We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5
e-ISSN: 2582-5208
International Research Journal of Modernization in Engineering Technology and Science
( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:05/May-2022 Impact Factor- 6.752 www.irjmets.com
ATM SECURITY SYSTEM WITH IRIS RECOGNITION
Joans R*1, Priyadharshini K*2, Iswarya AM*3, Swetha R*4, Dr. P. Gokulakrishnan*5 *1,2,3,4Students-Department Of CSE-PSNA, Dindigul, India. *5Head Of Department-Department Of CSE-PSNA, Dindigul, India. ABSTRACT One of the most important security feature for user safety. It was proven that using PIN with card cannot have high security and obtain by the criminals. ATM security system provide multiple points of protection against physical and electronic theft from ATM machines. IRIS recognition is a biometric modality that compares the unique characteristics and patterns of the colored part of the eye to verify and authenticate an individual’s identity. The Existing system has biometric techniques like face recognition, fingerprint etc., Proposed system is to develop an ATM security system with iris recognition. The objective of the project is the iris recognition for authentication process which enhance the security of ATM. It provides more security in ATM and the system is proposed to avoid various types of criminal activities and unauthorized access. It is believed that ATM security system with iris recognition will be useful for the society. Keywords: Artificial Intelligence, Iris Recognition, Biometrics, Authentication, Security, Image Processing. I. INTRODUCTION Automated Teller Machines, popularly referred to as ATMs, are one of the most useful advancements in the banking sector. ATMs allow banking customers to avail quick self-serviced transactions, such as cash withdrawal, deposit, and fund transfers. ATMs enable individuals to make banking transactions without the help of an actual teller. Also, customers can avail banking services without having to visit a bank branch. Most ATM transactions can be availed with the use of a debit or credit card. There are some transactions that need no debit or credit card. A biometric system provides automatic recognition of an individual based on some sort of unique feature or characteristic possessed by the individual. Biometric systems have been developed based on fingerprints, facial features, handwriting and the iris is presented in this paper. Iris recognition is an automated method of biometric identification that uses mathematical pattern recognition techniques on video images of one or both of the irises of an individual’s eyes, whose complex patterns are unique, stable, and can be seen from some distance. Every individual is recognized by a set of features unique to that individual. II. LITERATURE SURVEY PIN: The user has to insert the card and the PIN number. If the PIN is correct, the system allows for transaction. Otherwise, the system asks for the PIN again and it allows maximum of three times to enter it. After 3 trials the ATM card will get blocked. To reactivate the card user need to visit the bank and do the bank formalities, which is tedious and time consuming job. Fingerprint: Fingerprint based ATM is a desktop application where fingerprint of the user is used as a authentication. The fingerprint minutiae features are different for each human being so the user can be identified uniquely. Instead of using card PIN number, fingerprint based ATM is safe but harder to scan fingerprint due to age factor and also fake fingerprints are used. Face Recognition: Face recognition analyzes the characteristics of a person’s face. Access is permitted only if a match is found. The process works when a user faces a digital video camera, usually standing about two feet from it, where the overall facial structure, including distances between eyes, nose, mouth, and jaw edges are measured. Its not more safe, if someone wears user’s face as a mask and can’t recognize different face expressions. III. PROBLEM STATEMENT In modern world, numerous people are dependent on computers for keeping major record of data. Data are transferred in a cost-effective manner across wide area. Today, many people have PIN’s and password for operating multiple devices like car, mobile phone, ATM. Using PIN’s without extra security may pose a treat and www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [2741] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:05/May-2022 Impact Factor- 6.752 www.irjmets.com difficulty to customers like usability, memorability and security. ATM Fraudulence occurring in