0% found this document useful (0 votes)
131 views67 pages

Atm Project

This document describes a mini project proposal for implementing fingerprint authentication on ATMs. The project aims to enhance ATM security by replacing PIN codes with fingerprint biometrics. It will also install fingerprint locks on ATM doors to prevent robbery. The document includes sections on the ATM industry background, fingerprint technology description, fingerprint authentication process, and a proposed plan for testing and evaluation. The project is being conducted for a master's degree program under the guidance of a faculty member.

Uploaded by

vaibhav verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views67 pages

Atm Project

This document describes a mini project proposal for implementing fingerprint authentication on ATMs. The project aims to enhance ATM security by replacing PIN codes with fingerprint biometrics. It will also install fingerprint locks on ATM doors to prevent robbery. The document includes sections on the ATM industry background, fingerprint technology description, fingerprint authentication process, and a proposed plan for testing and evaluation. The project is being conducted for a master's degree program under the guidance of a faculty member.

Uploaded by

vaibhav verma
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 67

Title of the Mini Project

(FINGERPRINT AUTHENTICATION FOR ATM)

in partial fulfilment of the requirement for the award of the degree of


Master of Business Administration

Project Submitted By
(KAUTSH MISHRA)
Roll Number
2306660700115
Under the Guidance of
(DR. ASHUTOSH MISHRA)
HEAD OF DEPARTMENT

SRM BUSINESS SCHOOL, LUCKNOW (666)

(Approved By AICTE, Ministry of HRD, Govt. of India and Affiliated to Dr. A.P.J. Abdul
KalamTechnical University, Lucknow)

NH-24 SITAPUR ROAD, BAKSHI KA TALAB, LUCKNOW.


(2023-25)

1|Page
TABLE OF CONTENTS
 Executive Summary
 INTRODUCTION
 INDUSTRY PROFILE
 PURPOSE AND SCOPE OF INNOVATIVE IDEA
 DETAILED DESCRIPTIONS OF THE IDEA
 SWOT ANALYSIS OF THE INNOVATIVE IDEA
& INDUSTRY 24
 RELEVANCE OF INNOVATIVE IDEA WITH
RESPECT TO 4C’SCONCEPT
 TESTING ANALYSIS
 RISK ASSESSMENT AND FEASIBILITIES
STUDY
 CONCLUSION
 Reference12. Annexure

2|Page
ACKNOWLEDGEMENT

I wish to express my heartfelt gratitude to our guide, Dr. Sanghmitra Das for their active
interest, constructive guidance, and advices during every stage of this work. His valuable
guidance coupled with active and timely review of my work provided the necessary motivation
for me to work on and successfully complete thesis.

Words are inefficient to express our gratitude to my family members and friends for their
inspirations, blessings and support. I thank God, who has supported me every moment.

- -KAUTSH MISHRA

3|Page
College code -666
CERTIFICATE FOR MINI PROJECTS
This is to certify that Mr/Ms.
…………………………………………….

S/D/O
……………………………………………………………………………

is student of MBA 1st Year has Successfully Completed


their Mini

Project on “……………………………………………………………...

………………………………………………………………………………………
.

………………………………………………………………...……………………

under the guidance of
Dr./Mr………………………………………….

………………………………………………………………………………………
in partial

fulfilment of the requirement for the award of the


degree of MBA.

4|Page
Signature of Guide Signature of Head of
Department

Place – Lucknow Date …………………….

5|Page
DECLARATION

I undersigned, hereby declare that the project titled “Drone delivery- make a step ahead
for future” submitted in partial fulfilment for the award of Degree of Master of Business
administration of SRM BUSINESS SCHOOL is a bonafide record of work done by me under
the guidance of Dr. Ashutosh Mishra, Head of Department. This report has not previously
formed the basis for the award of any degree, diploma, or similar title of any University.

