FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY APPLICATIONS

  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0025
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.9K
  • Report This work

For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY APPLICATIONS

CHAPTER ONE

INTRODUCTION

1.1       Background of the Study

A biometric system is essentially a pattern recognition system that operates by acquiring biometric data from an individual, extracting a feature vector from the acquired data, comparing this feature vector from the database feature vector. Person authentication has always been an attractive goal in computer vision. Authentication systems based on human characteristics such as face, finger, iris and voice are known Biometrics systems. The basis of every biometric system is to get the input image and generate prominent feature vectors like color, texture, etc.

Today, biometric recognition is a common and reliable way to authenticate the identity of a living person based on physiological or behavioral characteristics. A physiological characteristic is relatively stable physical characteristics, such as fingerprint, iris pattern, facial feature, hand silhouette, etc. This kind of measurement is basically unchanging and unalterable without significant duress. A behavioral characteristic is more a reflection of an individual’s psychological makeup as signature, speech pattern, or how one types at a keyboard.

The degree of intra-personal variation in a physical characteristic is smaller than a behavioral characteristic. For examples, a signature is influenced by both controllable actions and less psychological factors, and speech pattern is influenced by current emotional state, whereas fingerprint template is independent. Nevertheless all physiology-based biometrics don’t offer satisfactory recognition rates (false acceptance and/or false reject rates, respectively referenced as FAR and FRR). The automated personal identity authentication systems based on iris recognition are reputed to be the most reliable we consider that the probability of finding two people with identical iris pattern is almost zero. That’s why iris recognition technology is becoming an important biometric solution for people identification in access control as networked access to computer application. Compared to fingerprint, iris is protected from the external environment behind the cornea and the eyelid. No subject to deleterious effects of aging, the small-scale radial features of the iris remain stable and fixed from about one year of age throughout life.

1.2       Statement of the Problem

In recent years, in line with global trends, the banking sector has faced rising levels of cash card fraud resulting in the subsequent illegal withdrawal of funds from customer accounts. The account-holder is normally held responsible for the loss of funds from their accounts and, as such, the impact of this fraud could be potentially far-reaching.  As a result of this, the banking sector has to embrace biometrics as the solution to the growing problem of counterfeit ATM cards and ID theft. Among others include

1.      Fraudulent card readers, called skimmers are placed over the authentic reader to transfer numbers and codes to nearby thieves.

2.      Spy cameras are also used by password voyeurs to collect access codes.

3.      In cases of card lost, if the loss is not noticed immediately, consumers may loose all funds in an account.

4.      If you forget your pin number, you cannot use the card.

5.      The machine can retain your card when the machine malfunctions, when you forget your secret number or if the card is damaged.

1.3       Aim and Objectives

The aim of this project work is to simulate an embedded fingerprint authentication system, which is used for ATM security applications. The specific objectives include:

       I.            To provide a platform that will allow the bankers to collect customers’ finger print.

    II.            To provide a platform that will allow the bankers to collect customers’ phone number and store them in a centralized database.

 III.            To build a system that will forward 4-digit number to the customers’ mobile phone when the finger print reading matches.

 IV.            To provide a platform that allows the customer to run his transaction after the system accepts the code generated.

    V.            To create a platform that will be able to analyze biometric data in the global image analysis.

1.4       Scope of the Study

This study is on implementing ATM security using the finger print. There is a centralized database to take care of customers’ personal and biometric data. The system is designed to query the database by inputting a user finger print and if it matches with the one in a system it will generate a 4-digit number that will enable the user to continue with his transactions.

