SlideShare una empresa de Scribd logo
1 de 19
By Guided By 
Alpesh D. Kurhade Mrs.M.A.Shah 
(F.Y Mtech CSE) 
1
Introduction 
Problem Statement 
Environmental Concerns 
Security Concerns 
Issues and offers 
Biometric System 
Software Design 
GSM 
Application 
Advantages 
2
Automated Teller Machine (ATM) 
3
 Steal user's credit card and password 
by illegal means 
ATM Fraud has been existence 
Since the invention of ATM 
Use of ATM Card duplicators 
Card Sharing by family and friends 
Inability to trace the wrongful users 
ATM PINs can be share on phone or 
recorded 
4
Environmental Concerns 
Security Concerns 
5
 In conventional ATMs – PIN is needed 
 PIN comes in an envelope which contains 2 
sheets of paper and between this sheets secret 
code is marked 
 RBI report says – 25000 new accounts are 
opened daily 
 On yearly basis, a lot of paper is required – leads 
to cutting of trees 
6
‣Anybody holding the card with PIN number 
known can operate 
‣No need to be the original owner of the card 
‣In Biometric only the original card holder 
can operate 
7
Single /Multi factor Biometric Authentication 
Fingerprint 
Iris 
Face Recognition 
Signature 
Voice 
8
9
 Fingerprint recognition……. 
 Remote authentication……. 
 Message alarming…….. 
 Two discriminate analysis method…… 
10
Data Collection 
Transmission 
Signal Processing 
Data Storage 
Decision 
11
12
Myagmar, Gupta UIUC 2001 13 
Software 
Design
With GSM, systems for mobilecommunication 
reached a global scale. In the western world, it 
seems everyone has their own mobile phone, and 
GSM has taken more and more of the market. 
GSM allows users to roam seamlessly between 
networks, and separate the user identity from the 
phone equipment. In addition the GSM system 
provides the functional basis for the 3rd 
generation mobile system.
Using Hybrid Compression Encryption(HCE) 
System. 
This technique compress the SMS to reduce its 
length. 
 Encrypts it using RSA Algorithm. 
A signature is added. 
Myagmar, Gupta UIUC 2001 15
Banking 
Membership Verification ATM 
Food Coupons/Tickets 
Canteen ATM 
Self Service ATM 
Transaction/Check Deposit ATM
Fast 
Reliable 
Higher Security 
No card problems 
Accurate
The whole system was build on the 
technology of embedded system which 
makes the system more safe , reliable and 
easy to use
Myagmar, Gupta UIUC 2001 19

Más contenido relacionado

La actualidad más candente

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyShubhamLamichane
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication TechniqueRekha Yadav
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processingshahab islam
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authenticationAsim Kumar Pathak
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentationVivek Kumar
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonAkash Satamkar
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 

La actualidad más candente (20)

Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Bio-metrics Authentication Technique
Bio-metrics Authentication TechniqueBio-metrics Authentication Technique
Bio-metrics Authentication Technique
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
3 d password
3 d password3 d password
3 d password
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Fingerprint recognition presentation
Fingerprint recognition presentationFingerprint recognition presentation
Fingerprint recognition presentation
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Computer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and PythonComputer Vision - Real Time Face Recognition using Open CV and Python
Computer Vision - Real Time Face Recognition using Open CV and Python
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Atm security
Atm securityAtm security
Atm security
 
Face recognisation system
Face recognisation systemFace recognisation system
Face recognisation system
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 

Similar a ATM Security by using Fingerprint Recognition And GSM

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Biometric System Based Electronic Voting Machine Using Arm Micro-controller
 Biometric System Based Electronic Voting Machine Using Arm Micro-controller  Biometric System Based Electronic Voting Machine Using Arm Micro-controller
Biometric System Based Electronic Voting Machine Using Arm Micro-controller VasimTamboli6
 

Similar a ATM Security by using Fingerprint Recognition And GSM (20)

Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
N044057478
N044057478N044057478
N044057478
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Smart cards
Smart cardsSmart cards
Smart cards
 
D0351022026
D0351022026D0351022026
D0351022026
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Atm theft
Atm theftAtm theft
Atm theft
 
Atm security
Atm securityAtm security
Atm security
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Biometric System Based Electronic Voting Machine Using Arm Micro-controller
 Biometric System Based Electronic Voting Machine Using Arm Micro-controller  Biometric System Based Electronic Voting Machine Using Arm Micro-controller
Biometric System Based Electronic Voting Machine Using Arm Micro-controller
 

Último

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Último (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

ATM Security by using Fingerprint Recognition And GSM

  • 1. By Guided By Alpesh D. Kurhade Mrs.M.A.Shah (F.Y Mtech CSE) 1
  • 2. Introduction Problem Statement Environmental Concerns Security Concerns Issues and offers Biometric System Software Design GSM Application Advantages 2
  • 4.  Steal user's credit card and password by illegal means ATM Fraud has been existence Since the invention of ATM Use of ATM Card duplicators Card Sharing by family and friends Inability to trace the wrongful users ATM PINs can be share on phone or recorded 4
  • 6.  In conventional ATMs – PIN is needed  PIN comes in an envelope which contains 2 sheets of paper and between this sheets secret code is marked  RBI report says – 25000 new accounts are opened daily  On yearly basis, a lot of paper is required – leads to cutting of trees 6
  • 7. ‣Anybody holding the card with PIN number known can operate ‣No need to be the original owner of the card ‣In Biometric only the original card holder can operate 7
  • 8. Single /Multi factor Biometric Authentication Fingerprint Iris Face Recognition Signature Voice 8
  • 9. 9
  • 10.  Fingerprint recognition…….  Remote authentication…….  Message alarming……..  Two discriminate analysis method…… 10
  • 11. Data Collection Transmission Signal Processing Data Storage Decision 11
  • 12. 12
  • 13. Myagmar, Gupta UIUC 2001 13 Software Design
  • 14. With GSM, systems for mobilecommunication reached a global scale. In the western world, it seems everyone has their own mobile phone, and GSM has taken more and more of the market. GSM allows users to roam seamlessly between networks, and separate the user identity from the phone equipment. In addition the GSM system provides the functional basis for the 3rd generation mobile system.
  • 15. Using Hybrid Compression Encryption(HCE) System. This technique compress the SMS to reduce its length.  Encrypts it using RSA Algorithm. A signature is added. Myagmar, Gupta UIUC 2001 15
  • 16. Banking Membership Verification ATM Food Coupons/Tickets Canteen ATM Self Service ATM Transaction/Check Deposit ATM
  • 17. Fast Reliable Higher Security No card problems Accurate
  • 18. The whole system was build on the technology of embedded system which makes the system more safe , reliable and easy to use