Signature

26/02/2024 KAUTSH MISHRA

6|Page
EXECUTIVE SUMMARY

In present scenario, traditional ATM system accepts only on the PIN CODE security system,
enabling the other person rather than the owner to access the account very easily. This ensures
that the Traditional ATM system is not fully secured. The objective of my project is to provide
biometric security through fingerprint authentication in ATM application and also protect the
ATM from Robbery By installing Fingerprint Lock on ATM Doors . Also, the experiments
illustrate the key issues of fingerprint recognition that are consistent with what the available
literatures say. The underlying principle is the phenomenon of biometrics
“AUTHENTICATION”, in this project we propose a method for fingerprint matching based
on minutiae matching.

The main purpose of our system to make online transaction more secure and user-friendly and
protect ATM from robbery Now days Biometric technology is increasing rapidly. Biometric is
used for personal identification. Here we are using Fingerprint scanning biometric to provide
access to ATM machine. Data of a fingerprint is stored in database using the enrollment process
through the Bank. Bank provide authentication to the customer that can be access while
performing transaction process. If fingerprint match is found in data base then transaction take
place. After verification if fingerprint does not match transaction will be cancelled. Using
fingerprint based ATM system user can make secure transaction.

INTRODUCTION

ATM HISTORY IN INDIA

In India, their takeoff took more time. In 1999, 12 years after their introduction, there were
still only around 800 ATMs in the country. But in just a few years, the number would
explode, crossing 10,000 in 2003.

The regularity of strikes from the intransigent unions of public sector banks increased
demand for the round the-clock reliability of ATM services. Banks extended ATM services,
offering them in multiple languages.

7|Page
The total number of ATMs in India stands at 234,244 by end of September 2020, marginally
down from 2,34,357 in March 2020, according to RBI data. A senior banker said the industry
has seen stunted growth since 2017, following strong annual growth of 14% between 2012
and 2017.

In today’s modern world, autonomous system plays an important role in our day to day life. As
the social computerization and automation have drastically increased, it can be seen evidently
where the number of ATM centers increases rapidly. Most civilians use ATM’s regularly. A
good example can be a financial transaction, ease of money exchange etc. So there exists an
important factor called security. The crime rates involved in financial organizations have
increased tremendously. Over past few years “91% of crimes in ATM centers in the form of
robbery”. This issue poses a serious threat to both bank and civilians. Therefore this study
proposes a solution to minimize the ATM robbery by means of embedded systems and GSM
technology. Many real time incidents around us has the main motivation of this project.

DESCRIPTION OF FINGERPRINT

The fingerprint is arguably a person’s most unique physical characteristic. While humans
have had the innate ability to recognize and distinguish different fingerprints for millions of
years, computers are just now catching up… The twist of this software is that it can pick
someone's fingerprint out of crowd, extract that fingerprint for the rest of the scene and
compare it with database full of stored images. In order for this software to work, it has to
know what a basic fingerprint looks like. Fingerprint recognition software is based on the
ability to first recognize fingerprint, which is a technological feat in itself, and then measure
the various features of each fingerprint.

8|Page
INDUSTRY PROFILE

WHAT IS A FINGERPRINT?

A fingerprint is the feature pattern of one finger. It is believed with strong evidences that
each fingerprint is unique. Each person has his own fingerprints with the permanent
uniqueness. So, fingerprints have been used for identification and forensic investigation for a
long time.

A fingerprint is composed of many ridges and furrows. These ridges and furrows present
good similarities in each small local window, like parallelism and average width. However,
shown by intensive research on fingerprint recognition, fingerprints are not distinguished by
their ridges and furrows, but by Minutia, which are some abnormal points on the ridges.
Among the variety of minutia typesreported in literatures, two are mostly significant and in
heavy usage one is called termination, which is the immediate ending of a ridge the other is
called bifurcation, which is the point on the ridge from which two Branches derive.

