Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: AN ATM WITH AN EYE
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
AN ATM WITH AN EYE


[attachment=64925]

What is technology

EFFICIENTLY TECHNOLOGY IS
THETECHNICAL MEANS
PEOPLE USE TO IMPROVE
THEIR SURROUNDING. IT IS
ALSO THE KNOWLEDGE OF
USING THE TOOLS AND
MACHINES TO DO TASKS.

An ATM With An Eye

There is an urgent need for improving
security in banking region. With the
advent of ATM though banking became a
lot easier it even became a lot vulnerable.
 The chances of misuse of this much
hyped 'insecure' baby product (ATM) are
manifold due to the exponential growth of
'intelligent' criminals day by day.

HOW IT WORK

A camera based in cash machine will
detect the pattren in second. and
compare it with one store in a central
computer.
Or encode on to the cash card.
A sensar system examines the randomly
formed features of the iris of the eye .
as unique as a fingerprint.

How It Works

 The progress has been made in
biometric identification
techniques, including finger
printing, retina scanning, and
facial recognition
 This paper proposes the
development of a system that
integrates facial recognition
technology into the identity
verification process used in ATMs

A Word On Passwords

Whether you are on the Internet or an online
banking program, you are often required to use
a password
The worst passwords to use are the ones that
come to mind first -- name, spouse's name,
maiden name, pets, children's name, even
street addresses, etc.
The best passwords mix numbers with upper
and lowercase letters. A password that is not
found in the dictionary is even better

How you protect your password

• Changing your password regularly
• Memorizing your password.
If you do write down the password, keep it at
home or hidden at work. Don't rewrite your
password on a post-it note and stick it on your
monitor or hard drive.
• Web site remember a password for you, don't
use it. Anyone who uses your machine will have
automatic access to information that is password
protected.

CONCLUSION

We thus develop an ATM model that is
more reliable in providing security by using
facial recognition software. By keeping the
time elapsed in the verification process
to a negligible amount we even try to
maintain the efficiency to a greater degree.