SlideShare uma empresa Scribd logo
1 de 26
Technical Seminar
on
BIOMETRIC IDENTIFICATION IN ATM’S
Under the Guidance of
P.V.R.K.MURTHY, M.Tech
Assistant Professor
Presented By
•Biometric ATM are used for wide range of applications like for
Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type
interface along with at-least one Biometrics capture device like
Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face
recognition camera. They are often called Multi-Biometrics ATM, Wall
mount Biometrics ATM, Biometrics Devices / Machine.
•Most of the ATM in the past have been using ID cards to identify users
but with the wide acceptance of Biometrics , a new generation of
Biometrics ATM are being deployed for wide range of applications
worldwide.
INTRODUCTION
What is Biometrics ?
• The meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
• Biometrics is the science and technology of measuring and
analyzing biological data.
• The first known example of biometrics in practice was a form of
finger printing being used in China in the 14th century.
• Biometrics refers to technologies that measure and analyze human
body characteristics such as DNA, fingerprints, eye retinas and
irises, voice patterns,facial patterns and hand measurments for
authentication purposes.
HOW BIOMETRICS WORKS ?
• Biometrics systems work by recording and comparing biometric
characteristics.
• When an individual first uses a biometric system, their identifying
features are enrolled as a reference for future comparison. This
reference may be stored in a central database or on a card (or both)
depending on the needs of the application.
• When biometric recognition is
required, the individual 's
biometric characteristics are
recorded again. This time
however, the identifying features
are compared by the system with
the stored reference to determine
if there is a close match
TYPES OF BIOMETRICS
HAND
• The three dimensional shape of a
person’s hand has several
advantages as an identification
device.
• Scanning a hand and producing a
result takes 1.2seconds.It requires
little space for data storage about 9
bytes which can fit easily magnetic
strip credit cards.
FINGER PRINT
A fingerprint scanner system has two basic jobs :
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in pre-scanned
images.
• Only specific characteristics, which are unique to every
fingerprint, are filtered and saved as an encrypted biometric key or
mathematical representation.
No image of a fingerprint is ever saved, only a series of numbers
(a binary code), which is used for verification. The algorithm
cannot be reconverted to an image, so no one can duplicate your
fingerprints.
BIOMETRIC SYSTEM
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown
individual.
Verification:
• A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.
• Verification is faster and performs better.
• In a verification, the user must first enter his or her identity to
the biometric system. User ID's can be forgotten and cards can
be lost, making access impossible.
MULTIBIOMETRICS
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION
An automatic personal identification system based on fingerprints or
faces is often not able to meet the system performance requirements.
A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT,
FACE AND SPEECH
This system takes the advantage of the capabilities of each individual
biometric. It can be used to overcome some of the limitations of a single
biometrics.
•ATM Card frauds
•Use of ATM card duplicators
•Card sharing by family and friends
•Inability to trace the wrongful users
•ATM PINs can be shared on phone or recorded
using secret cameras
ISSUES IN CURRENT ATM
NETWORKS
BIOMETRIC ATMS SOLVE
THESE ISSUES & OFF
•Single/Multi factor Biometric Authentication:
Fingerprint, Iris, Face, Pal vein
•Multifactor Authentication: Card + PIN +
Biometrics
•Online or offline Authentication using smart cards
•Card less Authentication
•Biometrics is combination of card or PIN
APPLICATIONS OF BIOMETRIC
ATM
• Banking & Finance
• Food coupons / Tickets / Canteen ATM
• Membership Verification ATM
• Transaction / Check Deposit ATM
• Self Service ATM
• Retail ATM
•while a criminal might be able to obtain a password illegally,
getting a user's fingerprints would be much more
complicated.
•In addition, contrary to traditional ID cards or badges, you
can't actually lose physical features, making maintenance
more cost efficient for the business or organization, and the
technology more convenient for users.
ADVANTAGES
•Biometric identification machines are traditionally more
expensive to buy than traditional ones.
•Biometric identification machines are not always entirely
accurate. For example, an individual with a cold may not be able
to identify himself using a voice identification device, and
people who gain or lose weight may suddenly lose access to a
place protected by a system analyzing facial features.
DISADVANTAGES
CONCLUSION
Biometric tokens are the safest means of preventing ATM frauds.
• The main reason for introducing biometric systems is to increase
overall security.
• Biometrics offers greater security and convenience than traditional
methods of personal recognition.
• In some applications, biometrics can replace or supplement the
existing technology. In others, it is the only viable approach.
• The biometric system is only one part of an overall identification or
authentication process, and the other parts of that process will play an
equal role in determining its effectiveness
ATMS OF THE FUTURE
Today’s biometric scanners go far beyond basic fingerprint recognition.
• In Poland and Japan, consumers are already using Hitachi's infrared
scanners that capture the unique pattern of capillaries in the finger and
hand.
• The most secure biometric technology uses a device designed to
perform an iris scan based on more than 2,000 unique measurement
points.
• According to developers, people and pets all over the world will be
connected to a system that uses iris scan identification within the next
decade.
REFERENCES
•Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in
Information Technology, Excel Publication, New Delhi (2009)
• James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,
Biometric Systems: Technology, Design and Performance
Evaluation, Springer .
• Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar,
Handbook of Fingerprint Recognition, Springer .
• John Chirillo, Scott Blaul, Implementing Biometric Security,
Wiley Red Books
BIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPT

