ABSTRACT
This research work is determined to provide a more secure platform for cash dispensing machines and financial transactions.
The security of the transactions on the Automated Teller Machine (ATM) has been raising many concerns in some parts of the world. These concerns are due to series of limitations in the existing designs of the various service points. The current use of Personal Identification Number (PIN) for ATM user’s verification and identification has been susceptible to unauthorized access, misplacement, forgetfulness, card swallowing among others; thereby narrowing down the machine’s acceptability and patronage. In this paper, a framework for fingerprint authenticated ATM application is presented. The framework comprises of modules for fingerprint enrolment, database and verification. The verification module comprises of fingerprint enhancement, feature extraction and matching sub-modules, which all rely on suitable mathematical models to function. There is also platform for financial transactions including withdrawal and balance enquiries as seen in the existing PIN ATM system. The designed system was not meant to be implemented as the scope of this work does not give room for that. But since the need for implementation may definitely arise in the future; the new system maybe best implemented using Windows 7 as operational platform while C# and Microsoft SQL server served as the frontend and backend engines respectively. Tests conducted on the evaluation of the application using False Rejection Rate (FRR), False Acceptance Rate (FAR) and Average Matching Time (AMT) show the adequacy and the suitability of the proposed framework for ATM user verification and authentication. Futher details of this proposed implementation process can be found under the implications section of this work.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ORGANIZATION OF WORK
TABLE OF CONTENTS
CHAPTER ONE
1.0INTRODUCTION
1.1PROBLEM STATEMENT
1.2AIMS/OBJECTIVES
1.3PURPOSE
1.4SIGNIFICANCE
1.5SCOPE/DELIMITATION
1.6CONSTRAINTS/LIMITATIONS
1.7DEFINITION OF TERMS
CHAPTER TWO
REVIEW OF RELEVANT LITERATURE
CHAPTER THREE
3.0 METHODS OF FACT FINDING AND DETAILED DISCUSSION OF THE SYSTEM
3.1 METHODS OF FACT FINDING
3.2 DISCUSSIONS
3.3PROBLEMS OF THE EXISTING SYSTEM
3.4 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
FEATURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FEATURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1SUMMARY
RECOMMENDATION
CONCLUSION
REFERENCES