SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1087
Artificial Intelligence based Smart ATM
Ankita Mahajan1, Radhika Mande1, Avinash Mhaske1, Parth Shete1, Dr. S. B. Dhoot2
1Polytechnic Scholar, Electronics and Telecommunication Department, Government Polytechnic Aurangabad,
Maharashtra, India
2Professor, Electronics and Telecommunication Department, Government Polytechnic Aurangabad,
Maharashtra, India
----------------------------------------------------------------------------***-------------------------------------------------------------------------
ABSTRACT - In the modern world we are witnessing ATM
system for performing financial transactions to withdraw
money, to transfer money, to check saving account and so
on. The current ATM system uses ATM card and PIN for
authentication purpose. This system suspects too many
security issues. So in this paper we are proposing an
advanced ATM security system to avoid theft into ATM.
Using fingerprint authentication for accessing the user
account using his unique id given in the bank details. In this
process, bankers will collect customers fingerprint, mobile
number, email and name. This personal details of a specific
user will be stored into back end that is in the banks
database. This insures developed system more secured
rather than current system which uses just on identification
we are proposing some more additional features such as
automatic door mechanism during theft with message to
cops and alarming simultaneously. Image processing is used
in CCTV as well as cash tray. Artificial inelegance program is
used to remove illiteracy and to make interaction easy. The
main objective of proposed system is to avoid a theft and
instead of relying on pin number as a security the multiple
layers of security is enhanced and implemented.
Key Words: ATM, biometric, GSM, image processing,
artificial intelligence.
1. INTRODUCTION
ATM is an automated teller machine which is a
computerized telecommunication device that provides
customer with access to financial transactions in public
space without the need for human clerk or bank teller. The
first ATM was installed in Enfield town in London on June
27, 1967 by Barclays bank. ATM’s are named by various
other names like automated transaction Machine,
Automated Banking Machine, Cash point (at Britain), Hole
in the wall, Ban comet (In Europe and Russia), Any time
money (India)[5]. In modern world, money is required at
any time or anywhere for travelling, shopping and health
emergencies we need to carry Money. It increases the risk
of robbery at any instant, where bank is the safest place to
keep our money .It provides automated teller machine
(ATM) which can provide money at any time at any
location .So ATM has provided us with all the benefits .We
are encouraged here to add some more sorts of security
features inside the current ATM system and so through this
paper we are proposing here further security by adding
secondary stage of prevention to the current ATM system
and to the existing security system by using biometric
authentication and AI for easy interaction . Authentication
and verification has always been the part to worry about
security and confidentiality of the consumers. In rapid
changing world it is not easy to maintain integrity and
authenticity of a person. To prevent the frauds we need
some full proof security solutions which we can use along
with current available technology. We are using artificial
intelligence Biometric authentication, automatic door lock
system, image processing inside cash tray for detection of
insufficient funds and currency scanning so that the torn
notes will be scanned and removed. Also using this feature
we will limit the mass entry inside ATM room by detecting
number of heads. Combinations of all these technologies
may help in reducing the ATM frauds and hence can
improve the security level of other financial transactions.
2. LITERATURE SURVEY
2.1 Biometric authentications to control ATM theft-[2]
In this paper it is proposed that the way banking and
transaction system is changing in the world ,the validation,
authentication and confirmation of a person is very
important and should be of more concern .So biometric is
one of the best solution for security of the system and can
be added to maintain authentication and confidentiality.
Instead of going just for PIN identification and verification
fingerprint scanning, iris scan, palm scanning can be used.
Even we can use voice recognition. Combinations of such
technologies may help in reducing the ATM frauds and
hence can improve the security level of other financial
transactions .There are many ways of biometric scanning
these are
• Fingerprint verification
• Face recognition
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1088
• Scanning of retina
• Scanning of hand geometry
• Scanning of vein geometry
• Iris scanning
• Signature biometrics
• Voice analysis
2.2 Card less ATM system: In this paper it is
proposed to add embedded system that uses Biometric or
PIN identification. ATM system is susceptible to many
types of frauds such as theft of ATM card, Lebanese Loop,
Skimming etc. This system will maintain the personal
information of a user inside the bank’s database at the back
end .Fingerprint of the entire user who wishes to access
account are taken. This system first fetches the fingerprint
of a specific user who wish to perform transaction .If
fingerprint is matched then user will get direct access
without performing PIN procedure or any other procedure.
If password or fingerprint matches then the required
transaction can be performed [6].
3. EXISTING METHOD
When ATM card is inserted into card slot the information
present on the magnetic strip is read by two card readers
