SlideShare a Scribd company logo
1 of 7
Download to read offline
1894
Available online through - http://ijifr.com/searchjournal.aspx
www.ijifr.com
Published On: February 17, 2016
InternationalJournalofInformative&FuturisticResearch ISSN: 2347-1697
Volume 3 Issue 6 February 2016Reviewed Paper
Abstract
In today’s growing world of ubiquitous computing environment devices
are now essential tools that offer competitive business advantages. The
design and implementation of previous ATM systems are not much
secure as per the requirement of customers and security. The use of
mobile handheld devices is expanding rapidly both within the
commercial and distinct context. The technology advancement has made
it possible to embed more facilities in mobile phones. While they provide
benefits, they also pose new risks on security either by the information
they contain or information that they can access remotely. Secure cash
transaction is of serious concern in growing use of cash cards and
internet transactions. Cash withdrawal cards, chip and pin facility is one
of the facilities which have increasingly been used for business and social
activities. However, there has been limited research focus on security
and flexibility. This project will introduce the concept of physical
browsing and development of a system that will allow users to use their
mobile phones to securely withdraw cash from ATM machines.
Secure Real Time Embedded System
For ATM Using Web Server
Paper ID IJIFR/ V3/ E6/ 010 Page No. 1894-1900 Subject Area
Electronics &
Telecommunication
Engineering
Keywords
PIC Microcontroller, Voice Chip, Alerts Module, Data Transferring, Image
Recognition System.
1st Snehal A. Ahire
M.E. Student
Department of Elect. & Telecomm. Engineering
Matoshri College Of Engineering & Research Centre,
Nashik -Maharashtra, India
2nd Prof. D. D. Dighe
Professor
Department of Elect. & Telecomm. Engineering
Matoshri College Of Engineering & Research Centre,
Nashik -Maharashtra, India
1895
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
1. INTRODUCTION
ATMs are typically available to consumers on a continuous basis such that consumers
have the ability to carry out their ATM financial transactions and/or banking functions at
any time of the day and on any day of the week. An automated teller machine or
automatic teller machine (ATM) (American, Australian and Indian English),also known
as an automated banking machine (ABM) in Canadian English, and a cash machine,
cash point, cash line or sometimes a hole in the wall in British English and Hiberno-
English, is a computerized telecommunications device that enables the clients of a
financial institution to perform financial transactions without the need for a cashier,
human clerk or bank teller. ATMs are known by various other names including ATM
machine, automated banking machine, cash dispenser" and various regional variants
derived from trademarks on ATM systems held by particular banks. On most modern
ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe
or a plastic smart card with a chip that contains a unique card number and some security
information such as an expiration date or CVVC (CVV). Authentication is provided by
the customer entering a personal identification number (PIN).
Automated teller machines (ATMs) are well known devices typically used by individuals
to carry out a variety of personal and business financial transactions and/or banking
functions. ATMs have become very popular with the general public for their availability
and general user friendliness. ATMs are now found in many locations having a regular or
high volume of consumer traffic. For example, ATMs are typically found in restaurants,
supermarkets, Convenience stores, malls, schools, gas stations, hotels, work locations,
banking centers, airports, entertainment establishments, transportation facilities and a
myriad of other locations.
In this proposed system we have created the new generation ATM machine which can
be operator without the ATM card. By using this system ATM machine can be operator
by using our SIM in the mobile phone. When we insert our SIM in the reader unit of the
ATM machine it transfers the mobile to the server. In server we can collect the related
information of the mobile number (i. e). The users account details, their photo etc. the
camera presented near the ATM machine will capture the users image and compare it
with the user image in the server using MAT LAB. Only when the image matches it asks
the pin number and further processing starts. Otherwise the process is terminated. So by
using this system need of ATM card is completely eliminated we can operate the ATM
machine by using our SIM itself. By using this system malfunctions can be avoided. Our
transaction will be much secured. One more application can also be added in this system
