28-12-2012, 12:53 PM
SECURE ATM’S BY IMAGE PROCESSING
SECURE ATM’S.doc (Size: 72.5 KB / Downloads: 37)
ABSTRACT
This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!
What is Digital Image Processing?
An Image may be defined as a two dimensional function f (x,y) where x and y are spatial(plane) coordinates x, y is called intensity or gray level of the image at that point. When x, y and the amplitude values of f are all finite, discrete quantities, we call the image a digital image.
Interest in digital image areas: improvement of pictorial information for human interpretation: and representation for autonomous machine perception.
The entire process of Image Processing and starting from the receiving of visual information to the giving out of description of the scene, may be divided into three major stages which are also considered as major sub areas, and are given below
(i) Discretization and representation: Converting visual information into a discrete form: suitable for computer processing: approximating visual information to save storage space as well as time requirement in subsequent processing.
(ii) Processing :Improving image quality by filtering etc ; compressing data to save storage and channel capacity during transmission.
(iii) Analysis: Extracting image features; qualifying shapes, registration and recognition.
We concentrated on human interpretation application and developed two algorithms which can make the ATM secure by image processing.
Overview
With the increasing necessity of e-mail accessing and Internet resources and the convenience it offers serious security concerns also arise. Internet is vulnerable to intruders who are always snooping to find open computers in the network to steal personal files, information or cause any damage. The loss of these records, emails or customer files can be devastating.
Retina scan:
Retina scan requires the user to situate his or her eye with ½ inch of the capture device and hold still while the reader ascertains the patterns. The user looks at a rotating green light as the patterns of the retina are measured at over 400 points; which leads a very high level off accuracy in comparison to most other biometrics. Retina scan is designed to use in military facilities, logical security applications such as network access or PC logic. The patterns of blood vessels on the back of the human eye are unique from person to person. The blood vessels on the back of the retina are generally stable through one’s lifetime, with the exception of degenerative diseases.
Our work on biometrics
Every biometric system has its limitations. Therefore, identification based on multiple biometrics is an emerging trend as multimodel biometrics can provide a more balanced solution to the security multimodel systems involve the use of more than one biometric system. Our contribution to the above subject is that we have developed an algorithm on banking security. For this we have considered a bank using biometric technology for its security purpose. The security is assured by using finger scan, voice scan, hand geometry scan and by requesting the password given by the bank for a particular user when necessary. The following are the flowcharts and the algorithms.