SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 806
Transactions Using Bio-Metric Authentication
1Dr.D. Thamaraiselvi, 2Sankaramanchi Seshadri Sarma, 3Ponguru Praveen Chandu
1Asst.Professor, Dept. of Computer Science and Engineering, SCSVMV University, Tamil Nādu, India
2Dept. of Computer Science and Engineering, SCSVMV University
3Dept. of Computer Science and Engineering, SCSVMV University
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In previous ATM systems, mostly personal
identification number (PIN) is used to verify authentic users
which are not secured, and it is very easy to copy. Sometimes
thieves have a very strong way to steal our account
information, that’s why a biometric verification systemcanbe
a firm solution. This paper aims to provide a more secure
method using biometric features. PIN verification is combined
with face recognition in our proposed method to identify a
customer during an ATM transaction. Facial data is verified
using the Haarcascade Frontal algorithm. To assure security
while doing transactions through a swipe machine, the client
will confirm the transaction through Facial technology's
approval message. In both cases, the Face will be identified
through a Camera. If any illegitimate person tries to use the
card it will automatically be blocked by the system and
detailed information will besenttothecustomerthrough Mail.
Hence, this proposed method will provide more advanced
security by identifying and reducing fraud.
Key Words: ATM, Bio-metric, face, Transaction, card
1. INTRODUCTION
The faster improvement of information and communication
engineering has affected every aspect of humanlifeinrecent
years. Therefore, the way of dealing with banking activities
has also been changed. ATM is an automatic technique that
enables the customers to do economical transactions like
swift cash out, fund transfer, balance inquiry, savings
withdrawal from anywhere anytime without the aid of a
branch representative or teller. To access the account from
ATM systems, customers need to hold a debit or credit card
on that bank account. Today to pay shopping bills, phone,
electricity, gas bills and many more people prefer debit or
credit cards most of the time as these cards make sure
immediate and simple access to their accounts. A swipe
machine also known as electronic data capture(EDC)isused
to do this type of transaction. To pay for the things or to
complete the transaction, users just need to swipe the debit
or credit card through the machine. All customer data is
encoded into the magnetic strip on the card and before
completing the transactionmachinereadsthemagneticstrip
to verify card no, date of expiration, and otherfeaturesofthe
customer. Personal Identification Number (PIN) is an
important aspect of both ATM and EDC security schemes as
it is usually applied to protect the monetary informationofa
user from illicit access, but only PIN has not been able to
make sure the security of the transactions. Bio-metric
features can be a solution to this kind of problem. Among all
biometric features, a face is recognized as a secured and
proven technique. A person’s individuality is defined by
characteristics and relationships.it can be used as an
authentic identification process.Inthisregard,ourproposed
method is based on biometric features and message
authentication technology to improve security. Here, face
identification is checked along with PIN verification to
recognize the genuine user during anATMtransaction. Since
it is impossible to replicate biometric features like face, to
solve the authentication problem, this proposal can be a
good solution. During shopping or payment through a swipe
machine, the client will get a confirmation Mail through
SMPT technology on his/her MailIDwhichisregistered with
the bank to approve the transaction. To identify the
illegitimate/fraudulent customer in both cases, the location
will also be tracked using a GPS modem during the
transaction. This will help to reduce the possibility of
abduction and redouble the security of ATM and swipe
machine
2. LITERATURE SURVEY:
Balvir proposed a model of designing an embedded system
to improve ATM security. Serial communication is managed
by the system to scan the cardholder’s database, which then
immediately generates messages to the mobile of the
authorized users through the 89C51 microcontroller-
connected GSM module. The main purpose of the paper
proposed by Bharati M Nelligani is to make practical and
effective usage of embedded systems and advanced
technologies to design a smart ATM security system. In this
paper, an IR sensor is used to realize the appearance of the
card owner and face to identify and verify the legal
customer. A variety of sensors and cameras are used to
capture security-related information which is further
analyzed and dispatched to the central main server to
experiment. Utilizing this information obtained from
different ATMs, a statistical vulnerabilitytest will bedone by
the system, and vulnerability software is assigned to all
ATMs. The proposed scheme focuses on saving time and
solving a very sensitive issue of the system. If the userswant
to know their balance, then also they need to go through the
verification system. This model proves that fraudsters will
never gain any advantages from the system. Hence, the
security will never be compromised. Increase the safety of
electronic money transfer via EDC an embedded fingerprint
technique with PIN has been introduced. It’s a design to
secure swipe card transactions by applying bio-metric
features like facial identification with traditional PIN. There
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 807
are a variety of methods to raise the safety of thetransaction
using a bio-metric recognition system. In this given model
PIN is completely replaced with a biometric system such as
