SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 806
Transactions Using Bio-Metric Authentication
1Dr.D. Thamaraiselvi, 2Sankaramanchi Seshadri Sarma, 3Ponguru Praveen Chandu
1Asst.Professor, Dept. of Computer Science and Engineering, SCSVMV University, Tamil Nādu, India
2Dept. of Computer Science and Engineering, SCSVMV University
3Dept. of Computer Science and Engineering, SCSVMV University
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In previous ATM systems, mostly personal
identification number (PIN) is used to verify authentic users
which are not secured, and it is very easy to copy. Sometimes
thieves have a very strong way to steal our account
information, that’s why a biometric verification systemcanbe
a firm solution. This paper aims to provide a more secure
method using biometric features. PIN verification is combined
with face recognition in our proposed method to identify a
customer during an ATM transaction. Facial data is verified
using the Haarcascade Frontal algorithm. To assure security
while doing transactions through a swipe machine, the client
will confirm the transaction through Facial technology's
approval message. In both cases, the Face will be identified
through a Camera. If any illegitimate person tries to use the
card it will automatically be blocked by the system and
detailed information will besenttothecustomerthrough Mail.
Hence, this proposed method will provide more advanced
security by identifying and reducing fraud.
Key Words: ATM, Bio-metric, face, Transaction, card
1. INTRODUCTION
The faster improvement of information and communication
engineering has affected every aspect of humanlifeinrecent
years. Therefore, the way of dealing with banking activities
has also been changed. ATM is an automatic technique that
enables the customers to do economical transactions like
swift cash out, fund transfer, balance inquiry, savings
withdrawal from anywhere anytime without the aid of a
branch representative or teller. To access the account from
ATM systems, customers need to hold a debit or credit card
on that bank account. Today to pay shopping bills, phone,
electricity, gas bills and many more people prefer debit or
credit cards most of the time as these cards make sure
immediate and simple access to their accounts. A swipe
machine also known as electronic data capture(EDC)isused
to do this type of transaction. To pay for the things or to
complete the transaction, users just need to swipe the debit
or credit card through the machine. All customer data is
encoded into the magnetic strip on the card and before
completing the transactionmachinereadsthemagneticstrip
to verify card no, date of expiration, and otherfeaturesofthe
customer. Personal Identification Number (PIN) is an
important aspect of both ATM and EDC security schemes as
it is usually applied to protect the monetary informationofa
user from illicit access, but only PIN has not been able to
make sure the security of the transactions. Bio-metric
features can be a solution to this kind of problem. Among all
biometric features, a face is recognized as a secured and
proven technique. A person’s individuality is defined by
characteristics and relationships.it can be used as an
authentic identification process.Inthisregard,ourproposed
method is based on biometric features and message
authentication technology to improve security. Here, face
identification is checked along with PIN verification to
recognize the genuine user during anATMtransaction. Since
it is impossible to replicate biometric features like face, to
solve the authentication problem, this proposal can be a
good solution. During shopping or payment through a swipe
machine, the client will get a confirmation Mail through
SMPT technology on his/her MailIDwhichisregistered with
the bank to approve the transaction. To identify the
illegitimate/fraudulent customer in both cases, the location