WHAT IS FINGERPRINT AUTHENTICATION

The fingerprint authentication problem can be grouped into two sub-domains. One is
fingerprint verification and the other is fingerprint identification.In addition, different from
9|Page
the manual approach for fingerprint authentication by experts, the fingerprint authentication
here is referred as FAA (Fingerprint Authentication in ATM), which is program based.
Fingerprint verification is to verify the authenticity of one person by his fingerprint. The user
provides his fingerprint together with his identity information like his PIN-CODE. The
fingerprint verification system retrieves the fingerprint template according to the PIN-CODE
and matches the template with the real time acquired fingerprint from the user. Usually, it is
the underlying design principle of AFAS (Automatic Fingerprint Authentication System).
Fingerprint identification is to specify one person’s identity by his fingerprint(s). Without
knowledge of the person’s identity, the fingerprint identification system tries to match his
fingerprint(s) with those in the whole fingerprint database. It is especially useful for criminal
investigation cases. And it is the design principle of AFIS (Automatic Fingerprint
Identification System). However, all fingerprint recognition problems, either verification or
identification, are ultimately based on a well-defined representation of a fingerprint.

Approaches for Fingerprint Recognition


Two representation forms for fingerprints separate the two approaches for fingerprint
recognition.
Minutia - based: The first approach, which is minutia-based, represents the fingerprint by
its local features, like terminations and bifurcations. This approach has been intensively
studied, also is the backbone of the currently available fingerprint recognition products. We
also concentrate on this approach in our project.
Image-based: The second approach, which uses image-based methods, tries to do matching
based on the global features of a whole fingerprint image. It is an advanced and newly
emerging method for fingerprint recognition. And it is useful to solve some intractable
problems of the first approach. But our project does not aim at this method, so further study
in this direction is not expanded in our thesis.

OBJECTIVES & SCOPE OF THE INNOVATIVE IDEA

Purpose
This Software Requirements Specification provides a complete description of all the functions
and specifications of the ATM system of bank. The purpose is to provide extra security to the
ATM systems.

Objective of the study:

10 | P a g e
The main objective of this project is to provide fingerprint as authorized identity and to design
a more secure ATM system .In this, ATM machine work as when the customer place finger on
biometric scanner of ATM and if the finger match is found it will display the name of customer
on ATM machine. If Fingerprint match not found, it does not allow any transaction.
• To propose the authentication system on the existing ATM process of withdrawal
after the entry of a correct pin.
• To propose second level authentication system in a scenario where customer specified
withdrawal limit .
• Satisfaction of the customer in a positive or negative way.
• For secure the data and maintain records for the government.

Vision:
To revolutionize ATM security, making financial transactions safer and more convenient
through the implementation of cutting-edge biometric authentication technology.

Scope
The ATM system is designed to run for 24 hours and to allow bank clients to carry out
transactions in a secured way. The data will be held in a bank database. The system is connected
to the bank database using a modem.

Document Overview
The remainder of this document is two chapters, the first providing a full description of the
project for the bank’s ATM with fingerprint security. This SRS gives the details about the
various requirements & about the various hardware & software interface

DETAILED DESCRIPTIONS OF THE IDEA

Overall description
The ATM system encompasses various GUI menus including the SENSOR, to provide high
security. In our proposed system we are introducing finger print sensor in which when a user
scan their finger, if that user is valid then the door opens and the name is displayed on the lcd
screen and after completing the transaction the doors automatically closed within 10 seconds
and for withdrawing of cash there is a finger print sensor is installed in ATM which

11 | P a g e
authenticate the person and person easily withdraw the amount . Withdrawing system is like a
system withdrawing by Aadhar. This system also work as a security system . In case if there
is any fraud activity happens inside ATM then the buzzer start and message is passed to the
bank and to the nearest police station. It provides secure access to the account of a customer.
The ATM must be able to provide the following services to the customer:

Enter Pin:

A customer is allowed to enter the PIN Code for his/her Account.

Change Pin:

A customer must be able to change the pin linked to the card.

Enroll Finger:

A customer is allowed to enroll the fingerprint impression which has been used to provide
security to the Account.

Change Fingerprint:

A customer is allowed to change the fingerprint impression.