facial, e-fingerprint, retina, and so on
3. PROBLEM STATEMENT:
In the existing system, we use a debit or ATM card atanATM
Machine or POS machine, Customers can withdraw cash
from accounts, make a deposit or transfer money from one
account to another or perform any otherfunctionswhich are
not highly secured
4. PROPOSED METHOD:
In this proposed system, not only the valid cardholder is
allowed only by the knowledge of the accountholderanyone
can enter the ATM by using the account holder’sATMcard.If
any unauthorized person is inserted ATM card, their picture
with one OTP will be sent to account holders mail, only after
entering that OTP in the system it will allow the user to
withdraw the money.
5. ADVANTAGES:
1. It is very secure compared to credit or debit card
payments.
2. Very fast transactions would take place in less than
a second.
3. We can transact at most of the places just with Face
6. METHODOLOGY:
In our proposed system, once the consumer inserts the card
into an ATM, the card reader readstheinformationstored on
the magnetic stripe of the card and then passes it to the host
processor for confirmation. The host processor
communicates with the bank database to get detailed
account information. If everythingisokay, thenthecustomer
is asked to press a 4-digit PIN which is then compared with
the PIN encrypted into the magnetic stripe onthecard.Here,
authentication is done by verifying both personal
identification numbers (PINs) and matching the face. If PIN
verification is okay, then the customer’s facial image is
scanned at the ATM terminal and verifiedusingHaarcascade
Algorithm features which are the best face recognition
algorithm. After that, EFT (electronic fund transfer) occurs
from the customer's account to the processor's account, and
a code of approval is sent to the ATM to withdraw cash.Each
useful information must be provided to affect the
transaction. If a face doesn’t match the first time, the
customer will get two more chances to match the face. But if
the face is invalid consecutive three times, thentomakesure
whether the customer is valid or not, the system will ask
him/her for date-of-birth and phone number. If the
information is okay means the customer is legal, but if the
information is wrong then the system will understand that
an illegal user is trying to access the account. Therefore, it’ll
block the card. After blocking the card, the system will
automatically inform the customer about the corruption
along with details such as device number, So, the customer
will be able to take the necessary steps.
7. ALGORITHM:
Step-1: Start
Step-2:user Stands Infront of a Machine
Step-3: reads the Face Data of the user
Step-4: if the face matches with the bank database it
continues with transaction type
Step-5: else it rejects the transaction
Step-6: continues with the transaction or rejection
Step-7: Stop
8. FLOWCHART:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 808
9. BLOCK DIAGRAM:
10. BLOCK DIAGRAM CLASSIFICATION:
Web camera is connected to the raspberry pi to capture the
image, if some person enters the ATM, camerasgettriggered
and capture the image of that person, to compare with the
database.
11. PROJECT DESCRIPTION:
This project consists of a raspberry pi module and a camera
to scan the facial data of the customer in Infront of the ATM.
12. WORKING:
1. When a customer places a card on any pos/ATM or
at any merchant
2. It will scan the face details and decodes the data
entered by the bank
3. Now it will search the decodeddata intheparticular
bank’s database.
4. If the details of the face and details in the bank
database are matched
5. Then it will debit the certain amount entered by the
merchant
6. And the transaction will show successful
7. If there is a mismatch in details, It will be a failed
transaction and This process will just complete in
seconds.
13. OUTPUTS:
HOMEPAGE:
OUR USERS:
TRANSACTION PAGE:
TRANSACTION HISTORY:
DATABASE:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 809
FACE RECOGNITION:
MAIL IMAGE:
14. CONCLUSION:
The growing result of electronic transactions increases the
demand for making more secure and reliable transaction
systems. Yet money theft, identity theft is becoming a threat
in the banking system. So, it’s very important to determine
the authentic user properly to safeguard against all kinds of
technical attacksandintrusions.Bycombiningbiometric and
mail authentication technology along with the existing
systems our proposed model can produce a very effective
and well-protected methodology to increase both ATM and
swiping machine security. But it can’t predict the breach in
security before the occurrences which are also very
important. We plan to build a real-time monitoring system
along with an enhanced security system based on more bio-
metric features like iris patterns, retina scan, signature
biometrics, etc., and an efficient message authentication
algorithm.
REFERENCES
1. Onyesolu MO, and Ezeani IM, “ATM Security Using
Fingerprint Bio-metric Identifier: An Investigative
Study,” International Journal ofAdvancedComputer
Science and Applications, 2012, Vol. 3, no.4, pp. 68–
72.
2. Daniel Peralta, Mikel Galar, Isaac Triguero, Oscar
Miguel-Hurtado, Jose M. Benitez, and Francisco
Herrera, “Minutiae filteringtoimprove bothefficacy
and efficiency of fingerprint matching
algorithms,” Engineering Applications of Artificial
Intelligence, June 2014, Volume 32, Pages 37-53
3. S.P. Balwir, K.R. Katole, R.D. Thakare, N.S.
Panchbudhe, and P.K. Balwir, "Secured ATM
Transaction System Using Micro-Controller",
International Journal of Advanced Research in
Computer Science and Software Engineering, April
2014, vol. 4, no. 4, pp. 1358-1362.
4. Bharati M Nelligani, Dr. N V Uma Reddy, and
Mr.NithinAwasti, “Smart ATM Security System
Using FPR, GSM, GPS”, International Conference on
Inventive Computation Technologies(ICICT),26-27
Aug. 2016.