will also be tracked using a GPS modem during the
transaction. This will help to reduce the possibility of
abduction and redouble the security of ATM and swipe
machine
2. LITERATURE SURVEY:
Balvir proposed a model of designing an embedded system
to improve ATM security. Serial communication is managed
by the system to scan the cardholder’s database, which then
immediately generates messages to the mobile of the
authorized users through the 89C51 microcontroller-
connected GSM module. The main purpose of the paper
proposed by Bharati M Nelligani is to make practical and
effective usage of embedded systems and advanced
technologies to design a smart ATM security system. In this
paper, an IR sensor is used to realize the appearance of the
card owner and face to identify and verify the legal
customer. A variety of sensors and cameras are used to
capture security-related information which is further
analyzed and dispatched to the central main server to
experiment. Utilizing this information obtained from
different ATMs, a statistical vulnerabilitytest will bedone by
the system, and vulnerability software is assigned to all
ATMs. The proposed scheme focuses on saving time and
solving a very sensitive issue of the system. If the userswant
to know their balance, then also they need to go through the
verification system. This model proves that fraudsters will
never gain any advantages from the system. Hence, the
security will never be compromised. Increase the safety of
electronic money transfer via EDC an embedded fingerprint
technique with PIN has been introduced. It’s a design to
secure swipe card transactions by applying bio-metric
features like facial identification with traditional PIN. There
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 807
are a variety of methods to raise the safety of thetransaction
using a bio-metric recognition system. In this given model
PIN is completely replaced with a biometric system such as
facial, e-fingerprint, retina, and so on
3. PROBLEM STATEMENT:
In the existing system, we use a debit or ATM card atanATM
Machine or POS machine, Customers can withdraw cash
from accounts, make a deposit or transfer money from one
account to another or perform any otherfunctionswhich are
not highly secured
4. PROPOSED METHOD:
In this proposed system, not only the valid cardholder is
allowed only by the knowledge of the accountholderanyone
can enter the ATM by using the account holder’sATMcard.If
any unauthorized person is inserted ATM card, their picture
with one OTP will be sent to account holders mail, only after
entering that OTP in the system it will allow the user to
withdraw the money.
5. ADVANTAGES:
1. It is very secure compared to credit or debit card
payments.
2. Very fast transactions would take place in less than
a second.
3. We can transact at most of the places just with Face
6. METHODOLOGY:
In our proposed system, once the consumer inserts the card
into an ATM, the card reader readstheinformationstored on
the magnetic stripe of the card and then passes it to the host
processor for confirmation. The host processor
communicates with the bank database to get detailed
account information. If everythingisokay, thenthecustomer
is asked to press a 4-digit PIN which is then compared with
the PIN encrypted into the magnetic stripe onthecard.Here,
authentication is done by verifying both personal
identification numbers (PINs) and matching the face. If PIN
verification is okay, then the customer’s facial image is
scanned at the ATM terminal and verifiedusingHaarcascade
Algorithm features which are the best face recognition
algorithm. After that, EFT (electronic fund transfer) occurs
from the customer's account to the processor's account, and
a code of approval is sent to the ATM to withdraw cash.Each
useful information must be provided to affect the
transaction. If a face doesn’t match the first time, the
customer will get two more chances to match the face. But if