DETAILED DESCRIPTIONS OF THE IDEA

Overall description
The ATM system encompasses various GUI menus including the SENSOR, to provide high
security. In our proposed system we are introducing finger print sensor in which when a user
scan their finger, if that user is valid then the door opens and the name is displayed on the lcd
screen and after completing the transaction the doors automatically closed within 10 seconds
and for withdrawing of cash there is a finger print sensor is installed in ATM which
12 | P a g e
authenticate the person and person easily withdraw the amount . Withdrawing system is like a
system withdrawing by Aadhar. This system also work as a security system . In case if there
is any fraud activity happens inside ATM then the buzzer start and message is passed to the
bank and to the nearest police station. It provides secure access to the account of a customer.
The ATM must be able to provide the following services to the customer:

Enter Pin:

A customer is allowed to enter the PIN Code for his/her Account.

Change Pin:

A customer must be able to change the pin linked to the card.

Enroll Finger:

A customer is allowed to enroll the fingerprint impression which has been used to provide
security to the Account.

Change Fingerprint:

A customer is allowed to change the fingerprint impression.

FUNCTIONAL REQUIREMENT
The software to be designed will control a simulated automated teller machine (ATM)
having: -

• A sensor to enroll and detect fingerprint.


• A customer console (keyboard and display) for interaction with the customer. (for
entering PIN Code)
13 | P a g e
• Facility of Aborting transaction

A customer must be able to abort a transaction in progress by pressing the Cancel key instead
of responding to a request from the machine.

PIN Code format


Pin should be of exactly 4 digits.

• Facility of PIN Re-entering

If the customer's PIN is invalid, the customer will be required to re-enter the PIN before a
transaction can proceed.

• Denial of service,

if PIN goes wrong. If the customer is unable to successfully enter the PIN after three tries,
the service would be denied for particular card.

• Enroll finger\

Enroll your finger from first joint to the tip.


• Facility of Re-enrolling the finger

If the customer's Fingerprint is invalid, the customer will be required to re-enroll the
Fingerprint before a transaction can proceed.

• Denial of service, if fingerprint goes wrong

14 | P a g e
If the customer is unable to successfully enroll fingerprint after three tries, the service would
be denied for that particular card.

• Explanation of problem

If a transaction fails for any reason other than an invalid PIN and fingerprint, the ATM will
display an explanation of the problem.

NON-FUNCTIONAL REQUIREMENT
There are requirements that are not functional in nature. Specifically, these are the constraints
the system must follow. They are often called qualities of a system. Other terms for
nonfunctional requirements are “constraints”,” quality attributes”,” quality goals”,” quality of
service requirements” and “non-behavioral requirements”.

• Scope:
The scope of this project is to allow the user to get access to their account through the ATM
using fingerprinting functionality.

• Functionality:
One customer at a time can process their account in the ATM machine.

• Usability:
The desktop user interface shall be Windows XP/Vista/7 complaint.

• Reliability:
The ATM machine must be able to scan or read the card and the fingerprint properly and
identify the customer account.

• Performance:
The ATM machine support only one customer at a time. The speed and accurate transaction
decide the performance factor. The screen must be clearly visible to the user.

• Security:

15 | P a g e
The pin number and the fingerprint in the card guarantee the security of a customer’s account.
The ATM system must not store any of this data in its database. The customer with a pin
number and a valid card with valid fingerprint impression is allowed to do all transactions.

Biometric ATMs and remote payment systems expanding around the


world
Biometric banking and financial services of various kinds are making headlines around the
world, with legal and regulatory changes in Russia and Mexico, pushes for biometric ATMs
in Pakistan and Argentina, and Aadhaar authentication substituting for ATMs in India.
Buguroo sees the trend increasing to meet regulatory needs, and Idemia has expanded a
relationship with a South African bank.

