Third Generation Security System For Face Detection in ATM Machine Using Computer Vision
Third Generation Security System For Face Detection in ATM Machine Using Computer Vision
4th 5th
R. Prabha A. Sathya 6th
Ramya J
Associate Professor, Dept. of Assistant Professor, PG Student,
Electronics and Communication Dept. of Artificial Intelligence and Data Dept. of Computer Science and
Engineering, Science, Engineering,
Sri Sai Ram Institute of Technology, Sri Sai Ram Institute of Technology, Vels Institute of Science, Technology &
Chennai, India. Chennai, India. Advanced Studies (VISTAS),
[email protected] [email protected] Chennai, India.
[email protected]
Abstract– A workflow is proposed for the detection of commands on an ATM screen which are red by using a
unauthorized persons in an ATM. Certain assumptions, consumer to offer for the cooperative process of the ATM.
including the context of identification are made by training their
features and storing the datasets. However, not every individual By reading the commands in the display, a customer
will be a suspect. Suspicious activity on ATMs that are located in
remote areas and to reduce the risk of fraudulent transactions.
is capable of using the ATM through records and records
such as using another person's card to withdraw money etc., entered on a keypad. But in lots of instances, customer
Various video survey and image processing have been discussed overlook it. So most effectively the authors designed a device
in relation to surveillance methods. It discusses the various that facilitates users to apply the ATM system with no need of
processes, preprocessing, classification, feature extraction and any ATM card, the surroundings, pace of interaction, and co-
the corresponding video processing methods. located user displays are all factors that affect how secure the
technique is. Finding fraudulent card transactions is one of the
main concerns from all of these factors. Here, we advocate for
Keywords: Image Processing, Workflow, Automatic detection,
the facial recognition technology to lessen ATM transaction
Feature detection, ATM, Image Processing, Haar Cascade
Algorithm, Machine Learning. fraud.
The project aims to reduce the risk associated with In the paper, the existing system, an RFID card serves as
ATMs that are installed in remote areas, as well as the an ATM card, while an infrared sensor senses the presence of
possibility of fraudulent transactions like using someone else's cardholders and turns on a fan, and the lights GSM network is
card to withdraw money. To overcome these challenges, the used to send SMS to two main stations in case of ATM
authors have developed a solution that uses machine learning tampering. There are a number of ways to spoof biometrics
& artificial intelligence to ensure that card access will only be such as fingerprints and eyeballs. fingerprint authentication
granted to authorized users who have been identified by a face additionally has a few negative aspects. As it may easily be
recognition algorithm. ATM presents PIN to all its customers ripped off via making use of a fake finger and may be
with the assistance of which they are able to get admission to unrecognized because of the presence of injuries or specks of
their process to hold clients out, economic transactions, and/or dirt in the finger [5-8].
banking for the reason, that transaction is frequently reliant on
PIN verification. To preserve the privacy for user In the paper, in iris biometric is used for network security
authentication at ATMs, a number of aesthetic elements were at customer aspect and cryptography and steganography at
examined. present ATMs come handy as well as smooth to server side the usage of the MD5 set of rules. However, iris
apply for every client. Present ATMs commonly offer biometrics is greater highly Iris recognition is based on the
979-8-3503-9784-0/22/$31.00 2022
c IEEE 143
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.
depth of the light, its recognition rate is much less accurate. while the other plausibility can be, on the off chance that the
The light situation, expression of the face, digicam position, shopper photo do not get coordinated with the photos from the
and many others. Makes trouble inside the face identification account holder profile interior the bank database inside a division
method. of a moment an alert will be sent as a connect to the account
holder’s enlisted Mail Id
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.
for binary class that changed into truly successful. It is the best
place to start if you are new to boosting.
3.3 AdaBoost
The Adaptive Boosting approach combines more
than one classifier to growth the accuracy of classifiers. It's
miles an ensemble technique that mixes numerous poorly
appearing classifiers after which builds a robust classifier with
the resulting excessive accuracy sturdy classifier.
There are two basic requirements for Adaboost: It
needs to be trained on weighted sets of training examples. In Fig. 4. Local Binary Pattern
each iteration set, it should try to minimize training errors
while providing an excellent fit for the examples. A boost is a
well-known ensemble technique that mixes some of vulnerable 3.4 Principal Component Analysis
classifiers to create a robust one. It really works by In conclusion, Principal Component Analysis (PCA)
constructing a version from the education records, then aims to reduce the dimensionality of a data set made up of
constructing some other model that corrects the mistakes from several variables that may be associated among one another.
the primary. The model is introduced till the training set is
anticipated flawlessly or a maximum quantity of fashions is
brought. Adaboost became the primary boosting set of rules
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.
Since PCA requires scaling of the dataset, it is crucial that the
dataset is scaled as well.