present in the card slot. One card reader looks for special
code which confirms that card is real. Second card reader
grabs account number and password to check against what
you entered. If authentication is successful then ATM
connects with bank server through telephone network.
Now user can perform bank transactions and when
transaction is completed card comes out through ATM slot
and user automatically logs out. Counting machine is
present to count number of notes and receipt comes
through printer which gives you information about
transaction completed.
• User needs to perform one of the following
transactions:
1. Cash transfer
2. Cash Withdraw
3. Balance Enquiry
4. Password change
This is just general method of what happens.
4. PROBLEM STATEMENT
There are several methods through person can hack into
the customer’s account can steal the money from the
customer’s account. This is as follows:
1. Skimming: A device is been installed into the card slot
and all the information is read from onto the card. A small
pinhole camera is fixed above the keypad which takes up
all this information. By the help of this information a
duplicate card is made by the criminal and can access the
customer’s account.
2. Lebanese Loop: In this type of fraud, the criminal installs
the device due to which card gets locked into the slot the
time when transaction completes that time the machine
pushes out the card now since the card is locked. The
customer moves away from his place for complaining and
by the time criminals comes out and will unlock the card
and will draw all the money from users account.
3. Lost or stolen card: If the card is lost or stolen that time
too there is possibility that users account can be access by
criminal.
By many such techniques criminals can access your
account. If biometric with some additional security is used
then these frauds can be minimized.
5. PROPOSED METHOD
In our proposed system, in addition with biometric we are
accessing some of the more features inside an ATM system
like
• Automatic door lock
• AI based image processing and currency scanning
• Voice accessible machine using AI
• Insufficient deposits in a tray can be detected
• Message to the cops if something wrong is detected by
using GSM module
Fig.1 Block diagram of proposed method.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1089
 Limitation system- In this system it contains CCTV
as a hardware part and image processing as a
software part in which system detects number of
heads present in ATM room and limit the person
entry as desired by bank rules .
 AI process – CCTV sends signals to the ATM
machine where AI responds to the extra head to go
out and wait and it also welcomes the user.
 Biometric recognition – As the information of the
user is already stored on cloud via bank. Using this
technology time will be saved and user can get
access only with biometrics and doesn’t need to
follow the old long procedure.
 AI instruction- Here without touching the ATM
machine or buttons user uses voice commands to
withdraw money or any other activity. User can
access by speaking local languages.
 Image processing – This technique is used inside
cash tray of ATM machine for detection of
insufficient funds and torn notes.
 GSM – The GSM module will send message to user
and bank for withdrawal of money.
Fig 2 – Block diagram for avoiding theft
 Auto door lock mechanism – During theft either
CCTV or motion sensor will detect illegal action.
Signal to the stepper motor will be given to lock
the door.
 GSM- As soon as illegal motion is detected
message or ring to the nearest cop station will be
sent.
 ALARM- As soon as illegal motion is detected
alarm will start to buzz for residents nearby.
 Moreover, the machine can be operated by blind
persons. If found disabled, the mechanism could
improve the accessibility of ATMs for handicapped
people.
Components Required:
1. R305 fingerprint sensor
2. Arduino UNO
3. GSM Module
4. Motion sensor
5. Camera
6. Stepper Motor
7. Buzzer Alarm
5. FUTURE SCOPE
▪QR code recognition.
▪scanning of microchip on ATM card
▪releasing chloroform via air conditioner during theft
whenever illegal moments
Are detected.
▪If the person who can’t speak will perform transaction
by the use of actions that webcam will detect and AI
will respond
CONCLUSION:
The problem of ATM theft and misuse of ATM card has become a major source problem in the society. From the above
conceptual model it has been cleared that biometric ATM system is highly secured as it provides authentication. Multimode
biometric can be implemented to enhance the security level of the ATM organization [4].This paper identifies a high level
model for the modification of existing ATM system by updating biometric authentication, automatic Door lock, AI based image
processing and currency scanning system.
REFERENCES
1. Multi authentication ATM theft prevention using ibeacon- Manoj V, Moulishankar R, Sasipriya S, Usha Devi E, Devika
t.UG student knowledge institute of technology, Salem.
2. ”Biometric authentications to control ATM theft” Ahmad Tasnim Siddiqui, College of computers and IT Taif University,
Kingdom of Saudi Arabia.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1090
3. ATM security using fingerprint authentication and OTP-Aruna r, Sudha v, Shruthi G,Usha Rani R, Sushma V
,Department of electronics and telecommunication Engineering, Shri Sairam College of Engineering, Anekal,
Bangalore.
4. A Biometric based ATM Security System using RFID & GSM Technology, India
5. S.Naga Gowri1 | R.Durga Devi2 | P.Gowshalya3 1, 2,3UG Scholars, Department of ECE, Roever Engineering College,
Perambalur, India www.ijsrp.com ATM security by kavita Hooda
6. Cardless ATM system-Rushikesh Kulkarni (B.E.) | Muzammil Madki (B.E.) | Tejas Mapari (B.E.)