Russia legislators approve expansion of Unified Biometric System


Russia’s State Duma has approved the country’s Unified Biometric System (UBS) for remote
identification to a broad range of remote services from financial institutions and government
agencies, state publication Tass reports.The UBS can now be used for carrying out remote
account onboarding and loan applications with biometrics at banks with basic licenses, which
are now obligated to collect customer biometric data, as well as banks with universal licenses.

• Banks in Mexico given March deadline for customer biometrics, tax code
changes challenged
Mexico’s National Banking and Stock Commission (CNBV) has given banks in the country
until March to register biometric data for their clients to avoid administrative sanctions,
reports Explica.The rule was originally scheduled to take effect at the end of August, 2018,
but banks requested an extension. That delay was extended again when the COVID-19
pandemic struck.

• Biometric ATMs coming to Pakistan for bank services, social welfare


Pakistan’s BankIslami has launched a biometric ATM at a military recreational facility in
Karachi, according to a press release. The ATM is located at the Airmen Golf Club &
Recreational Park (AGC&P), but BankIslami has more than 340 branches is well over 100
cities.

• Biometric ATMs arrive in Argentina

16 | P a g e
Some 500 biometric ATMs are expected to be deployed in Argentina by Octagon between
December of 2020 and the end of the first half of 2021, as financial institutions in the country
attempts to more than double its installed ATM base to meet its people’s banking needs,
Explica.co writes.

• Aadhaar payment system catching up to ATM use in rural areas


In India, meanwhile, ATMs are slowly being supplanted by the Aadhaar-Enabled Payment
System (AePS) in rural areas, The Economic Times reports, with 68.4 million withdrawals
amounting to Rs 188.2 million (US$2.57 million) through APS in November alone. Both
figures were increases of just below double, compared to November of 2019.

There are some 230,000 ATMs in India, but less than a quarter are located in rural areas, and
account holders are instead often withdrawing cash from bank agents and merchants in their
neighbourhoods, which act as “micro-ATMs,” according to the report.
Reserve Bank of India (RBI) data shows ATM transactions in November of 2020 totalled 340
million transactions totalling Rs 1.43 trillion ($19.55 billion), both down by almost half from
a year earlier.

17 | P a g e
Biometric Identifier for ATM Services
Biometrics
Biometrics can be characterized as a quantifiable physiological and behavioural trademark
that can be caught and in this way contrasted and another example at the season of check.
biometrics innovations are a protected method for validation since biometrics information are
novel, can’t be shared, can’t be duplicated and can’t be lost.
Biometrics is a measure of physical or behavioural trademark that can be caught and in this
way contrasted and another occasion around then of confirmation. Any human physical or
behavioural biometrics can be utilized as a biometric trademark the length of it fulfil the
accompanying necessities.

・ Universality―Every individual ought to have the biometric trademark.

・Distinctiveness―Any two people ought to be adequately unique as far as the trademark.

・Permanence―The trademark ought to be adequately invariant over a timeframe.

・ Collectability―The biometric trademark ought to be quantifiable with some detecting


gadget.

・ Performance―Refers to the level of precision and speed of acknowledgment of the


framework, the assets required to accomplish the coveted acknowledgment level, and the
operational and natural components that influence the exactness and speed.

・Acceptability―Indicates the degree to which individuals will acknowledge the utilization


of a specific biometric identifier (trademark) in their everyday lives.

・ Resistance/Circumvention-Refers to the level of trouble required to thrashing or sidesteps


the framework.

Physical biometrics is a static biometrics and the information is gotten from the estimation of
an activity performed by a person. It joins one of a kind finger impression, Iris, Retina, Hand
geometry; Palm print, Face affirmation, DNA and Vascular Pattern Recognition. Behavioral
biometrics is a dynamic biometrics and the data is gotten from the estimation of an action
performed by an individual and the parameter considered here is time; the measures action
has a beginning, focus and end it incorporates signature, keystroke, Handwriting, Voice
acknowledgment and Gait. Delicate biometrics otherwise called concoction biometrics is a
human trademark that gives some data about the person. It incorporates stature, weight and
shade of hair.