for helping the blind people. In the existing system all the transactions are done through
keyboard only. It may be difficult for blind people so we can also add voice
annunciation to indicate each and very process to the blind people. It that enables a
visually and/or hearing impaired individual to conveniently and easily carry out
financial transactions or banking functions.
1896
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
2. EXISTING SYSTEM
Existing ATMs are convenient and easy to use for most consumers. Existing ATMs
typically provide instructions on an ATM display screen that are read by a user to provide
for interactive operation of the ATM. Having read the display screen instructions, a user
is able to use and operate the ATM via data and information entered on a keypad. The
drawback in the existing system is that the user should carry their ATM card without fail.
However in many cases we forget it. So only we designed a system which helps us to use
the ATM machine without the ATM card.
Figure 1: Block diagram of secure real time embedded system for ATM
The customize acquisitions, access the built-in features of hardware devices, and
incorporate the analysis and visualization features of MATLAB and related toolboxes
into your design. You can analyze or visualize your data, save it for post-processing, and
make iterative updates to your test setup based on your analysis results. Data Acquisition
Toolbox allows you to use MATLAB as a single, integrated environment to support the
entire data acquisition, data analysis, and application development process. Data
Acquisition Toolbox also supports Simulink with blocks that enable you to incorporate
live data or hardware configuration directly into Simulink models. You can then verify
and validate your model against live, measured data as part of the system development
process.
3. SURVEY REVIEW
1. Jain, A.K. give a brief overview of the field of biometrics and summarize some of
its advantages, disadvantages, strengths, limitations, and related privacy concerns.
The purpose of such schemes is to ensure that the rendered services are accessed
1897
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
only by a legitimate user and no one else. Examples of such applications include
secure access to buildings, computer systems, laptops, cellular phones, and ATMs.
2. Jae Young Choi proposed annotation method has been evaluated using a variety of
photo sets. The photo sets were constructed using 1385 photos from the MPEG-7
Visual Core Experiment 3 (VCE-3) data set and approximately 20000 photos
collected from well-known photo-sharing websites. The reported experimental
results show that the proposed face annotation method significantly outperforms
traditional face annotation solutions at no additional computational cost, with
accuracy gains of up to 25% for particular cases.
3. Bowyer, K.W analyze the interplay of technical and social issues involved in the
widespread application of video surveillance for person identification.
4. Jie Zou implemented a complete face recognition system by integrating the best
option of each step. Without training, illumination compensation and without any
parameter tuning, it achieves superior performance on every category of the FERET
test: near perfect classification accuracy (99.5%) on pictures taken on the same day
regardless of indoor illumination variations, and significantly better than any other
reported performance on pictures taken several days to more than a year apart. The
most significant experiments were repeated on the AR database, with similar
results.
5. Yu Su evaluates the proposed method using two large-scale face databases: FERET
and FRGC version 2.0. Experiments show that the results of our method are
impressively better than the best known results with the same evaluation protocol.
4. EFFECTIVENESS OF COLOR LOCAL TEXTURE FEATURES FOR FR
Here, we compare the FR using the proposed color local texture features with the FR
using gray scale texture features and the FR using only color information. For FR using
gray scale texture features, only luminance information is applied to extract gray scale
Gabor wavelet or LBP features. In our experiments, the channel from color space was
adopted for extracting gray scale texture features. For FR using only color information,
given different color component images, individual color-component vectors were first
generated in the form of a column vector by lexicographic ordering of the pixel elements
of corresponding color-component images. In order to guarantee fair and stable
comparisons with the method using this color local texture features, the low-dimensional
features of these color-component vectors were then combined at the level of features.
The resulting concatenated features are applied to FR. In order to validate the advantage
of making use of the feature-level fusion approach to combining color local texture
