify users but with the wide
acceptance of Biometrics ,a new generation of
Biometrics ATM are being deployed for wide range
of applications worldwide. - Biometrics based authentication is a potential
candidate to replace password-based
authentication.
4Issues in current ATM networks
- ATM Card frauds
-
- Use of ATM card duplicators
-
- Card sharing by family and friends
-
- Inability to trace the wrongful users
-
- ATM PINs can be shared on phone or recorded using
secret cameras
5Biometric ATMs solve these issues offer
- Single/Multi factor Biometric Authentication
Fingerprint, - Iris, Face.
-
- Multifactor Authentication Card PIN
Biometrics -
- Online or offline Authentication using smart
cards -
- Card less Authentication
-
- Biometrics is combination of card or PIN
6Typology of identification methods
7How Biometric works?
- Biometric systems work by recording and
comparing biometric - characteristics.
-
- When an individual first uses a biometric system
, their identifying - features are enrolled as a reference for future
comparison.This reference may be stored in a
central database or on a card(or both) depending
on the needs of the application. -
- When biometric recognition is required ,the
individuals biometric characteristics are
recorded again.This time however,the identifying
features are compared by the system with the
stored reference to determine if there is a close
match -
-
8Biometric System
9(No Transcript)
10FINGER PRINT
- A fingerprint scanner system has two basic jobs
-
- It needs to get an image of your finger.
-
- It needs to determine whether the pattern of
ridges and valleys in this image matches the
pattern of ridges and valleys in pre-scanned
images. -
- Only specific characteristics, which are unique
to every fingerprint, are filtered and saved as
an encrypted biometric key or mathematical
representation. -
-
11(No Transcript)
12Identification
- A one to many comparison of the captured
biometric against a biometric database in
attempt to identify an unknown individual.
Verification
- A one to one comparison of a captured
biometric with a stored template to verify that
the individual is who he claims to be. -
- Verification is faster and performs better.
-
- In a verification,the user must first enter his
or her identify to the biometric system.User IDs
can be forgotten and cards can be lost, making
access impossible.
13(No Transcript)
14Applications of Biometric ATM
- Banking Finance
-
- Food coupons / Tickets / Canteen ATM
-
- Membership Verification ATM
-
- Transaction / Check Deposit ATM
-
- Self Service ATM
-
- Retail ATM
-
15ADVANTAGES
- While a criminal might be able to obtain a
password illegally,getting a users fingerprint
would be much more complicated. -
- In addition ,contrary to traditional ID cards or
badges , you cant actually lose physical
features , making maintenance more cost
efficient for the business or organization,and
the technology more convenient for users.
16DISADVANTAGES
- Biometric ATMs are traditionally more expensive
to buy than traditional ones. -
- Biometric identification machines are not always
entirely accurate.For example ,an individual with
a cold may not be able to identify himself using
a voice identification device,and people who gain
or lose weight may suddenly lose access to a
place protected by a system analyzing facial
features
17ATMs of the Future
- Todays biometric scanners go far beyond basic
fingerprint recognition. - In Poland and Japan, consumers are already using
Hitachi's infrared scanners that capture the
unique pattern of capillaries in the finger and
hand. - The most secure biometric technology uses a
device designed to perform an iris scan based on
more than 2,000 unique measurement points. - According to developers, people and pets all over
the world will be connected to a system that uses
iris scan identification within the next decade.
18Multibiometrics
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION An automatic personal
identification system based on fingerprints or
faces is often not able to meet the system
performance requirements. A MULTIMODEL
BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND
SPEECH This system takes the advantage of the
capabilities of each individual biometric. It can
be used to overcome some of the limitations of a
single biometrics.
19Conclusion
- Biometric tokens are the safest means of
preventing ATM frauds. - The main reason for introducing biometric systems
is to increase overall security. - Biometrics offers greater security and
convenience than traditional methods of personal
recognition. - In some applications, biometrics can replace or
supplement the existing technology. In others, it
is the only viable approach. - The biometric system is only one part of an
overall identification or authentication process,
and the other parts of that process will play an
equal role in determining its effectiveness.
20REFERENCES
- Arpita Gopal,Chnadrani singh ,e-worldEmerging
trends in information Technology ,excel
publication ,New Delhi(2009) -
- James L.Wayaman , Anil K Jain , Davide Maltoni
,and Dario maio,Biometric systemsTechnology,Desig
n and Perfomance Evalution, Springer. -
- Davide Maltoni,Dario Maio,Anil K. Jain,Salil
Prabhakar,Handbook of Fingerprint
Recognition,Springer. -
- John Chirillo,Scott Blaul,Implementing Biometric
Security,Wiley Red Books
21(No Transcript)
22(No Transcript)