the society has become very common nowadays. Skimming and Trapping of the ATM devices have been designed by many Burglars. Unauthorized usage of ATM cards by person other than the owner. Thus, there is a dire need for development of such system which would serve to protect the consumers from fraud and other breaches of security. IV. EXISTING SYSTEM Existing ATM authentication method is the use of password-PINs and OTP.QR cash withdrawals were enabled so customers could ditch their ATM cards and simply scan a QR-code on ATMs using the QR app to withdraw cash. ATM security system architecture that incorporates both the finger print and GSM technology into the existing PIN-based authentication process. V. PROPOSED SYSTEM Proposed System : This project proposes an automatic teller machine security model that would be a card less transaction with iris recognition. When the captured image match with stored Aadhar linked Iris, user do the transaction. When the captured image don't match with stored Aadhar linked Iris, user have access using Account Identification Number with OTP. FLOWCHART OF THE PROPOSED SYSTEM
VI. FEASABILITY STUDY
This report examines the feasibility of using biometrics as a means of establishing a unique identity, to support of a proposed system. During system analysis the feasibility study of the proposed system is to be carried out. The purpose of the study is to assess the feasibility of eye recognition technology for those applications, to identify unknowns and the risks associated with the use of biometric in such a national identity scheme. Three Key considerations involved in the feasibility analysis are, Economical Feasibility Technical Feasibility Social Feasibility www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science [2742] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:05/May-2022 Impact Factor- 6.752 www.irjmets.com VII. MODULES AND METHODOLOGIES 1. ATM SIMULATOR ATM Simulator is a Next Generation testing application for XFS-based ATMs (also known as Advanced Function or Open-Architecture ATMs).ATM Simulator is a web technology to allow ATM testing with a virtualized version of any ATM.ATM Simulator uses virtualization to provide with realistic ATM simulation, coupled with automation for faster, more efficient testing for iris authentication and unknown iris Forwarder Technique. 2. IRIS RECOGNITION MODULE This module begins by linking Aadhar card Biometrics while creation of bank Accounts. DCNN algorithms were also created to automatically detect and reject improper iris images during the enrollment process. After capturing the iris image from the ATM Camera, the image is given to iris detection module. This module detects the image regions which are likely to be human. After the iris detection using Region Proposal Network (RPN), iris image is given as input to the feature extraction module to find the key features that will be used for classification. The module composes a very short feature vector that is well enough to represent the iris image. Here, it is done with DCNN with the help of a pattern classifier, the extracted features of iris image are compared with the ones stored in the iris database. The iris image is then classified as either known or unknown. If the image iris is known, corresponding user is identified and proceed further. 3. ACCOUNT ID WITH OTP CREATION MODULE When the iris image is then classified as Unknown it displays another option as Use Account Identity Number. Once entered Account Identity Number user receive OTP which is of 6-digit. User gets three chances to enter the code. If the code is entered incorrectly in three consecutive attempts account gets temporarily blocked and notification is sent to registered mobile number. 4. TRANSACTION MODULE After Authentication, you have to enter your withdrawal amount and press enter. But make sure your withdrawal amount does not exceed your balance in the account otherwise transaction will fail. you have to collect your money from the lower slot of the machine. Take your money before 30 seconds. VIII. SYSTEM ARCHITECTURE In Proposed System, IRIS Recognition is employed because the biometric technology during a metallic element machine that reserves the benefits of the prevailing works and avoids their drawbacks.