features, we report the experimental results obtained using the pro-posed feature-level
fusion, as well as using the decision-level fusion. For the case of using the decision-level
fusion, a sigmoid function followed by a sum normalization method was used to
normalize the matching scores (e.g., distance scores). Also, the sum rule was adopted for
combining these multiple matching scores at the decision level. It has been shown in that
1898
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
the sum rule achieves the best classification performance in comparison with other
decision-level fusion strategies, such as product and median rules. In the following three
subsections, we present comparative experimental results to validate the effectiveness of
color local texture features for FR under variations in illumination, pose, and resolution,
respectively.
5. EXPERIMENTAL RESULT
In this the information about what the results are going to come at computer end. Image
Processing Toolbox provides a comprehensive set of reference-standard algorithms and
graphical tools for image processing, analysis, visualization, and algorithm development.
Figure 2: ATM Banking window
Figure 3: ATM Banking window
1899
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
Figure 4. Transition Complete Window
6. CONCLUSION
In the proposed web server based secure real time embedded system for ATM, effective
alert unit, process allusion module, mobile communication technologies. In this system
each processing information produces by voice annunciation module. This process is
effective for security, banking and data transferring application. In proposed two
effective Color local texture features, i.e., CLBP and CLGW. In this paper it is suggested
the feature-level fusion approach, which maximizes their complementary effect in the
context of FR. The important result is the paper is color local texture features allows for a
significant improvement in the FR accuracy.
7. REFERENCES
[1] K. W. Bowyer, “Face recognition technology: Security versus privacy,” IEEE Technol. Soc. Mag., vol. 23, no.
1, pp. 9–19, Spring 2004.
[2] A. K. Jain, A. Ross, and S. Prabhaker, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst.
Video Technol., vol. 14, no. 1, pp. 4–20, Jan. 2004.
[3] J. Y. Choi, W. De Neve, Y. M. Ro, and K. N. Plataniotis, “Automatic face annotation in photo collections using
context-based unsupervised clustering and face information fusion,” IEEE Trans. Circuits Syst. Video Technol.,
vol. 20, no. 10, pp. 1292–1309, Oct. 2010.
[4] J. Zou, Q. Ji, and G. Nagy, “A comparative study of local matching approach for face recognition,” IEEE Trans.
Image Process., vol. 16, no. 10, pp. 2617–2628, Oct. 2007.
[5] Y. Su, S. Shan, X. Chen, and W. Gao, “Hierarchical ensemble of global and local classifiers for face
recognition,” IEEE Trans. Image Process., vol. 18, no. 8, pp. 1885–1896, Aug. 2009.
[6] S. Xie, S. Shan, X. Chen, and J. Chen, “Fusing local patterns of Gabor magnitude and phase for face
recognition,” IEEE Trans. Image Process., vol. 19, no. 5, pp. 1349–1361, May 2010.
[7] C. Liu and H. Wechsler, “Gabor feature based classification using the enhanced fisher linear dis criminate
model for face recognition,” IEEE Trans. 999999I9m age Process., vol. 11, no. 4, pp. 467–476, pr. 2002.
[8] T. Ahonen, A. Hadid, and M. Pietikainen, “Face description with local binary pattern: Application to face
recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 2037–2041, Dec. 2006.
1900
ISSN: 2347-1697
International Journal of Informative & Futuristic Research (IJIFR)
Volume - 3, Issue -6, February 2016
Continuous 30th Edition, Page No.:1894-1900
Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded
System For ATM Using Web Server
[9] C. Zhu, C. E. Bichot, and L. Chen, “Multi-scale color local binary pat-terns for visual object classes
recognition,”
in Proc. IEEE ICPR, 2010, pp. 3065– 3068.
[10] C. H. Chan, J. Kittler, and K. Messer, “Multispectral local binary pat-tern histogram for component-based color
face verification,” in Proc. IEEE Int. Conf. BTAS, 2007, pp. 1–7.
[11] A. Drimbarean and P. F. Whelan, “Experiments in colour texture anal-ysis,” Pattern Recognit. Lett., vol.22, no.
10, pp. 1161–1167, Aug. 2001.
[12] V. Perlibakas, “Distance measures for PCA-based face recognition,” Pattern Recognit. Lett., vol. 25, no. 6, pp.
711–724, Apr. 2004.
[13] X. Jiang, B. Mandal, and A. Kot, “Eigen feature regularization and ex-traction in face recognition,” IEEE
Trans. Pattern Anal. Mach. Intell., vol. 30, no. 3, pp. 383–394, Mar. 2008.
[14] V. Perlibakas, “Distance measures for PCA-based face recognition,” Pattern Recognit. Lett., vol. 25, no. 6, pp.
711–724, Apr. 2004.
[15] C. L. Liu, “Classifier combination based on confidence transformation,” Pattern Recognit., vol. 38, no. 1, pp.
11–28, Jan. 2005.

