Enchanced Security ATM Transaction Using Iris, Fingerprint, OTP Authentication

Melinda Don Seemanthy, Albertian Institute Of Science Technology ; Aleena Mary Varghese ,Albertian Institute Of Science Technology; Rakesh T K ,Albertian Institute Of Science Technology; Aravind Menon ,Albertian Institute Of Science Technology; Sebin Jose ,Albertian Institute Of Science Technology

Biometrics, Fingerprint Matching, Image Quality, Iris Recognition

ATMs, they're a valuable extension of financial institution, and are viewed by customers as an essential part of consumer banking. Always available, always ready to provide a variety of transactions. Criminal acts against ATMs and their customers have always been a top concern. Additional surveillance cameras, electronic locks and other physical controls have been added to make the ATM a secure place for banking transactions. Over the past few years, criminals use skimming of device that captures the magnetic stripe and keypad information from ATM machines, gas pumps and retail and restaurant checkout devices. They are easily accessible skimming technology available off the Internet. This technology tool are hard to spot. Thus to overcome this attack we use the concept of biometric system. The accuracy of biometrics in identification is increasing its usage extensively. The method proposed in this paper focuses on how the money transaction in an ATM machine will be secured by providing personal identification, by analyzing biometrics like fingerprints and iris patterns which are known for their steadiness and diversity. Use of biometrics provides a paperless banking environment along with the smart ATM access. In this system the samples of the fingerprint and iris along with the registered mobile number of the customer needs to be collected and saved in the database by the banker .The actual operation of the system begins when the customer accesses the ATM to make a money transaction. The fingerprint or iris samples will be captured and matched. The system will distinguish between the real legitimate trait and fake self manufactured synthetic or reconstructed samples by comparing it with the samples saved in the database during enrollment. After finding valid samples the system generates a 6 digit code which is received by the customer on his/her registered mobile number.
    [1] Mrs.S.P.Balwir,Ms.K.Katole,Mr.R.D.Thakare,Mr.N.S.Pa nchbudhe,Mr. P.K.Balwir,"Secured ATM transaction system using micro-controller”, International Journal of Advanced Research in computer science and software engineering, Vol.4,Issue 4,April 2014. [2] Mohsin Karovaliya, Saifali Karedia, Sharad Oza, Dr.D.R.Kalbande, “Enhanced Security for ATM machine with OTP and facial recognition features”,International Conference on Advanced Computing Technologies and Applications (ICATA-2015). [3] Javier Galbally, Sebastien Marcel and Julian Fierrez, “Image Quality Assessment for Fake Biometric detection Application to Iris, Fingerprint and Face recognition”, IEEE trans.on image processing, vol. 23,No.2 February 2014. [4] Kriti Sharma, Hinanshu Monga, “Efficient Biometric Iris Recognition Using Hough Transform with Secret Key”, International Journal of Advanced Research in Computer Science and Software Engineering.Vol.4,Issue 7, July 2014 [5] D.Shelkar Goud,Ishaq Md,P.J.Saritha, “A Secured Approach for Authentication system using fingerprint and iris”, Global journal of Advanced Engineering Technology,Vol,Issue3-2012. [6] Khatmode Ranjit P, Kulkarni Ramchandra V, “ARM7 Based Smart ATM Acess and Security System Using Fingerprint Recognition and GSM Technology”, International Journal of Emerging Technology and Advanced Engineering Vol.4, Issue 2,Feb. 2014. [7] Hong, L., Wan, Y., Jain, and A.K.: Fingerprint Image Enhancement: Algorithms and Performance Evaluation. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8 (1998) 777−789. [8] Lam, L., Lee, S.W., Suen, C.Y.Thinning Methodologies A Comprehensive Survey. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 14, no. 9 (1992) 869−885. [9] R.P. Wildes (1997). “Iris Recognition: An Emerging Biometric Technology”, Proceedings of the IEEE, vol.85, pp.1348-1363 [10] L.Ma, Y. Wang, and T. Tan (2002). “Iris recognition using circular symmetric filters”, International Conference on Pattern Recognition, vol.2, pp.414-417. [11] D. Field (1987). “Relations between the statistics of natural images and the response properties of cortical cells”, Journal of the Optical Society of America. [12] P. Yao, J. Li, X. Ye, Z. Zhuang, and B. Li (2006). “Iris Recognition Algorithm Using Modified Log-Gabor Filters”, Proceedings of the 18th International Conference on Pattern Recognition. [13] J. Daugman (2004). “How iris recognition works”, IEEETrans. CSVT, vol. 14, no. 1, pp. 21 – 30. [14] A.Arul Lawrence Selvakumar, C.Suresh Ganandhas.” The Evaluation Report of SHA-256 Crypt Analysis Hash Function”2009 International Conference on Communication Software and Networks.
Paper ID: GRDCF013061
Published in: Conference : National Conference on Emerging Research Trend in Electrical and Electronics Engineering (ERTE’19)
Page(s): 280 - 287