Professional Documents
Culture Documents
AN EYE
Computer Science 3rd Year
Mohammad Ali Jauhar University
Rampur
PRESENTED
BY:
MOHD AMAN PA
1
Outline
INTRODUCTION
NEED OF SECURITY
TECHNIQUES
HOW IT WORKS
FUNCTION
CONCLUSION
ACKNOWLEDGEMENT
BIBLIOGRAPHY
INTRODUCTION
ATM stands for
Automated Teller
Machine
First modern ATM was
introduced in 1969 by
Chemical Bank, New York
ATM customers spend an
average of 20-40% more
than non-ATM
customers.
3
HOW IT WORKS
NEED OF AN
EYE
SOLUTION
BIOMETRIC IDENTIFICATION TECHNIQUES
Finger Printing
Retina Scanning
Facial Recognition
Iris Recognition
FINGER PRINTING
Fingerprint scanning system will be used along with
the traditional PIN system to curb ATM fraud.
With the fingerprint required to complete the
transaction, a fraudster will not be further able to
access the accounts after trapping the card details.
Fingerprint is the one unique thing fraudster cannot
steal from a banks customer.
After scanning the fingerprint it will match with the
data which was already submitted into the bank
database.
9
RETINA SCANNING
Developed in 1980s, most well-known yet less
deployed techniques.
It maps the unique pattern of persons retina.
Performed by casting an unperceived beam of lowenergy infrared light into persons eye.
Beam of light traces a standardized path on retina.
Specialized software then complies the unique
features into a template.
Highly dependable, accurate and difficult to spoof.
But difficult image acquisition, less users, and
discomfort to the users are some disadvantages.
10
FACIAL RECOGNITION
By forcing the ATM match a
live image of a customers face
with an image stored in a bank
database (associated with the
account number) when the
data matches(account image and
stored
image)
user
be
ears,
nose,
mouth
and
12
Camera Snapshots
Portrait camera
13
IRIS RECOGNITION
A camera based in ash machine will
Detect the pattern in second
Compare it with one store in a central computer.
Or encode on to the cash card.
A sensor system examines the randomly
Formed features of the iris of the eye
as unique as a fingerprint.
14
Function
15/03/11
15
15
16
17
Conclusion
We Thus Develop An ATM Model That Is
19
ACKNOWLEDGEMENT
20
?
?
S
E
I
R
E
U
Q
21