More Related Content

What's hot

Arduino arduino gsm-shield .... helpful to b.tec students
Arduino   arduino gsm-shield .... helpful to b.tec studentsArduino   arduino gsm-shield .... helpful to b.tec students
Arduino arduino gsm-shield .... helpful to b.tec students
nanda kar
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
Slawomir Jasek
 

What's hot (9)

Atm frauds
Atm fraudsAtm frauds
Atm frauds
 
Security features of atm
Security features of atmSecurity features of atm
Security features of atm
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
ATM Compromise with and without Whitelisting
ATM Compromise with and without WhitelistingATM Compromise with and without Whitelisting
ATM Compromise with and without Whitelisting
 
Arduino arduino gsm-shield .... helpful to b.tec students
Arduino   arduino gsm-shield .... helpful to b.tec studentsArduino   arduino gsm-shield .... helpful to b.tec students
Arduino arduino gsm-shield .... helpful to b.tec students
 
Teller pass slides
Teller pass slidesTeller pass slides
Teller pass slides
 
Cant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless cardCant touch this: cloning any Android HCE contactless card
Cant touch this: cloning any Android HCE contactless card
 
Design of intelligent transport related issue system based on arm7
Design of intelligent transport related issue system based on arm7Design of intelligent transport related issue system based on arm7
Design of intelligent transport related issue system based on arm7
 

Viewers also liked

Embedded systems projects
Embedded systems projectsEmbedded systems projects
Embedded systems projects
Sudhakar Reddy
 
Real Time OS For Embedded Systems
Real Time OS For Embedded SystemsReal Time OS For Embedded Systems
Real Time OS For Embedded Systems
Himanshu Ghetia
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
Tech_MX
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
manish katara
 

Viewers also liked (16)

How attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - InfographicHow attackers hack atm & withdraw cash from an atm using a phone - Infographic
How attackers hack atm & withdraw cash from an atm using a phone - Infographic
 
Embedded systems projects
Embedded systems projectsEmbedded systems projects
Embedded systems projects
 
Application of embedded system
Application of embedded systemApplication of embedded system
Application of embedded system
 
ICT-104 bill acceptor protocol
ICT-104 bill acceptor protocolICT-104 bill acceptor protocol
ICT-104 bill acceptor protocol
 
The Little Black Book of Scams
The Little Black Book of ScamsThe Little Black Book of Scams
The Little Black Book of Scams
 
Atm machine
Atm machineAtm machine
Atm machine
 
Kali tools list with short description
Kali tools list with short descriptionKali tools list with short description
Kali tools list with short description
 
Weather forecast ppt
Weather forecast pptWeather forecast ppt
Weather forecast ppt
 
Real Time OS For Embedded Systems
Real Time OS For Embedded SystemsReal Time OS For Embedded Systems
Real Time OS For Embedded Systems
 
Real time Operating System
Real time Operating SystemReal time Operating System
Real time Operating System
 
Presentation Of Research Work
Presentation Of Research WorkPresentation Of Research Work
Presentation Of Research Work
 
ATM Skimming Devices
ATM Skimming DevicesATM Skimming Devices
ATM Skimming Devices
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
 
RTOS Basic Concepts
RTOS Basic ConceptsRTOS Basic Concepts
RTOS Basic Concepts
 
weather and climate ppt for students..
weather and climate ppt for students..weather and climate ppt for students..
weather and climate ppt for students..
 
TEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of WorkTEDx Manchester: AI & The Future of Work
TEDx Manchester: AI & The Future of Work
 

Similar to Secure Real Time Embedded System For ATM Using Web Server

Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
ijsrd.com
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
Associate Professor in VSB Coimbatore
 

Similar to Secure Real Time Embedded System For ATM Using Web Server (20)

IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
IRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking SystemIRJET- IoT based Sensor Enabled Smart Parking System
IRJET- IoT based Sensor Enabled Smart Parking System
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Smart Elevator
Smart ElevatorSmart Elevator
Smart Elevator
 
Smart ID for Blind People’s
Smart ID for Blind People’sSmart ID for Blind People’s
Smart ID for Blind People’s
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Internet of Things, Examples and Issues
Internet of Things, Examples and IssuesInternet of Things, Examples and Issues
Internet of Things, Examples and Issues
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Implementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting SystemImplementation of Biometric Based Electoral Fraud Desisting System
Implementation of Biometric Based Electoral Fraud Desisting System
 
Document Atm machine using c language mini project.pdf
Document  Atm machine using c language mini project.pdfDocument  Atm machine using c language mini project.pdf
Document Atm machine using c language mini project.pdf
 

More from ijcite

E5 11 ijcite august 2014
E5 11 ijcite august 2014E5 11 ijcite august 2014
E5 11 ijcite august 2014
ijcite
 

More from ijcite (15)

V3 e6-017Educational Media Awareness Among The Higher Education Teachers-An A...
V3 e6-017Educational Media Awareness Among The Higher Education Teachers-An A...V3 e6-017Educational Media Awareness Among The Higher Education Teachers-An A...
V3 e6-017Educational Media Awareness Among The Higher Education Teachers-An A...
 
Type Of Schools On Loneliness, Guilt, Shame State And Trait Anger
Type Of Schools On Loneliness, Guilt, Shame State And Trait AngerType Of Schools On Loneliness, Guilt, Shame State And Trait Anger
Type Of Schools On Loneliness, Guilt, Shame State And Trait Anger
 
A Basic Frame Work For Formulation Of Road Safety Improvement Program
A Basic Frame Work For Formulation Of Road Safety Improvement ProgramA Basic Frame Work For Formulation Of Road Safety Improvement Program
A Basic Frame Work For Formulation Of Road Safety Improvement Program
 
A Literature Review On Human Resource Accounting
A Literature Review On Human Resource AccountingA Literature Review On Human Resource Accounting
A Literature Review On Human Resource Accounting
 
A Study Of Age At Menarche And Body Composition In School Girls Of Metro cities
A Study Of Age At Menarche And Body Composition In School Girls Of Metro citiesA Study Of Age At Menarche And Body Composition In School Girls Of Metro cities
A Study Of Age At Menarche And Body Composition In School Girls Of Metro cities
 
RFID Based Smart Ration System
RFID Based Smart Ration SystemRFID Based Smart Ration System
RFID Based Smart Ration System
 
Effectiveness Of EDUSAT Programme In Mathematics At Senior Secondary School L...
Effectiveness Of EDUSAT Programme In Mathematics At Senior Secondary School L...Effectiveness Of EDUSAT Programme In Mathematics At Senior Secondary School L...
Effectiveness Of EDUSAT Programme In Mathematics At Senior Secondary School L...
 
Evaluating The Strength Gain And Structural Properties Of Self-Compacting Con...
Evaluating The Strength Gain And Structural Properties Of Self-Compacting Con...Evaluating The Strength Gain And Structural Properties Of Self-Compacting Con...
Evaluating The Strength Gain And Structural Properties Of Self-Compacting Con...
 
E5 05 ijcite august 2014
E5 05 ijcite august 2014E5 05 ijcite august 2014
E5 05 ijcite august 2014
 
E5 11 ijcite august 2014
E5 11 ijcite august 2014E5 11 ijcite august 2014
E5 11 ijcite august 2014
 
E5 11 ijcite august 2014
E5 11 ijcite august 2014E5 11 ijcite august 2014
E5 11 ijcite august 2014
 
Hybrid mobile arm revised
Hybrid mobile arm revisedHybrid mobile arm revised
Hybrid mobile arm revised
 
Fpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revisedFpga sotcore architecture for lifting scheme revised
Fpga sotcore architecture for lifting scheme revised
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
 
15 04-2014662 fullpaper nasruna
15 04-2014662 fullpaper nasruna15 04-2014662 fullpaper nasruna
15 04-2014662 fullpaper nasruna
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 

Recently uploaded (20)

Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Secure Real Time Embedded System For ATM Using Web Server

  • 1. 1894 Available online through - http://ijifr.com/searchjournal.aspx www.ijifr.com Published On: February 17, 2016 InternationalJournalofInformative&FuturisticResearch ISSN: 2347-1697 Volume 3 Issue 6 February 2016Reviewed Paper Abstract In today’s growing world of ubiquitous computing environment devices are now essential tools that offer competitive business advantages. The design and implementation of previous ATM systems are not much secure as per the requirement of customers and security. The use of mobile handheld devices is expanding rapidly both within the commercial and distinct context. The technology advancement has made it possible to embed more facilities in mobile phones. While they provide benefits, they also pose new risks on security either by the information they contain or information that they can access remotely. Secure cash transaction is of serious concern in growing use of cash cards and internet transactions. Cash withdrawal cards, chip and pin facility is one of the facilities which have increasingly been used for business and social activities. However, there has been limited research focus on security and flexibility. This project will introduce the concept of physical browsing and development of a system that will allow users to use their mobile phones to securely withdraw cash from ATM machines. Secure Real Time Embedded System For ATM Using Web Server Paper ID IJIFR/ V3/ E6/ 010 Page No. 1894-1900 Subject Area Electronics & Telecommunication Engineering Keywords PIC Microcontroller, Voice Chip, Alerts Module, Data Transferring, Image Recognition System. 1st Snehal A. Ahire M.E. Student Department of Elect. & Telecomm. Engineering Matoshri College Of Engineering & Research Centre, Nashik -Maharashtra, India 2nd Prof. D. D. Dighe Professor Department of Elect. & Telecomm. Engineering Matoshri College Of Engineering & Research Centre, Nashik -Maharashtra, India
  • 2. 1895 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server 1. INTRODUCTION ATMs are typically available to consumers on a continuous basis such that consumers have the ability to carry out their ATM financial transactions and/or banking functions at any time of the day and on any day of the week. An automated teller machine or automatic teller machine (ATM) (American, Australian and Indian English),also known as an automated banking machine (ABM) in Canadian English, and a cash machine, cash point, cash line or sometimes a hole in the wall in British English and Hiberno- English, is a computerized telecommunications device that enables the clients of a financial institution to perform financial transactions without the need for a cashier, human clerk or bank teller. ATMs are known by various other names including ATM machine, automated banking machine, cash dispenser" and various regional variants derived from trademarks on ATM systems held by particular banks. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN). Automated teller machines (ATMs) are well known devices typically used by individuals to carry out a variety of personal and business financial transactions and/or banking functions. ATMs have become very popular with the general public for their availability and general user friendliness. ATMs are now found in many locations having a regular or high volume of consumer traffic. For example, ATMs are typically found in restaurants, supermarkets, Convenience stores, malls, schools, gas stations, hotels, work locations, banking centers, airports, entertainment establishments, transportation facilities and a myriad of other locations. In this proposed system we have created the new generation ATM machine which can be operator without the ATM card. By using this system ATM machine can be operator by using our SIM in the mobile phone. When we insert our SIM in the reader unit of the ATM machine it transfers the mobile to the server. In server we can collect the related information of the mobile number (i. e). The users account details, their photo etc. the camera presented near the ATM machine will capture the users image and compare it with the user image in the server using MAT LAB. Only when the image matches it asks the pin number and further processing starts. Otherwise the process is terminated. So by using this system need of ATM card is completely eliminated we can operate the ATM machine by using our SIM itself. By using this system malfunctions can be avoided. Our transaction will be much secured. One more application can also be added in this system for helping the blind people. In the existing system all the transactions are done through keyboard only. It may be difficult for blind people so we can also add voice annunciation to indicate each and very process to the blind people. It that enables a visually and/or hearing impaired individual to conveniently and easily carry out financial transactions or banking functions.