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.
B. Identifying the person from the dataset and identifying the V. CONCLUSION
unknown
Face Recognition is established as a protection
function for third-generation ATMs. The primary purpose is to
reduce the danger worried inside the ATM system. To keep
away from fraudulent transactions with the assistance of
artificial intelligence technology. The machine can be
recognized by way of face recognition strategies. On this, to
get Haar cascading classifier (algorithm) with shape predictor
and to get more accuracy.
REFERENCES
[1] Banerjee, S. Mookherjee, S. Saha, S. Ganguli, S. Kundu,
and D. Chakravarti, "Advanced ATM System Using Iris
Scanner," 2019 International Conference on Opto-
Electronics and Applied Optics (Optronix), Kolkata, India,
2019, pp. 1-3.doi: 10.1109/OPTRONIX.2019.8862388.
[2] S. Sankhwar and D. Pandey, "A Safeguard against ATM
Fraud," 2016 IEEE 6th International Conference on
Advanced Computing (IACC), Bhimavaram, India, 2016,
C. Unauthorized Person Image will be sent to Mail pp. 701-705. DOI: 10.1109/IACC.2016.135.
[3] Y. Cheng, W. Shang, L. Zhu and D. Zhang, "Design and
implementation of ATM alarm data analysis
system," 2016 IEEE/ACIS 15th International Conference
on Computer and Information Science (ICIS), Okayama,
Japan, 2016, pp. 1-3. doi: 10.1109/ICIS.2016.7550948.
[4] C. Porretti, R. Lahaije and D. Kolev, "A New Vision for
ATM Security Management: The Security Management
Platform," 2016 11th International Conference on
Availability, Reliability and Security (ARES), Salzburg,
Austria, 2016, pp. 493-498. doi: 10.1109/ARES.2016.50.
[5] H. R. Babaei, O. Molalapata, and A. A. Pandor, Face
Recognition Application for Automatic Teller Machines
(ATM), in ICIKM, 3rd ed. vol.45, pp.211-216, 2012.
[6] Aru, O. Eze and I. Gozie, “Facial Verification Technology
for Use in ATM Transactions”, American Journal of
Engineering Research (AJER), [Online] 2013, pp. 188-
193, Available:http://www.ajer.org/papers/v2
(5)/Y02501880193.pdf ← K.
[7] Bone, Mike, Wayman, Dr. James L., and Blackburn,
Duane. “Evaluating Facial Recognition Technology for
Drug Control Applications.” ONDCP International
Counterdrug Technology Symposium: Facial Recognition
Vendor Test., June 2001.
[8] R. Prabha, M. Razmah, G. Saritha, R. Asha, S. G. A and R.
Fig. 8. Unauthorized Person Detection
Gayathiri, "Vivoice - Reading Assistant for the Blind using
OCR and TTS," 2022 International Conference on
Computer Communication and Informatics (ICCCI), 2022,
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.
pp. 01-07, doi: 10.1109/ICCCI54379.2022.9740877.
[9] R. Prabha, S. G. A, N. N. Saranya, A. M, K.
Somasundaram and K. C, "Design of Adaptive Priority
Based IoT Communication in Wireless Network," 2022
International Conference on Advanced Computing
Technologies and Applications (ICACTA), 2022, pp. 1-5,
doi: 10.1109/ICACTA54488.2022.9753550.
[10] Senthil, G. A., Prabha, R., Roopa, D., Babu, D. V., &
Suganthi, S. (2021, March). Improved Cluster Head
Selection for Data Aggregation in Sensor Networks.
In 2021 7th International Conference on Advanced
Computing and Communication Systems (ICACCS) (Vol.
1, pp. 1356-1362). IEEE.
https://doi.org/10.1109/ICACCS51430.2021.9442048.
[11] S. G. A, R. Prabha, M. Razmah, S. Senthilpandi, S.
Suganthi and S. Sridevi, "Design of a Novel Group
Communication Framework to Improve Security in
Internet of Things," 2022 8th International Conference on
Advanced Computing and Communication Systems
(ICACCS), 2022, pp. 967-970, doi:
10.1109/ICACCS54159.2022.9785080.
[12] S. Sridevi, R. Prabha, K. N. Reddy, K. M. Monica, G. A.
Senthil and M. Razmah, "Network Intrusion Detection
System using Supervised Learning based Voting
Classifier," 2022 International Conference on
Communication, Computing and Internet of Things
(IC3IoT), 2022, pp. 01-06, doi:
10.1109/IC3IOT53935.2022.9767903.
Authorized licensed use limited to: K K Wagh Inst of Engg Education and Research. Downloaded on August 26,2024 at 05:41:20 UTC from IEEE Xplore. Restrictions apply.