Más contenido relacionado

Similar a Transactions Using Bio-Metric Authentication

IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET Journal
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 

Similar a Transactions Using Bio-Metric Authentication (20)

IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
project_report
project_reportproject_report
project_report
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 

Más de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Más de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdfAkritiPradhan2
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfManish Kumar
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodManicka Mamallan Andavar
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESkarthi keyan
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 

Último (20)

KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdfDEVICE DRIVERS AND INTERRUPTS  SERVICE MECHANISM.pdf
DEVICE DRIVERS AND INTERRUPTS SERVICE MECHANISM.pdf
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdfModule-1-(Building Acoustics) Noise Control (Unit-3). pdf
Module-1-(Building Acoustics) Noise Control (Unit-3). pdf
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Levelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument methodLevelling - Rise and fall - Height of instrument method
Levelling - Rise and fall - Height of instrument method
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTESCME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
CME 397 - SURFACE ENGINEERING - UNIT 1 FULL NOTES
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 

Transactions Using Bio-Metric Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 806 Transactions Using Bio-Metric Authentication 1Dr.D. Thamaraiselvi, 2Sankaramanchi Seshadri Sarma, 3Ponguru Praveen Chandu 1Asst.Professor, Dept. of Computer Science and Engineering, SCSVMV University, Tamil Nādu, India 2Dept. of Computer Science and Engineering, SCSVMV University 3Dept. of Computer Science and Engineering, SCSVMV University ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In previous ATM systems, mostly personal identification number (PIN) is used to verify authentic users which are not secured, and it is very easy to copy. Sometimes thieves have a very strong way to steal our account information, that’s why a biometric verification systemcanbe a firm solution. This paper aims to provide a more secure method using biometric features. PIN verification is combined with face recognition in our proposed method to identify a customer during an ATM transaction. Facial data is verified using the Haarcascade Frontal algorithm. To assure security while doing transactions through a swipe machine, the client will confirm the transaction through Facial technology's approval message. In both cases, the Face will be identified through a Camera. If any illegitimate person tries to use the card it will automatically be blocked by the system and detailed information will besenttothecustomerthrough Mail. Hence, this proposed method will provide more advanced security by identifying and reducing fraud. Key Words: ATM, Bio-metric, face, Transaction, card 1. INTRODUCTION The faster improvement of information and communication engineering has affected every aspect of humanlifeinrecent years. Therefore, the way of dealing with banking activities has also been changed. ATM is an automatic technique that enables the customers to do economical transactions like swift cash out, fund transfer, balance inquiry, savings withdrawal from anywhere anytime without the aid of a branch representative or teller. To access the account from ATM systems, customers need to hold a debit or credit card on that bank account. Today to pay shopping bills, phone, electricity, gas bills and many more people prefer debit or credit cards most of the time as these cards make sure immediate and simple access to their accounts. A swipe machine also known as electronic data capture(EDC)isused to do this type of transaction. To pay for the things or to complete the transaction, users just need to swipe the debit or credit card through the machine. All customer data is encoded into the magnetic strip on the card and before completing the transactionmachinereadsthemagneticstrip to verify card no, date of expiration, and otherfeaturesofthe customer. Personal Identification Number (PIN) is an important aspect of both ATM and EDC security