Third Generation ATM Using Face Recognition
Third Generation ATM Using Face Recognition
ISSN No:-2456-2165
Abstract:- Automated teller machines (ATMs) are well Transaction is used because each customer has
acknowledged devices stereotypically used by folks to cart unique fingerprints. So this system provides more secure
out a variability of personal and business economic transaction than GSM. Face recognition method is also used
transactions and banking tasks. ATMs have become very for security in which face is recognized from 3 angles for
popular with the general public for their availability and authentication purpose.
general user friendliness. ATMs are now originate in many
positions having a systematic or high volume of consumer Also, security is enhanced & facial recognition
movement. For example, ATMs are typically found in features. In this system, current face image matched with
restaurants, supermarkets, Convenience stores, malls, stored image and after matching the images correctly, request
schools, gas stations, hotels, work locations, banking will be send to registered number user have to enter the
centers, airports, entertainment establishments, webpage request number for completing transaction. There are
transportation facilities and a myriad of other locations. many systems available for securing transactions, but there is
ATMs are typically available to consumers on a continuous no particular system to secure ATM machine. So there is a
basis such that consumers have the ability to carry out necessity to implement a system which monitors and control
their ATM financial transactions and/or banking functions the room where ATM machines are placed. The design of
at any time of the day and on any day of the week. This proposed system is divided into two parts. The first consists of
based on the facial recognition and also the multilevel a fingerprints reader placed at the entrance of ATM machine
security system based to work this entire concept. Here, we used to identify the user is authorized. The second part
have some PHP support to analyze the person authorized consists of Raspberry Pi module which is placed inside ATM
identification. centre for capturing real-time
video and controlling purpose.
Keywords:- Automated Teller Machine; Face Recognition;
Security; Performance.
II. LITERATURE SURVEY
I. INTRODUCTION A. Design and Implementation ATM Alarm Data Analysis
Nowadays, banking sector is one of the most System
important parts of a human day to day life. Banking facilities Nowadays, people pursuit of fast and convenient way
are widely used by people for their economies activities. of life, fast and convenient service of ATM is made for people
Automatic Teller Machine (ATM) is an electronic machine to avoid waiting in line at the bank for a long time. In order to
which is used for accessing a bank account from anywhere serve people conveniently, it is need to monitor the ATM
without the help of bank staff. The user can perform several equipment to guarantee its normal operation, and deal with the
banking activities like cash withdrawal, money transfer with unexpected problems in time. Therefore, this paper builds a
the help of ATM. It is observed that the number of crimes cloud platform for alarm service, does some alarm analysis,
related to ATM is increased hence there is a necessity to which appears at different times in different locations of the
provide enhances security to ATM machine. Previous ATM machine. This can provide better service for ATM users.
technologies provides security to transactions for identification This system is called ATM Alarm Data Analysis System.
of authorized user. But this is limited for secure transactions
with ATM machine. Previous works focused on biometric B. Data Driven Analytics forAutomated Cell Outage
technique to provide enhanced security to ATM transaction Detection in Self Organizing Networks
whereas GSM based technique is also implemented for the In this paper, we address the challenge of
same purpose. Whereas, some system uses a combination of autonomous cell outage detection (COD) in Self-Organizing
the both techniques. Currently, ATM security is given to the Networks (SON). COD is a pre-requisite to trigger fully
transactions only. GSM based security is provided in which automated self-healing recovery actions following cell outages
One Time Password (WEBPAGE REQUEST) is send to or network failures. A special case of cell outage, referred to
registered number for transaction. The combination of GSM as Sleeping Cell (SC) remains particularly challenging to
and RFID technology is also used which makes the system detect in state-of-the-art SON, since it triggers no alarms for
secure than only RFID technology. This technology has Operation and Maintenance (O&M) entity. Consequently, no
drawback so, biometric technology is introduced for ATM SON compensation function can be launched unless site visits
transaction. In biometric method fingerprint and face or drive tests are performed, or complaints are received by
recognition system are used for ATM transaction. Fingerprint affected customers.
recognition system for ATM
G. Raspberry Pi
The Raspberry Pi is a acclaim card sized single-board
computer with an open-source platform that has a blooming
community of its own, parallel to that of the acoustic. It can be
used in numerous types of projects from novices perception
how to code to design home automation systems. There are a
few versions of the Raspberry Pi, but the latest version, has
improved upon its predecessor in terms of both form and
functionality. The Raspberry Pi Model B features:
More GPIO
More USB
Micro SD
Lower power consumption
Better audio
Neater form factor