Mais conteúdo relacionado

Mais procurados

Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURERadhika Venkat
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 

Mais procurados (20)

Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm security
Atm securityAtm security
Atm security
 
project_report
project_reportproject_report
project_report
 
Atm security
Atm securityAtm security
Atm security
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
E010313141
E010313141E010313141
E010313141
 
Atm security
Atm securityAtm security
Atm security
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
14 581
14 58114 581
14 581
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 

Semelhante a IRJET- Artificial Intelligence based Smart ATM

BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 

Semelhante a IRJET- Artificial Intelligence based Smart ATM (20)

Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
D0351022026
D0351022026D0351022026
D0351022026
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATMIRJET - Artificial Intelligence and Aadhaar Based Smart ATM
IRJET - Artificial Intelligence and Aadhaar Based Smart ATM
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringJuanCarlosMorales19600
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 

Último (20)

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Piping Basic stress analysis by engineering
Piping Basic stress analysis by engineeringPiping Basic stress analysis by engineering
Piping Basic stress analysis by engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 

IRJET- Artificial Intelligence based Smart ATM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1087 Artificial Intelligence based Smart ATM Ankita Mahajan1, Radhika Mande1, Avinash Mhaske1, Parth Shete1, Dr. S. B. Dhoot2 1Polytechnic Scholar, Electronics and Telecommunication Department, Government Polytechnic Aurangabad, Maharashtra, India 2Professor, Electronics and Telecommunication Department, Government Polytechnic Aurangabad, Maharashtra, India ----------------------------------------------------------------------------***------------------------------------------------------------------------- ABSTRACT - In the modern world we are witnessing ATM system for performing financial transactions to withdraw money, to transfer money, to check saving account and so on. The current ATM system uses ATM card and PIN for authentication purpose. This system suspects too many security issues. So in this paper we are proposing an advanced ATM security system to avoid theft into ATM. Using fingerprint authentication for accessing the user account using his unique id given in the bank details. In this process, bankers will collect customers fingerprint, mobile number, email and name. This personal details of a specific user will be stored into back end that is in the banks database. This insures developed system more secured rather than current system which uses just on identification we are proposing some more additional features such as automatic door mechanism during theft with message to cops and alarming simultaneously. Image processing is used in CCTV as well as cash tray. Artificial inelegance program is used to remove illiteracy and to make interaction easy. The main objective of proposed system is to avoid a theft and instead of relying on pin number as a security the multiple layers of security is enhanced and implemented. Key Words: ATM, biometric, GSM, image processing, artificial intelligence. 1. INTRODUCTION ATM is an automated teller machine which is a computerized telecommunication device that provides customer with access to financial transactions in public space without the need for human clerk or bank teller. The first ATM was installed in Enfield town in London on June 27, 1967 by Barclays bank. ATM’s are named by various other names like automated transaction Machine, Automated Banking Machine, Cash point (at Britain), Hole in the wall, Ban comet (In Europe and Russia), Any time money (India)[5]. In modern world, money is required at any time or anywhere for travelling, shopping and health emergencies we need to carry Money. It increases the risk of robbery at any instant, where bank is the safest place to keep our money .It provides automated teller machine (ATM) which can provide money at any time at any location .So ATM has provided us with all the benefits .We are