schemes as it is usually applied to protect the monetary informationofa user from illicit access, but only PIN has not been able to make sure the security of the transactions. Bio-metric features can be a solution to this kind of problem. Among all biometric features, a face is recognized as a secured and proven technique. A person’s individuality is defined by characteristics and relationships.it can be used as an authentic identification process.Inthisregard,ourproposed method is based on biometric features and message authentication technology to improve security. Here, face identification is checked along with PIN verification to recognize the genuine user during anATMtransaction. Since it is impossible to replicate biometric features like face, to solve the authentication problem, this proposal can be a good solution. During shopping or payment through a swipe machine, the client will get a confirmation Mail through SMPT technology on his/her MailIDwhichisregistered with the bank to approve the transaction. To identify the illegitimate/fraudulent customer in both cases, the location will also be tracked using a GPS modem during the transaction. This will help to reduce the possibility of abduction and redouble the security of ATM and swipe machine 2. LITERATURE SURVEY: Balvir proposed a model of designing an embedded system to improve ATM security. Serial communication is managed by the system to scan the cardholder’s database, which then immediately generates messages to the mobile of the authorized users through the 89C51 microcontroller- connected GSM module. The main purpose of the paper proposed by Bharati M Nelligani is to make practical and effective usage of embedded systems and advanced technologies to design a smart ATM security system. In this paper, an IR sensor is used to realize the appearance of the card owner and face to identify and verify the legal customer. A variety of sensors and cameras are used to capture security-related information which is further analyzed and dispatched to the central main server to experiment. Utilizing this information obtained from different ATMs, a statistical vulnerabilitytest will bedone by the system, and vulnerability software is assigned to all ATMs. The proposed scheme focuses on saving time and solving a very sensitive issue of the system. If the userswant to know their balance, then also they need to go through the verification system. This model proves that fraudsters will never gain any advantages from the system. Hence, the security will never be compromised. Increase the safety of electronic money transfer via EDC an embedded fingerprint technique with PIN has been introduced. It’s a design to secure swipe card transactions by applying bio-metric features like facial identification with traditional PIN. There
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 807 are a variety of methods to raise the safety of thetransaction using a bio-metric recognition system. In this given model PIN is completely replaced with a biometric system such as facial, e-fingerprint, retina, and so on 3. PROBLEM STATEMENT: In the existing system, we use a debit or ATM card atanATM Machine or POS machine, Customers can withdraw cash from accounts, make a deposit or transfer money from one account to another or perform any otherfunctionswhich are not highly secured 4. PROPOSED METHOD: In this proposed system, not only the valid cardholder is allowed only by the knowledge of the accountholderanyone can enter the ATM by using the account holder’sATMcard.If any unauthorized person is inserted ATM card, their picture with one OTP will be sent to account holders mail, only after entering that OTP in the system it will allow the user to withdraw the money. 5. ADVANTAGES: 1. It is very secure compared to credit or debit card payments. 2. Very fast transactions would take place in less than a second. 