the face is invalid consecutive three times, thentomakesure
whether the customer is valid or not, the system will ask
him/her for date-of-birth and phone number. If the
information is okay means the customer is legal, but if the
information is wrong then the system will understand that
an illegal user is trying to access the account. Therefore, it’ll
block the card. After blocking the card, the system will
automatically inform the customer about the corruption
along with details such as device number, So, the customer
will be able to take the necessary steps.
7. ALGORITHM:
Step-1: Start
Step-2:user Stands Infront of a Machine
Step-3: reads the Face Data of the user
Step-4: if the face matches with the bank database it
continues with transaction type
Step-5: else it rejects the transaction
Step-6: continues with the transaction or rejection
Step-7: Stop
8. FLOWCHART:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 808
9. BLOCK DIAGRAM:
10. BLOCK DIAGRAM CLASSIFICATION:
Web camera is connected to the raspberry pi to capture the
image, if some person enters the ATM, camerasgettriggered
and capture the image of that person, to compare with the
database.
11. PROJECT DESCRIPTION:
This project consists of a raspberry pi module and a camera
to scan the facial data of the customer in Infront of the ATM.
12. WORKING:
1. When a customer places a card on any pos/ATM or
at any merchant
2. It will scan the face details and decodes the data
entered by the bank
3. Now it will search the decodeddata intheparticular
bank’s database.
4. If the details of the face and details in the bank
database are matched
5. Then it will debit the certain amount entered by the
merchant
6. And the transaction will show successful
7. If there is a mismatch in details, It will be a failed
transaction and This process will just complete in
seconds.
13. OUTPUTS:
HOMEPAGE:
OUR USERS:
TRANSACTION PAGE:
TRANSACTION HISTORY:
DATABASE:
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 809
FACE RECOGNITION:
MAIL IMAGE:
14. CONCLUSION:
The growing result of electronic transactions increases the
demand for making more secure and reliable transaction
systems. Yet money theft, identity theft is becoming a threat
in the banking system. So, it’s very important to determine
the authentic user properly to safeguard against all kinds of
technical attacksandintrusions.Bycombiningbiometric and
mail authentication technology along with the existing
systems our proposed model can produce a very effective
and well-protected methodology to increase both ATM and
swiping machine security. But it can’t predict the breach in
security before the occurrences which are also very
important. We plan to build a real-time monitoring system
along with an enhanced security system based on more bio-
metric features like iris patterns, retina scan, signature
biometrics, etc., and an efficient message authentication
algorithm.
REFERENCES
1. Onyesolu MO, and Ezeani IM, “ATM Security Using
Fingerprint Bio-metric Identifier: An Investigative
Study,” International Journal ofAdvancedComputer
Science and Applications, 2012, Vol. 3, no.4, pp. 68–
72.
2. Daniel Peralta, Mikel Galar, Isaac Triguero, Oscar
Miguel-Hurtado, Jose M. Benitez, and Francisco
Herrera, “Minutiae filteringtoimprove bothefficacy
and efficiency of fingerprint matching
algorithms,” Engineering Applications of Artificial
Intelligence, June 2014, Volume 32, Pages 37-53
3. S.P. Balwir, K.R. Katole, R.D. Thakare, N.S.
Panchbudhe, and P.K. Balwir, "Secured ATM
Transaction System Using Micro-Controller",
International Journal of Advanced Research in
Computer Science and Software Engineering, April
2014, vol. 4, no. 4, pp. 1358-1362.
4. Bharati M Nelligani, Dr. N V Uma Reddy, and
Mr.NithinAwasti, “Smart ATM Security System
Using FPR, GSM, GPS”, International Conference on
Inventive Computation Technologies(ICICT),26-27
Aug. 2016.