encouraged here to add some more sorts of security features inside the current ATM system and so through this paper we are proposing here further security by adding secondary stage of prevention to the current ATM system and to the existing security system by using biometric authentication and AI for easy interaction . Authentication and verification has always been the part to worry about security and confidentiality of the consumers. In rapid changing world it is not easy to maintain integrity and authenticity of a person. To prevent the frauds we need some full proof security solutions which we can use along with current available technology. We are using artificial intelligence Biometric authentication, automatic door lock system, image processing inside cash tray for detection of insufficient funds and currency scanning so that the torn notes will be scanned and removed. Also using this feature we will limit the mass entry inside ATM room by detecting number of heads. Combinations of all these technologies may help in reducing the ATM frauds and hence can improve the security level of other financial transactions. 2. LITERATURE SURVEY 2.1 Biometric authentications to control ATM theft-[2] In this paper it is proposed that the way banking and transaction system is changing in the world ,the validation, authentication and confirmation of a person is very important and should be of more concern .So biometric is one of the best solution for security of the system and can be added to maintain authentication and confidentiality. Instead of going just for PIN identification and verification fingerprint scanning, iris scan, palm scanning can be used. Even we can use voice recognition. Combinations of such technologies may help in reducing the ATM frauds and hence can improve the security level of other financial transactions .There are many ways of biometric scanning these are • Fingerprint verification • Face recognition
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1088 • Scanning of retina • Scanning of hand geometry • Scanning of vein geometry • Iris scanning • Signature biometrics • Voice analysis 2.2 Card less ATM system: In this paper it is proposed to add embedded system that uses Biometric or PIN identification. ATM system is susceptible to many types of frauds such as theft of ATM card, Lebanese Loop, Skimming etc. This system will maintain the personal information of a user inside the bank’s database at the back end .Fingerprint of the entire user who wishes to access account are taken. This system first fetches the fingerprint of a specific user who wish to perform transaction .If fingerprint is matched then user will get direct access without performing PIN procedure or any other procedure. If password or fingerprint matches then the required transaction can be performed [6]. 3. EXISTING METHOD When ATM card is inserted into card slot the information present on the magnetic strip is read by two card readers present in the card slot. One card reader looks for special code which confirms that card is real. Second card reader grabs account number and password to check against what you entered. If authentication is successful then ATM connects with bank server through telephone network. Now user can perform bank transactions and when transaction is completed card comes out through ATM slot and user automatically logs out. Counting machine is present to count number of notes and receipt comes through printer which gives you information about transaction completed. • User needs to perform one of the following transactions: 1. Cash transfer 2. Cash Withdraw 3. Balance Enquiry 4. Password change This is just general method of what happens. 4. PROBLEM STATEMENT There are several methods through person can hack into the customer’s account can steal the money from the customer’s account. This is as follows: 1. Skimming: A device is been installed into the card slot and all the information is read from onto the card. A small pinhole camera is fixed above the keypad which takes up all this information. By the help of this information a duplicate card is made by the criminal and can access the customer’s account. 2. Lebanese Loop: In this type of fraud, the criminal installs the device due to which card gets locked into the slot the time when transaction completes that time the machine pushes out the card now since the card is locked. The customer moves away from his place for complaining and by the time criminals comes out and will unlock the card and will draw all the money from users account. 