18 | P a g e
Multi-biometrics in ATM system:

Multi-biometrics is a combination of one or more biometrics. It can be any physical or


behavioral biometrics. Multi-biometrics overcomes the problem of unimodal
biometrics .These frameworks are required to be more dependable because of the nearness of
numerous, genuinely autonomous bits of proof. This framework basically addresses the issue
of non-all inclusiveness and gives hostile to parodying measures by making it troublesome for
an interloper to at the same time parody the various characteristics of a honest to goodness
client. There are assortment of components that should be considered while planning the multi-
biometric framework, these incorporate the decision and number of biometric characteristics;
the level in the biometric framework at which data gave by numerous qualities ought to be
coordinated. In view of the different sources multi-biometric frameworks are delegated Multi-
sensor frameworks, Multi- calculation frameworks, Multioccasion frameworks and Multi-test
frameworks. There is different level of combination like Sensor level combination, Score level
combination, coordinating level combination and highlight level combination. Multi-
biometrics is predominantly used to give security in the server side. The unique finger
impression, Iris and Face acknowledgment is utilized to give security. The elements are
separated from biometrics utilizing highlight level combination and the elements are joined
into single biometric and biometric cryptosystem. The different points of interest are:

• Increase of unwavering quality and distinguishing proof quality, while lessening FAR
(False Acceptance Rate) mistake rates.
• A assortment of identifiers that can be utilized together or independently.
• Speeding up the recognizable proof technique.
• The restrictions of multi-biometrics are:
• If one of the biometric comes up short because of nearness of clamor in the
biometrics, the FRR (False Reject Rate) will be expanded.

19 | P a g e
Multimodal Biometrics and Multi-Biometrics
Biometrics framework can be characterized as an acknowledgment framework which is
equipped for distinguishing a man in view of their natural properties. The expression
“multimodal biometric” alludes to different biometric attributes utilized together at a
particular level of combination to perceive people. The “multi-biometrics” incorporates either
the utilization of various calculations, likewise called classifiers at enrolment or coordinating
stagesfor the same biometric attribute, or the utilization of numerous sensors of the same
biometric quality like utilizing distinctive instruments to catch the biometric subtle elements,
or utilizing different cases of the same biometric characteristic like the utilization of
fingerprints of three fingers, or at long last utilizing rehashed occurrences like rehashed
impressions of one finger. The proposed model for multimodal biometrics is shown in Fig.
which provides encouraging results and improves security for ATM banking.

20 | P a g e
FRONT END DESCRIPTION

For developing the front – end interface, we have decided to use ASP.NET platform, with C#
as the programming language, due to the following reasons: -

• Easy to use and flexible interface.

A number of options for customizability.

SWOT analysis of the innovative idea & Industry

Strength: -
• Large user populations
• Secure
• Highly protective
• Data secured
Weakness

• Government has to invest a lot of money.


• Might be they will impose more tax on people, butoverall, it is
beneficial for everyone .So I don’t think it will be going to be a big deal.
Opportunities

• Newmarket creation
• Dominate with existing system coverage
• Highly appreciable by regulatory authority
21 | P a g e
Threats

• Sometime system may failure due to some technical glitch.


• There is nothing like threats will be going to happening in this system.
because it is totally highly secured.
• That’s why I am not findings any threats in project.

RELEVANCE OF INNOVATIVE IDEA WITH RESPECT TO 4C’S CONCEPT

Communication

Summarise all the data through fingerprint.

Automated through pin code and message system

Credibility

It will create a digital representation.

It will create an opportunity for many companies to tie -up

Cost

It will help to utilise research into real practice

It will craft an argument using the digital tool for assert

Customer

It will be a new experience, which is hoping to use by bank customer They

will also appreciate it because of its highly secured functions.

22 | P a g e
TESTING ANALYSIS

ACTIVITY DIAGRAM
Activity diagrams are graphical representations of workflows of stepwise activities and
actions with support for choice, iteration and concurrency. In the Unified Modelling
Language, activity diagrams can be used to describe the business and operational step by-step
workflows of components in a system. An activity diagram shows the overall flow of control .