3. We can transact at most of the places just with Face 6. METHODOLOGY: In our proposed system, once the consumer inserts the card into an ATM, the card reader readstheinformationstored on the magnetic stripe of the card and then passes it to the host processor for confirmation. The host processor communicates with the bank database to get detailed account information. If everythingisokay, thenthecustomer is asked to press a 4-digit PIN which is then compared with the PIN encrypted into the magnetic stripe onthecard.Here, authentication is done by verifying both personal identification numbers (PINs) and matching the face. If PIN verification is okay, then the customer’s facial image is scanned at the ATM terminal and verifiedusingHaarcascade Algorithm features which are the best face recognition algorithm. After that, EFT (electronic fund transfer) occurs from the customer's account to the processor's account, and a code of approval is sent to the ATM to withdraw cash.Each useful information must be provided to affect the transaction. If a face doesn’t match the first time, the customer will get two more chances to match the face. But if the face is invalid consecutive three times, thentomakesure whether the customer is valid or not, the system will ask him/her for date-of-birth and phone number. If the information is okay means the customer is legal, but if the information is wrong then the system will understand that an illegal user is trying to access the account. Therefore, it’ll block the card. After blocking the card, the system will automatically inform the customer about the corruption along with details such as device number, So, the customer will be able to take the necessary steps. 7. ALGORITHM: Step-1: Start Step-2:user Stands Infront of a Machine Step-3: reads the Face Data of the user Step-4: if the face matches with the bank database it continues with transaction type Step-5: else it rejects the transaction Step-6: continues with the transaction or rejection Step-7: Stop 8. FLOWCHART:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 808 9. BLOCK DIAGRAM: 10. BLOCK DIAGRAM CLASSIFICATION: Web camera is connected to the raspberry pi to capture the image, if some person enters the ATM, camerasgettriggered and capture the image of that person, to compare with the database. 11. PROJECT DESCRIPTION: This project consists of a raspberry pi module and a camera to scan the facial data of the customer in Infront of the ATM. 12. WORKING: 1. When a customer places a card on any pos/ATM or at any merchant 2. It will scan the face details and decodes the data entered by the bank 3. Now it will search the decodeddata intheparticular bank’s database. 4. If the details of the face and details in the bank database are matched 5. Then it will debit the certain amount entered by the merchant 6. And the transaction will show successful 7. If there is a mismatch in details, It will be a failed transaction and This process will just complete in seconds. 13. OUTPUTS: HOMEPAGE: OUR USERS: TRANSACTION PAGE: TRANSACTION HISTORY: DATABASE:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 809 FACE RECOGNITION: MAIL IMAGE: 14. CONCLUSION: The growing result of electronic transactions increases the demand for making more secure and reliable transaction systems. Yet money theft, identity theft is becoming a threat in the banking system. So, it’s very important to determine the authentic user properly to safeguard against all kinds of technical attacksandintrusions.Bycombiningbiometric and mail authentication technology along with the existing systems our proposed model can produce a very effective and well-protected methodology to increase both ATM and swiping machine security. But it can’t predict the breach in security before the occurrences which are also very important. We plan to build a real-time monitoring system along with an enhanced security system based on more bio- metric features like iris patterns, retina scan, signature biometrics, etc., and an efficient message authentication algorithm. REFERENCES 1. Onyesolu MO, and Ezeani IM, “ATM Security Using Fingerprint Bio-metric Identifier: An Investigative Study,” International Journal ofAdvancedComputer Science and Applications, 2012, Vol. 3, no.4, pp. 68– 72. 2. Daniel Peralta, Mikel Galar, Isaac Triguero, Oscar Miguel-Hurtado, Jose M. Benitez, and Francisco Herrera, “Minutiae filteringtoimprove bothefficacy and efficiency of fingerprint matching algorithms,” Engineering Applications of Artificial Intelligence, June 2014, Volume 32, Pages 37-53 3. S.P. Balwir, K.R. Katole, R.D. Thakare, N.S. Panchbudhe, and P.K. Balwir, "Secured ATM Transaction System Using Micro-Controller", International Journal of Advanced Research in Computer Science and Software Engineering, April 2014, vol. 4, no. 4, pp. 1358-1362. 4. Bharati M Nelligani, Dr. N V Uma Reddy, and Mr.NithinAwasti, “Smart ATM Security System Using FPR, GSM, GPS”, International Conference on Inventive Computation Technologies(ICICT),26-27 Aug. 2016.