13-04-2012, 02:41 PM
atm with an eye
ATM-WITH-AN-EYE.pdf (Size: 20.35 KB / Downloads: 40)
INTRODUCTION
The rise of technology in India has brought into force many types of equipment
that aim at more customer satisfaction. ATM is one such machine which made
money transactions easy for customers to bank. The other side of this improvement
is the enhancement of the culprit’s probability to get his ‘unauthentic’ share.
Traditionally, security is handled by requiring the combination of a physical access
card and a PIN or other password in order to access a customer’s account. This
model invites fraudulent attempts through stolen cards, badly-chosen or
automatically assigned PINs, cards with little or no encryption schemes, employees
with access to non-encrypted customer account information and other points of
failure.
LITERATURE REVIEW
For most of the past ten years, the majority of ATMs used worldwide ran under
IBM’s now-defunct OS/2. However, IBM hasn’t issued a major update to the
operating system in over six years. Movement in the banking world is now going in
two directions: Windows and Linux. NCR, a leading world-wide ATM manufacturer,
recently announced an agreement to use Windows XP Embedded in its next
generation of personalized ATMs (crmdaily.com.) Windows XP Embedded allows
OEMs to pick and choose from the thousands of components that make up Windows
XP Professional, including integrated multimedia, networking and database
management functionality. This makes the use of off-the-shelf facial recognition
code more desirable because it could easily be compiled for the Windows XP
environment and the networking and database tools will already be in place.
OUR METHODOLOGY
The first and most important step of this project will be to locate a powerful
open-source facial recognition program that uses local feature analysis and that is
targeted at facial verification. This program should be compilable on multiple
systems, including Linux and Windows variants, and should be customizable to the
extent of allowing for variations in processing power of the machines onto which it
would be deployed.
We will then need to familiarize ourselves with the internal workings of the
program so that we can learn its strengths and limitations. Simple testing of this
program will also need to occur so that we could evaluate its effectiveness. Several
sample images will be taken of several individuals to be used as test cases – one
each for “account” images, and several each for “live” images, each of which would
vary pose, lighting conditions, and expressions.
ATM-WITH-AN-EYE.pdf (Size: 20.35 KB / Downloads: 40)
INTRODUCTION
The rise of technology in India has brought into force many types of equipment
that aim at more customer satisfaction. ATM is one such machine which made
money transactions easy for customers to bank. The other side of this improvement
is the enhancement of the culprit’s probability to get his ‘unauthentic’ share.
Traditionally, security is handled by requiring the combination of a physical access
card and a PIN or other password in order to access a customer’s account. This
model invites fraudulent attempts through stolen cards, badly-chosen or
automatically assigned PINs, cards with little or no encryption schemes, employees
with access to non-encrypted customer account information and other points of
failure.
LITERATURE REVIEW
For most of the past ten years, the majority of ATMs used worldwide ran under
IBM’s now-defunct OS/2. However, IBM hasn’t issued a major update to the
operating system in over six years. Movement in the banking world is now going in
two directions: Windows and Linux. NCR, a leading world-wide ATM manufacturer,
recently announced an agreement to use Windows XP Embedded in its next
generation of personalized ATMs (crmdaily.com.) Windows XP Embedded allows
OEMs to pick and choose from the thousands of components that make up Windows
XP Professional, including integrated multimedia, networking and database
management functionality. This makes the use of off-the-shelf facial recognition
code more desirable because it could easily be compiled for the Windows XP
environment and the networking and database tools will already be in place.
OUR METHODOLOGY
The first and most important step of this project will be to locate a powerful
open-source facial recognition program that uses local feature analysis and that is
targeted at facial verification. This program should be compilable on multiple
systems, including Linux and Windows variants, and should be customizable to the
extent of allowing for variations in processing power of the machines onto which it
would be deployed.
We will then need to familiarize ourselves with the internal workings of the
program so that we can learn its strengths and limitations. Simple testing of this
program will also need to occur so that we could evaluate its effectiveness. Several
sample images will be taken of several individuals to be used as test cases – one
each for “account” images, and several each for “live” images, each of which would
vary pose, lighting conditions, and expressions.