  • 3. 1896 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server 2. EXISTING SYSTEM Existing ATMs are convenient and easy to use for most consumers. Existing ATMs typically provide instructions on an ATM display screen that are read by a user to provide for interactive operation of the ATM. Having read the display screen instructions, a user is able to use and operate the ATM via data and information entered on a keypad. The drawback in the existing system is that the user should carry their ATM card without fail. However in many cases we forget it. So only we designed a system which helps us to use the ATM machine without the ATM card. Figure 1: Block diagram of secure real time embedded system for ATM The customize acquisitions, access the built-in features of hardware devices, and incorporate the analysis and visualization features of MATLAB and related toolboxes into your design. You can analyze or visualize your data, save it for post-processing, and make iterative updates to your test setup based on your analysis results. Data Acquisition Toolbox allows you to use MATLAB as a single, integrated environment to support the entire data acquisition, data analysis, and application development process. Data Acquisition Toolbox also supports Simulink with blocks that enable you to incorporate live data or hardware configuration directly into Simulink models. You can then verify and validate your model against live, measured data as part of the system development process. 3. SURVEY REVIEW 1. Jain, A.K. give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns. The purpose of such schemes is to ensure that the rendered services are accessed
  • 4. 1897 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. 2. Jae Young Choi proposed annotation method has been evaluated using a variety of photo sets. The photo sets were constructed using 1385 photos from the MPEG-7 Visual Core Experiment 3 (VCE-3) data set and approximately 20000 photos collected from well-known photo-sharing websites. The reported experimental results show that the proposed face annotation method significantly outperforms traditional face annotation solutions at no additional computational cost, with accuracy gains of up to 25% for particular cases. 3. Bowyer, K.W analyze the interplay of technical and social issues involved in the widespread application of video surveillance for person identification. 4. Jie Zou implemented a complete face recognition system by integrating the best option of each step. Without training, illumination compensation and without any parameter tuning, it achieves superior performance on every category of the FERET test: near perfect classification accuracy (99.5%) on pictures taken on the same day regardless of indoor illumination variations, and significantly better than any other reported performance on pictures taken several days to more than a year apart. The most significant experiments were repeated on the AR database, with similar results. 5. Yu Su evaluates the proposed method using two large-scale face databases: FERET and FRGC version 2.0. Experiments show that the results of our method are impressively better than the best known results with the same evaluation protocol. 4. EFFECTIVENESS OF COLOR LOCAL TEXTURE FEATURES FOR FR Here, we compare the FR using the proposed color local texture features with the FR using gray scale texture features and the FR using only color information. For FR using gray scale texture features, only luminance information is applied to extract gray scale Gabor wavelet or LBP features. In our experiments, the channel from color space was adopted for extracting gray scale texture features. For FR using only color information, given different color component images, individual color-component vectors were first generated in the form of a column vector by lexicographic ordering of the pixel elements of corresponding color-component images. In order to guarantee fair and stable comparisons with the method using this color local texture features, the low-dimensional features of these color-component vectors were then combined at the level of features. The resulting concatenated features are applied to FR. In order to validate the advantage of making use of the feature-level fusion approach to combining color local texture features, we report the experimental results obtained using the pro-posed feature-level fusion, as well as using the decision-level fusion. For the case of using the decision-level fusion, a sigmoid function followed by a sum normalization method was used to normalize the matching scores (e.g., distance scores). Also, the sum rule was adopted for combining these multiple matching scores at the decision level. It has been shown in that