Mais conteúdo relacionado

Mais procurados

Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
Asim Kumar Pathak
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
VisualBee.com
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 

Mais procurados (20)

High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Graphical password authentication
Graphical password authenticationGraphical password authentication
Graphical password authentication
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Biometric Voting System
Biometric Voting SystemBiometric Voting System
Biometric Voting System
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Finger reader
Finger readerFinger reader
Finger reader
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
EyeRing PowerPoint Presentation
EyeRing PowerPoint PresentationEyeRing PowerPoint Presentation
EyeRing PowerPoint Presentation
 
Biometrics ppt
Biometrics pptBiometrics ppt
Biometrics ppt
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric slideshare
Biometric slideshareBiometric slideshare
Biometric slideshare
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
Finger vein technology
Finger vein technologyFinger vein technology
Finger vein technology
 

Semelhante a BIOMETRIC IDENTIFICATION IN ATM’S PPT

Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Semelhante a BIOMETRIC IDENTIFICATION IN ATM’S PPT (20)

Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Security
SecuritySecurity
Security
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 

Mais de sravya raju

Mais de sravya raju (7)

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Hawk Eye Technology ppt
Hawk Eye Technology pptHawk Eye Technology ppt
Hawk Eye Technology ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 

BIOMETRIC IDENTIFICATION IN ATM’S PPT

  • 1. Technical Seminar on BIOMETRIC IDENTIFICATION IN ATM’S Under the Guidance of P.V.R.K.MURTHY, M.Tech Assistant Professor Presented By
  • 2. •Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine. •Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. INTRODUCTION
  • 3. What is Biometrics ? • The meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure). • Biometrics is the science and technology of measuring and analyzing biological data. • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century. • Biometrics refers to technologies that measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns,facial patterns and hand measurments for authentication purposes.
  • 4. HOW BIOMETRICS WORKS ? • Biometrics systems work by recording and comparing biometric characteristics. • When an individual first uses a biometric system, their identifying features are enrolled as a reference for future comparison. This reference may be stored in a central database or on a card (or both) depending on the needs of the application.
  • 5. • When biometric recognition is required, the individual 's biometric characteristics are recorded again. This time however, the identifying features are compared by the system with the stored reference to determine if there is a close match
  • 7. HAND • The three dimensional shape of a person’s hand has several advantages as an identification device. • Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards.
  • 8.
  • 9. FINGER PRINT A fingerprint scanner system has two basic jobs : • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. • Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation.
  • 10. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 11.
  • 12. BIOMETRIC SYSTEM Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better.
  • 13. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible.
  • 14.
  • 16. INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL IDENTIFICATION An automatic personal identification system based on fingerprints or faces is often not able to meet the system performance requirements. A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND SPEECH This system takes the advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 17. •ATM Card frauds •Use of ATM card duplicators •Card sharing by family and friends •Inability to trace the wrongful users •ATM PINs can be shared on phone or recorded using secret cameras ISSUES IN CURRENT ATM NETWORKS
  • 18. BIOMETRIC ATMS SOLVE THESE ISSUES & OFF •Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face, Pal vein •Multifactor Authentication: Card + PIN + Biometrics •Online or offline Authentication using smart cards •Card less Authentication •Biometrics is combination of card or PIN
  • 19. APPLICATIONS OF BIOMETRIC ATM • Banking & Finance • Food coupons / Tickets / Canteen ATM • Membership Verification ATM • Transaction / Check Deposit ATM • Self Service ATM • Retail ATM
  • 20. •while a criminal might be able to obtain a password illegally, getting a user's fingerprints would be much more complicated. •In addition, contrary to traditional ID cards or badges, you can't actually lose physical features, making maintenance more cost efficient for the business or organization, and the technology more convenient for users. ADVANTAGES
  • 21. •Biometric identification machines are traditionally more expensive to buy than traditional ones. •Biometric identification machines are not always entirely accurate. For example, an individual with a cold may not be able to identify himself using a voice identification device, and people who gain or lose weight may suddenly lose access to a place protected by a system analyzing facial features. DISADVANTAGES
  • 22. CONCLUSION Biometric tokens are the safest means of preventing ATM frauds. • The main reason for introducing biometric systems is to increase overall security. • Biometrics offers greater security and convenience than traditional methods of personal recognition. • In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. • The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness
  • 23. ATMS OF THE FUTURE Today’s biometric scanners go far beyond basic fingerprint recognition. • In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. • The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. • According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.
  • 24. REFERENCES •Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in Information Technology, Excel Publication, New Delhi (2009) • James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer . • Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint Recognition, Springer . • John Chirillo, Scott Blaul, Implementing Biometric Security, Wiley Red Books