Activity diagrams are constructed from a limited number of shapes, connected with arrows.
The most important shape types:
• rounded rectangles represent activities;
• diamonds represent decisions
• bars represent the start (split) or end (join) of concurrent activities;
• a black circle represents the start (initial state) of the workflow;
• an encircled black circle represents the end (final state).

OVERVIEW OF SYSTEM DESIGN

23 | P a g e
SYSTEM LEVEL DESIGN A fingerprint authentication system constitutes of fingerprint
acquiring device, minutia extractor and minutia matcher.

ALGORITHM LEVEL DESIGN To implement a minutia extractor, a three-stage approach is


widely used by researchers. They are pre-processing, minutia extraction and post processing
stage

24 | P a g e
IMAGE ACQUISITION Image acquisition is the creation of digital images, typically from a
physical scene. The term is often assumed to imply or include the processing, compression,
storage, printing, and display of such images. The most usual method is by digital
photography with a digital camera, digital pictures with image scanners but other methods are
also employed. Here, we are using the digital image for the image processing which will we
taken by the image scanners and image sensors.

SECUGEN FINGERPRINT SCANNER


INTRODUCTION

Secure Hamster Plus is the improved version of Eugen’s popular and versatile fingerprint
reader product line, with Auto-On and Smart Capture. Packaged in a comfortable, ergonomic
design, the Hamster Plus features the industries most rugged and advanced optical sensor
using patented SEIR fingerprint biometric technology. Auto-On is an Automatic Finger
Placement Detection technology that automatically checks for the presence of a finger. When
used with Auto-On-compatible software, the Hamster Plus will turn on and scan your finger
as soon as you touch the sensor - all without having to prompt the system. Smart Capture
ensures quality fingerprint scanning of difficult fingers. By automatically adjusting the
brightness of the sensor, Smart Capture allows the Hamster Plus to capture high quality
fingerprints from a wide range of traditionally difficult fingers, including those from dry, wet,
scarred or aged skin, and even in bright ambient conditions such as under direct sunlight.

25 | P a g e
RISK ASSESSMENT AND FEASIBILITIES STUDY

GRAPHICAL USER INTERFACE (GUI)

26 | P a g e
STEP 1 STEP 2

Snapshot is showing the card request page Snapshot is showing the welcome page
STEP 3STEP 4

Snapshot is of request for enrol finger Snapshot is showing the pin request
page

STEP 5 STEP 6

Snapshot is of request for finger print Snapshot is of updating current entries in db.

27 | P a g e
STEP 8

Snapshot is showing the end of process

METHODOLOGY

Feasible Study Target Step by Step Designing Testing

Stop Application Result

28 | P a g e
FEASIBLE STUDY

The essence of this project is taken from various books and journals based on various
integrity and security check systems. Various PDF were downloaded via Internet and
references. Subject related to the interface study has been done by understanding the .Net,
MATLAB and SQL server environment and studying the language use to code the logic from
the reference guides and taken help from the project guide.

Product Feasibility:
Technical Viability: Existing biometric technology is mature and can be seamlessly
integrated into ATM machines.

Operational Viability: Minimal disruption to existing ATM operations during the


integration process.

Financial Feasibility:
Cost-Benefit Analysis: Initial implementation costs balanced against long-term security
benefits.

Revenue Projection: Increased customer trust leading to higher ATM usage and potentially
attracting new customers.

TARGET
Target of our project is to providing an addition of sophisticated level of security and
integrity to the user performing transactions through traditional ATM Systems.

29 | P a g e
STEP-BY-STEP DESIGNING

In this project following steps are taken for the designing of the system: a. A.

biometric sensor performs scanning of the fingerprint of intended user.