Mais conteúdo relacionado

Semelhante a Transactions Using Bio-Metric Authentication

IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSJournal For Research
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET Journal
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe RegionIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 

Semelhante a Transactions Using Bio-Metric Authentication (20)

IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
project_report
project_reportproject_report
project_report
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 

Mais de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mais de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Último

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 

Último (20)

Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 

Transactions Using Bio-Metric Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 806 Transactions Using Bio-Metric Authentication 1Dr.D. Thamaraiselvi, 2Sankaramanchi Seshadri Sarma, 3Ponguru Praveen Chandu 1Asst.Professor, Dept. of Computer Science and Engineering, SCSVMV University, Tamil Nādu, India 2Dept. of Computer Science and Engineering, SCSVMV University 3Dept. of Computer Science and Engineering, SCSVMV University ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In previous ATM systems, mostly personal identification number (PIN) is used to verify authentic users which are not secured, and it is very easy to copy. Sometimes thieves have a very strong way to steal our account information, that’s why a biometric verification systemcanbe a firm solution. This paper aims to provide a more secure method using biometric features. PIN verification is combined with face recognition in our proposed method to identify a customer during an ATM transaction. Facial data is verified using the Haarcascade Frontal algorithm. To assure security while doing transactions through a swipe machine, the client will confirm the transaction through Facial technology's approval message. In both cases, the Face will be identified through a Camera. If any illegitimate person tries to use the card it will automatically be blocked by the system and detailed information will besenttothecustomerthrough Mail. Hence, this proposed method will provide more advanced security by identifying and reducing fraud. Key Words: ATM, Bio-metric, face, Transaction, card 1. INTRODUCTION The faster improvement of information and communication engineering has affected every aspect of humanlifeinrecent years. Therefore, the way of dealing with banking activities has also been changed. ATM is an automatic technique that enables the customers to do economical transactions like swift cash out, fund transfer, balance inquiry, savings withdrawal from anywhere anytime without the aid of a branch representative or teller. To access the account from ATM systems, customers need to hold a debit or credit card on that bank account. Today to pay shopping bills, phone, electricity, gas bills and many more people prefer debit or credit cards most of the time as these cards make sure immediate and simple access to their accounts. A swipe machine also known as electronic data capture(EDC)isused to do this type of transaction. To pay for the things or to complete the transaction, users just need to swipe the debit or credit card through the machine. All customer data is encoded into the magnetic strip on the card and before completing the transactionmachinereadsthemagneticstrip to verify card no, date of expiration, and otherfeaturesofthe customer. Personal Identification Number (PIN) is an important aspect of both ATM and EDC security schemes as it is usually applied to protect the monetary informationofa user from illicit access, but only PIN has not been able to make sure the security of the transactions. Bio-metric features can be a solution to this kind of problem. Among all biometric features, a face is recognized as a secured and proven technique. A person’s individuality is defined by characteristics and relationships.it can be used as an authentic identification process.Inthisregard,ourproposed method is based on biometric features and message authentication technology to improve security. Here, face identification is checked along with PIN verification to recognize the genuine user during anATMtransaction. Since it is impossible to replicate biometric features like face, to solve the authentication problem, this proposal can be a good solution. During shopping or payment through a swipe machine, the client will get a confirmation Mail through SMPT technology on his/her MailIDwhichisregistered with the bank to approve the transaction. To identify the illegitimate/fraudulent customer in both cases, the location will also be tracked using a GPS modem during the transaction. This will help to reduce the possibility of abduction and redouble the security of ATM and swipe machine 2. LITERATURE SURVEY: Balvir proposed a model of designing an embedded system to improve ATM security. Serial communication is managed by the system to scan the cardholder’s database, which then immediately generates messages to the mobile of the authorized users through the 89C51 microcontroller- connected GSM module. The main purpose of the paper proposed by Bharati M Nelligani is to make practical and effective usage of embedded systems and advanced technologies to design a smart ATM security system. In this paper, an IR sensor is used to realize the appearance of the card owner and face to identify and verify the legal customer. A variety of sensors and cameras are used to capture security-related information which is further analyzed and dispatched to the central main server to experiment. Utilizing this information obtained from different ATMs, a statistical vulnerabilitytest will bedone by the system, and vulnerability software is assigned to all ATMs. The proposed scheme focuses on saving time and solving a very sensitive issue of the system. If the userswant to know their balance, then also they need to go through the verification system. This model proves that fraudsters will never gain any advantages from the system. Hence, the security will never be compromised. Increase the safety of electronic money transfer via EDC an embedded fingerprint technique with PIN has been introduced. It’s a design to secure swipe card transactions by applying bio-metric features like facial identification with traditional PIN. There