3. Lost or stolen card: If the card is lost or stolen that time too there is possibility that users account can be access by criminal. By many such techniques criminals can access your account. If biometric with some additional security is used then these frauds can be minimized. 5. PROPOSED METHOD In our proposed system, in addition with biometric we are accessing some of the more features inside an ATM system like • Automatic door lock • AI based image processing and currency scanning • Voice accessible machine using AI • Insufficient deposits in a tray can be detected • Message to the cops if something wrong is detected by using GSM module Fig.1 Block diagram of proposed method.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1089  Limitation system- In this system it contains CCTV as a hardware part and image processing as a software part in which system detects number of heads present in ATM room and limit the person entry as desired by bank rules .  AI process – CCTV sends signals to the ATM machine where AI responds to the extra head to go out and wait and it also welcomes the user.  Biometric recognition – As the information of the user is already stored on cloud via bank. Using this technology time will be saved and user can get access only with biometrics and doesn’t need to follow the old long procedure.  AI instruction- Here without touching the ATM machine or buttons user uses voice commands to withdraw money or any other activity. User can access by speaking local languages.  Image processing – This technique is used inside cash tray of ATM machine for detection of insufficient funds and torn notes.  GSM – The GSM module will send message to user and bank for withdrawal of money. Fig 2 – Block diagram for avoiding theft  Auto door lock mechanism – During theft either CCTV or motion sensor will detect illegal action. Signal to the stepper motor will be given to lock the door.  GSM- As soon as illegal motion is detected message or ring to the nearest cop station will be sent.  ALARM- As soon as illegal motion is detected alarm will start to buzz for residents nearby.  Moreover, the machine can be operated by blind persons. If found disabled, the mechanism could improve the accessibility of ATMs for handicapped people. Components Required: 1. R305 fingerprint sensor 2. Arduino UNO 3. GSM Module 4. Motion sensor 5. Camera 6. Stepper Motor 7. Buzzer Alarm 5. FUTURE SCOPE ▪QR code recognition. ▪scanning of microchip on ATM card ▪releasing chloroform via air conditioner during theft whenever illegal moments Are detected. ▪If the person who can’t speak will perform transaction by the use of actions that webcam will detect and AI will respond CONCLUSION: The problem of ATM theft and misuse of ATM card has become a major source problem in the society. From the above conceptual model it has been cleared that biometric ATM system is highly secured as it provides authentication. Multimode biometric can be implemented to enhance the security level of the ATM organization [4].This paper identifies a high level model for the modification of existing ATM system by updating biometric authentication, automatic Door lock, AI based image processing and currency scanning system. REFERENCES 1. Multi authentication ATM theft prevention using ibeacon- Manoj V, Moulishankar R, Sasipriya S, Usha Devi E, Devika t.UG student knowledge institute of technology, Salem. 2. ”Biometric authentications to control ATM theft” Ahmad Tasnim Siddiqui, College of computers and IT Taif University, Kingdom of Saudi Arabia.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 11 | Nov 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1090 3. ATM security using fingerprint authentication and OTP-Aruna r, Sudha v, Shruthi G,Usha Rani R, Sushma V ,Department of electronics and telecommunication Engineering, Shri Sairam College of Engineering, Anekal, Bangalore. 4. A Biometric based ATM Security System using RFID & GSM Technology, India 5. S.Naga Gowri1 | R.Durga Devi2 | P.Gowshalya3 1, 2,3UG Scholars, Department of ECE, Roever Engineering College, Perambalur, India www.ijsrp.com ATM security by kavita Hooda 6. Cardless ATM system-Rushikesh Kulkarni (B.E.) | Muzammil Madki (B.E.) | Tejas Mapari (B.E.)