B. Minutiae algorithm performs matching of that image with the images stored in database.

C. Generating MATLAB data with the help of MATLAB.

D. Creating database for the storage of data.

E. Developing interface as a connecting medium of the user & machine.

F. Fetching required information needed for proper security check from user side.

TESTING

The following steps are performed during testing the whole system:

A. Performing unit testing.

B. Creating test cases for integrity testing and whole system testing.

RESULT

The result is being measured by comparing the security components of the ATM system or by
matching the PIN-Code and the fingerprint pattern matching which decide the end result of
the system.

Limitations for individual A.

Dry, wet or dirty hands.

B. For some people it is very intrusive, because it is still related to criminal identification.

30 | P a g e
ADVANTAGES OF THE NEW PROPOSED SYSTEM
1. The proposed system will improve the level of security of ATM transaction system.

2. Initially captured fingerprint images are converted to templates instead of storing anywhere
whichmakes misuse of the system totally impossible.

3. Customers need not to be anxious about secure transaction.

4. This system is easy to install, less time consuming and mostly approved biometric method.

5.Everyone has access to set a unique set of biometrics and it is non transferrable.

6. It is hard to fake or steal.

Market report suggests increasing ATM biometrics adoption

The 37-page report was released by Mercator Advisory Group and paints a picture of
ATMrelated habits of 3,000 U.S. adults in December 2020.

According to the findings, 24 percent of surveyed customers were willing to test biometric
authentication at ATMs, while 25 percent are not interested in the feature.

Similarly, 24 percent of respondents were interested in trying biometric authentication via


smartphone to access ATM services, but 26 percent were not.

In addition, only 7 percent of surveyed consumers had tried multi-factor authentication (MFA)
using biometrics and a one-time code at the ATM, and 5 percent using biometrics and a QR
code.

31 | P a g e
10.CONCLUSION
A smartcard-based ATM fingerprint authentication scheme has been proposed. The possession
(smartcard) together with the claimed user’s Biometrics (fingerprint) is required in a
transaction. The smartcard is used for the first layer of mutual authentication when a user
requests transaction. Biometric authentication is the second layer. The encryption keys are
extracted from the random pixel’s distribution in a raw image of fingerprint. The stable features
of the fingerprint image need not to be transmitted; it can be extracted from the templates at
the central server directly.

Automatic Teller Machines is the most used technology in the increasing financial transaction
of the current world. There are many possible way to misuse ATM card using PIN. Fingerprint
recognition helps to achieve an authentic state of security access through verification and
validation. This study identifies a high level model for the modification of existing ATM
systems using both security protocols as PIN & Biometric fingerprint strategy and GSM
technology .We have been able to develop a fingerprint mechanism as a biometric measure to
enhance the security features of the ATM for effective banking.

The execution of ATM protection by availing fingerprint also has the traditional verifying
methods that were inputting the client's fingerprints, that is sent by the administrator and
checked correctly. The protection feature was improved highly for the firmness and solidity of
the client's identity. The complete system was constructed on a fingerprint system that makes
the mechanism safe, dependable and effortless to avail. This shall be the most favourable
technology in electronic or digital money transactions.

REFERENCES

h琀琀ps://semiengineering.com/昀椀ngerprint-senor-technology-and-security-
requirements/

http://www.sql.com http://www.w3schools.com

https://ijarsct.co.in/ https://ieeexplore.ieee.org/
https://en.m.wikipedia.org/wiki/Biometric_device

32 | P a g e
33 | P a g e
34 | P a g e
35 | P a g e
36 | P a g e
37 | P a g e
38 | P a g e
39 | P a g e
40 | P a g e
41 | P a g e
42 | P a g e
43 | P a g e
44 | P a g e
45 | P a g e
46 | P a g e
47 | P a g e
48 | P a g e
49 | P a g e
50 | P a g e
51 | P a g e
52 | P a g e
53 | P a g e
54 | P a g e
55 | P a g e
56 | P a g e
57 | P a g e
58 | P a g e
59 | P a g e
60 | P a g e
61 | P a g e
62 | P a g e
63 | P a g e
64 | P a g e
65 | P a g e
66 | P a g e
67 | P a g e

You might also like