1.5       Significance of the Study

The current system of passwords and pin numbers needed to access financial services has drawn a lot of criticism of late due to the increasing incidents of hacking. The system is at the mercy of hackers, who use the hacked data to draw funds from the victims account. This is where Biometrics with its foolproof system comes in. Some of the reasons for building this system include:

vIncrease security - Provide a convenient and low-cost additional tier of security.

vReduce fraud by employing hard-to-forge technologies and materials. For e.g. minimize the opportunity for ATM fraud.

vEliminate problems caused by lost ATMs or forgotten passwords by using physiological attributes. For e.g. prevent unauthorized use of lost, stolen or "borrowed" ATM cards.

v Replace hard-to-remember secret digits which may be shared or observed.

vIntegrate a wide range of biometric solutions and technologies, customer applications and databases into a robust and scalable control solution for facility and network access

vMake it possible, automatically, to know WHO did WHAT, WHERE and WHEN!

FINGERPRINT AUTHENTICATION SYSTEM FOR ATM SECURITY APPLICATIONS
For more Info, call us on
+234 8130 686 500
or
+234 8093 423 853

Share This
  • Type: Project
  • Department: Computer Engineering
  • Project ID: CPE0025
  • Access Fee: ₦5,000 ($14)
  • Chapters: 5 Chapters
  • Pages: 65 Pages
  • Format: Microsoft Word
  • Views: 1.9K
Payment Instruction
Bank payment for Nigerians, Make a payment of ₦ 5,000 to

Bank GTBANK
gtbank
Account Name Obiaks Business Venture
Account Number 0211074565

Bitcoin: Make a payment of 0.0005 to

Bitcoin(Btc)

btc wallet
Copy to clipboard Copy text

500
Leave a comment...

    Details

    Type Project
    Department Computer Engineering
    Project ID CPE0025
    Fee ₦5,000 ($14)
    Chapters 5 Chapters
    No of Pages 65 Pages
    Format Microsoft Word

    Related Works

    DESIGN AND IMPLEMENTATION OF AN ELECTRONIC VOTING SYSTEM WITH FINGERPRINT AUTHENTICATION CHAPTER ONE BACKGROUND OF STUDY 1.0       Background of the Study Voting theory formally began in the 18th century and ever since, many proposal has been made towards using electronic technologies to improve elections (Sobia, Ummer, Ayesha, Usman, and... Continue Reading
    BIO METRIC  AUTHENTICATION OF AN AUTOMATIC TELLER MACHINE USING FINGERPRINT AND PASSWORD   CHAPTER ONE INTRODUCTION          1.1  Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The... Continue Reading
    C HAPTER ONE INTRODUCTION          1.1   Background to the Study In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is... Continue Reading
    ABSTRACT  This project report is an excerpt of the design of a Micro-controller based Access  Control Lock system implemented to assist the university with the aid of security  personnel in the prompt detection of students who have not completed necessary  fees payment and to checkmate the problem of the ever increasing rate of  examination... Continue Reading
    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
    ABSTRACT Many techniques for multicast authentication employ the principle of delayed key disclosure. These methods introduce delay in authentication, employ receiver-side buffers, and are susceptible to denial-of-service (DoS) attacks. Delayed key disclosure schemes have a binary concept of authentication and do not incorporate any notion of... Continue Reading
      ABSTRACT My research Project is to develop fingerprint biometric systems that assist in the elimination of examination impersonation. Up till now, the WAEC examination board (WAEC) is not using fingerprint as mode of identification, this has resulted in people sitting for WAEC examinations for others who collect the result at the end. With the... Continue Reading
    ABSTRACT This project is on the design and development of portable and reliable fingerprint based student attendance monitoring system that can be used to monitor attendance of the student. It will eliminate the problems of manual method. The new system utilizes a portable fingerprint scanner as the input to acquire fingerprint images and notebook... Continue Reading
    ABSTRACT This project is on the design and development of portable and reliable fingerprint based student attendance monitoring system that can be used to monitor attendance of the student. It will eliminate the problems of manual method. The new system utilizes a portable fingerprint scanner as the input to acquire fingerprint images and notebook... Continue Reading
    This research work, Design and Implementation of an Attendance System using fingerprint scanner , focuses on computerizing and managing the attendance of students during lecture or event periods. This is very imperative as the cons of the traditional pen to paper attendance system far outweigh the pros as management of student attendance has... Continue Reading
    Call Us
    whatsappWhatsApp Us