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2743] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:05/May-2022 Impact Factor- 6.752 www.irjmets.com IX. RESULTS AND ANALYSIS The database of the eye images for this project has been taken from the website. This type of ATM system was successfully developed in this paper with Iris Recognition and universal subscriber module, capable of comparing two digital eye-images and universal subscriber module for comparing the mobile phone number. ATM Security system using IRIS Recognition allows the genuine and authorize user to access the ATM system IRIS Recognition system is highly secure as compared to any other. The account identification is the backup option for the any problem during the IRIS detection. X. BENEFITS 1. The advantages can be found as that the iris-id is unique for everybody; it cannot be used by anybody other than the user. 2. It can be used to reduce fraudulent attempts. 3. To prevent theft and other criminal activities. 4. Secure facial authentication platform that users can trust 5. Provide safe and secure lifestyle infrastructure 6. Prevent unauthorized access using iris verification Link. 7. Fast and Accurate Prediction
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science
[2744] e-ISSN: 2582-5208 International Research Journal of Modernization in Engineering Technology and Science ( Peer-Reviewed, Open Access, Fully Refereed International Journal ) Volume:04/Issue:05/May-2022 Impact Factor- 6.752 www.irjmets.com XI. CONCLUSION The Design of ATM Terminal system based on IRIS Recognition and GSM module proved to extra security as it provides identification and authentication with the information of bank account owners. A New biometric technology based on this system also contains the verify methods which allows the owner to input the Aadhar id the security futures were enhanced largely for the stability under reliability for the owner recognition. The whole system is built on the technology of embedded system which makes the system more safe, reliable and easy to use. It is a viable approach, as it is easy to maintain and operated with lower cost. XII. FUTURE SCOPE In our proposed system we are dealing with Aadhar Information technique, OTP and IRIS to draw the cash by getting. Future scope by IRIS recognition to draw the cash by ATM to provide more security. XIII. REFERENCES [1] M. Liu, Z. Zhou, P. Shang, and D. Xu, “Fuzzified Image Enhancement for Deep Learning in Iris Recognition,” IEEE Transactions on Fuzzy Systems, vol. 28, no. 1, pp. 92–99, Jan. 2020. [2] H. Hofbauer, E. Jalilian, and A. Uhl, “Exploiting superior CNN-based iris segmentation for better recognition accuracy,” Pattern Recognition Letters, vol. 120, pp. 17–23, Apr. 2019. [3] S. H. and S. Malisuwan, “A Study of Image Enhancement for Iris Recognition,” Journal of Industrial and Intelligent Information, vol. 3, Jan. 2018. [4] J.J. Patoliya and M.M. Desai, "eyes Detection based ATM Security System using Embedded Linux Platform",2nd International Conference for Convergence in Technology (I2CT), 2017. [5] Sunil S Harakannanavar, K S Prabhushetty, Chaitra Hugar, Ashwini Sheravi, Mrunali Badiger and Prema Patil, IREMD: An Efficient Algorithm for Iris Recognition, Int. J. Advanced Networking and Applications. [6] Sangeeta Soni, Ajay Kumar Singh, Survey on Methods used in Iris Recognition System. Journal of Image Processing and Artificial Intelligence. [7] Smereka J M (2010) A New Method of Pupil Identification. IEEE Potential, 29(2):1520. [8] M. Pradhan, "Next Generation Secure Computing: Biometric in Secure E-transaction, "International Journal of advance Research in Computer Science and Management Studies. [9] Rangaswamy Y and K. B. Raja, Straight-line Fusion based Iris Recognition using AHE, HE and DWT, Elsevier International Conference on Advanced Communication Control and Computing Technologie. [10] Rai, Himanshu, and Anamika Yadav. "Iris recognition using combined support vector machine and Hamming distance approach. "Expert Systems with Applications. [11] Danny Thakkar. biometric technology, iris recognition. https://www.bayometric.com/biometric-iris- recognitionapplication [12] Miss. Sable Jyoti P and Prof.Mulajkar R.M. A review on “Removing the effect of contact lens in IRIS recognition” [13] V.Kavitha, M.Gowtham, V.J. Arul Karthick. effect of textured contact lenses on iris recognition [14] James S. Doyle, Jr., (student member, IEEE), and Kevin W. Bowyer, (fellow, IEEE). robust detection of textured contact lenses in iris recognition using bsif. [15] K. Laxmi Narshima Rao, Vikram.Kulkarni, C. Krishna Reddy International Journal of Engineering Research and Development, e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com,Volume 3, Issue 11 (September2012), PP. 39-45.
www.irjmets.com @International Research Journal of Modernization in Engineering, Technology and Science