  • 5. 1898 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server the sum rule achieves the best classification performance in comparison with other decision-level fusion strategies, such as product and median rules. In the following three subsections, we present comparative experimental results to validate the effectiveness of color local texture features for FR under variations in illumination, pose, and resolution, respectively. 5. EXPERIMENTAL RESULT In this the information about what the results are going to come at computer end. Image Processing Toolbox provides a comprehensive set of reference-standard algorithms and graphical tools for image processing, analysis, visualization, and algorithm development. Figure 2: ATM Banking window Figure 3: ATM Banking window
  • 6. 1899 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server Figure 4. Transition Complete Window 6. CONCLUSION In the proposed web server based secure real time embedded system for ATM, effective alert unit, process allusion module, mobile communication technologies. In this system each processing information produces by voice annunciation module. This process is effective for security, banking and data transferring application. In proposed two effective Color local texture features, i.e., CLBP and CLGW. In this paper it is suggested the feature-level fusion approach, which maximizes their complementary effect in the context of FR. The important result is the paper is color local texture features allows for a significant improvement in the FR accuracy. 7. REFERENCES [1] K. W. Bowyer, “Face recognition technology: Security versus privacy,” IEEE Technol. Soc. Mag., vol. 23, no. 1, pp. 9–19, Spring 2004. [2] A. K. Jain, A. Ross, and S. Prabhaker, “An introduction to biometric recognition,” IEEE Trans. Circuits Syst. Video Technol., vol. 14, no. 1, pp. 4–20, Jan. 2004. [3] J. Y. Choi, W. De Neve, Y. M. Ro, and K. N. Plataniotis, “Automatic face annotation in photo collections using context-based unsupervised clustering and face information fusion,” IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 10, pp. 1292–1309, Oct. 2010. [4] J. Zou, Q. Ji, and G. Nagy, “A comparative study of local matching approach for face recognition,” IEEE Trans. Image Process., vol. 16, no. 10, pp. 2617–2628, Oct. 2007. [5] Y. Su, S. Shan, X. Chen, and W. Gao, “Hierarchical ensemble of global and local classifiers for face recognition,” IEEE Trans. Image Process., vol. 18, no. 8, pp. 1885–1896, Aug. 2009. [6] S. Xie, S. Shan, X. Chen, and J. Chen, “Fusing local patterns of Gabor magnitude and phase for face recognition,” IEEE Trans. Image Process., vol. 19, no. 5, pp. 1349–1361, May 2010. [7] C. Liu and H. Wechsler, “Gabor feature based classification using the enhanced fisher linear dis criminate model for face recognition,” IEEE Trans. 999999I9m age Process., vol. 11, no. 4, pp. 467–476, pr. 2002. [8] T. Ahonen, A. Hadid, and M. Pietikainen, “Face description with local binary pattern: Application to face recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, no. 12, pp. 2037–2041, Dec. 2006.
  • 7. 1900 ISSN: 2347-1697 International Journal of Informative & Futuristic Research (IJIFR) Volume - 3, Issue -6, February 2016 Continuous 30th Edition, Page No.:1894-1900 Snehal A. Ahire, Prof. D. D. Dighe :: Secure Real Time Embedded System For ATM Using Web Server [9] C. Zhu, C. E. Bichot, and L. Chen, “Multi-scale color local binary pat-terns for visual object classes recognition,” in Proc. IEEE ICPR, 2010, pp. 3065– 3068. [10] C. H. Chan, J. Kittler, and K. Messer, “Multispectral local binary pat-tern histogram for component-based color face verification,” in Proc. IEEE Int. Conf. BTAS, 2007, pp. 1–7. [11] A. Drimbarean and P. F. Whelan, “Experiments in colour texture anal-ysis,” Pattern Recognit. Lett., vol.22, no. 10, pp. 1161–1167, Aug. 2001. [12] V. Perlibakas, “Distance measures for PCA-based face recognition,” Pattern Recognit. Lett., vol. 25, no. 6, pp. 711–724, Apr. 2004. [13] X. Jiang, B. Mandal, and A. Kot, “Eigen feature regularization and ex-traction in face recognition,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 30, no. 3, pp. 383–394, Mar. 2008. [14] V. Perlibakas, “Distance measures for PCA-based face recognition,” Pattern Recognit. Lett., vol. 25, no. 6, pp. 711–724, Apr. 2004. [15] C. L. Liu, “Classifier combination based on confidence transformation,” Pattern Recognit., vol. 38, no. 1, pp. 11–28, Jan. 2005.