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 807 are a variety of methods to raise the safety of thetransaction using a bio-metric recognition system. In this given model PIN is completely replaced with a biometric system such as facial, e-fingerprint, retina, and so on 3. PROBLEM STATEMENT: In the existing system, we use a debit or ATM card atanATM Machine or POS machine, Customers can withdraw cash from accounts, make a deposit or transfer money from one account to another or perform any otherfunctionswhich are not highly secured 4. PROPOSED METHOD: In this proposed system, not only the valid cardholder is allowed only by the knowledge of the accountholderanyone can enter the ATM by using the account holder’sATMcard.If any unauthorized person is inserted ATM card, their picture with one OTP will be sent to account holders mail, only after entering that OTP in the system it will allow the user to withdraw the money. 5. ADVANTAGES: 1. It is very secure compared to credit or debit card payments. 2. Very fast transactions would take place in less than a second. 3. We can transact at most of the places just with Face 6. METHODOLOGY: In our proposed system, once the consumer inserts the card into an ATM, the card reader readstheinformationstored on the magnetic stripe of the card and then passes it to the host processor for confirmation. The host processor communicates with the bank database to get detailed account information. If everythingisokay, thenthecustomer is asked to press a 4-digit PIN which is then compared with the PIN encrypted into the magnetic stripe onthecard.Here, authentication is done by verifying both personal identification numbers (PINs) and matching the face. If PIN verification is okay, then the customer’s facial image is scanned at the ATM terminal and verifiedusingHaarcascade Algorithm features which are the best face recognition algorithm. After that, EFT (electronic fund transfer) occurs from the customer's account to the processor's account, and a code of approval is sent to the ATM to withdraw cash.Each useful information must be provided to affect the transaction. If a face doesn’t match the first time, the customer will get two more chances to match the face. But if the face is invalid consecutive three times, thentomakesure whether the customer is valid or not, the system will ask him/her for date-of-birth and phone number. If the information is okay means the customer is legal, but if the information is wrong then the system will understand that an illegal user is trying to access the account. Therefore, it’ll block the card. After blocking the card, the system will automatically inform the customer about the corruption along with details such as device number, So, the customer will be able to take the necessary steps. 7. ALGORITHM: Step-1: Start Step-2:user Stands Infront of a Machine Step-3: reads the Face Data of the user Step-4: if the face matches with the bank database it continues with transaction type Step-5: else it rejects the transaction Step-6: continues with the transaction or rejection Step-7: Stop 8. FLOWCHART:
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 808 9. BLOCK DIAGRAM: 10. BLOCK DIAGRAM CLASSIFICATION: Web camera is connected to the raspberry pi to capture the image, if some person enters the ATM, camerasgettriggered and capture the image of that person, to compare with the database. 11. PROJECT DESCRIPTION: This project consists of a raspberry pi module and a camera to scan the facial data of the customer in Infront of the ATM. 12. WORKING: 1. When a customer places a card on any pos/ATM or at any merchant 2. It will scan the face details and decodes the data entered by the bank 3. Now it will search the decodeddata intheparticular bank’s database. 4. If the details of the face and details in the bank database are matched 5. Then it will debit the certain amount entered by the merchant 6. And the transaction will show successful 7. If there is a mismatch in details, It will be a failed transaction and This process will just complete in seconds. 13. OUTPUTS: HOMEPAGE: OUR USERS: TRANSACTION PAGE: TRANSACTION HISTORY: DATABASE:
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 809 FACE RECOGNITION: MAIL IMAGE: 14. CONCLUSION: The growing result of electronic transactions increases the demand for making more secure and reliable transaction systems. Yet money theft, identity theft is becoming a threat in the banking system. So, it’s very important to determine the authentic user properly to safeguard against all kinds of technical attacksandintrusions.Bycombiningbiometric and mail authentication technology along with the existing systems our proposed model can produce a very effective and well-protected methodology to increase both ATM and swiping machine security. But it can’t predict the breach in security before the occurrences which are also very important. We plan to build a real-time monitoring system along with an enhanced security system based on more bio- metric features like iris patterns, retina scan, signature biometrics, etc., and an efficient message authentication algorithm. REFERENCES 1. Onyesolu MO, and Ezeani IM, “ATM Security Using Fingerprint Bio-metric Identifier: An Investigative Study,” International Journal ofAdvancedComputer Science and Applications, 2012, Vol. 3, no.4, pp. 68– 72. 2. Daniel Peralta, Mikel Galar, Isaac Triguero, Oscar Miguel-Hurtado, Jose M. Benitez, and Francisco Herrera, “Minutiae filteringtoimprove bothefficacy and efficiency of fingerprint matching algorithms,” Engineering Applications of Artificial Intelligence, June 2014, Volume 32, Pages 37-53 3. S.P. Balwir, K.R. Katole, R.D. Thakare, N.S. Panchbudhe, and P.K. Balwir, "Secured ATM Transaction System Using Micro-Controller", International Journal of Advanced Research in Computer Science and Software Engineering, April 2014, vol. 4, no. 4, pp. 1358-1362. 4. Bharati M Nelligani, Dr. N V Uma Reddy, and Mr.NithinAwasti, “Smart ATM Security System Using FPR, GSM, GPS”, International Conference on Inventive Computation Technologies(ICICT),26-27 Aug. 2016.