26-04-2012, 04:15 PM
AN ATM WITH AN EYE
AAN-ATM-WITH-AN-EYE.pdf (Size: 20.35 KB / Downloads: 38)
ABSTRACT
There is an urgent need for improving security in banking region. With the advent of
ATM though banking became a lot easier it even became a lot vulnerable. The
chances of misuse of this much hyped ‘insecure’ baby product (ATM) are manifold
due to the exponential growth of ‘intelligent’ criminals day by day. ATM systems
today use no more than an access card and PIN for identity verification. This
situation is unfortunate since tremendous progress has been made in biometric
identification techniques, including finger printing, retina scanning, and facial
recognition. This paper proposes the development of a system that integrates facial
recognition technology into the identity verification process used in ATMs. The
development of such a system would serve to protect consumers and financial
institutions alike from fraud and other breaches of security.
INTRODUCTION
The rise of technology in India has brought into force many types of equipment
that aim at more customer satisfaction. ATM is one such machine which made
money transactions easy for customers to bank. The other side of this improvement
is the enhancement of the culprit’s probability to get his ‘unauthentic’ share.
Traditionally, security is handled by requiring the combination of a physical access
card and a PIN or other password in order to access a customer’s account. This
model invites fraudulent attempts through stolen cards, badly-chosen or
automatically assigned PINs, cards with little or no encryption schemes, employees
with access to non-encrypted customer account information and other points of
failure.
OUR METHODOLOGY
The first and most important step of this project will be to locate a powerful
open-source facial recognition program that uses local feature analysis and that is
targeted at facial verification. This program should be compilable on multiple
systems, including Linux and Windows variants, and should be customizable to the
extent of allowing for variations in processing power of the machines onto which it
would be deployed.
We will then need to familiarize ourselves with the internal workings of the
program so that we can learn its strengths and limitations. Simple testing of this
program will also need to occur so that we could evaluate its effectiveness. Several
sample images will be taken of several individuals to be used as test cases – one
each for “account” images, and several each for “live” images, each of which would
vary pose, lighting conditions, and expressions.
CONCLUSION
We thus develop an ATM model that is more reliable in providing security by using
facial recognition software. By keeping the time elapsed in the verification process
to a negligible amount we even try to maintain the efficiency of this ATM system to a
greater degree.
AAN-ATM-WITH-AN-EYE.pdf (Size: 20.35 KB / Downloads: 38)
ABSTRACT
There is an urgent need for improving security in banking region. With the advent of
ATM though banking became a lot easier it even became a lot vulnerable. The
chances of misuse of this much hyped ‘insecure’ baby product (ATM) are manifold
due to the exponential growth of ‘intelligent’ criminals day by day. ATM systems
today use no more than an access card and PIN for identity verification. This
situation is unfortunate since tremendous progress has been made in biometric
identification techniques, including finger printing, retina scanning, and facial
recognition. This paper proposes the development of a system that integrates facial
recognition technology into the identity verification process used in ATMs. The
development of such a system would serve to protect consumers and financial
institutions alike from fraud and other breaches of security.
INTRODUCTION
The rise of technology in India has brought into force many types of equipment
that aim at more customer satisfaction. ATM is one such machine which made
money transactions easy for customers to bank. The other side of this improvement
is the enhancement of the culprit’s probability to get his ‘unauthentic’ share.
Traditionally, security is handled by requiring the combination of a physical access
card and a PIN or other password in order to access a customer’s account. This
model invites fraudulent attempts through stolen cards, badly-chosen or
automatically assigned PINs, cards with little or no encryption schemes, employees
with access to non-encrypted customer account information and other points of
failure.
OUR METHODOLOGY
The first and most important step of this project will be to locate a powerful
open-source facial recognition program that uses local feature analysis and that is
targeted at facial verification. This program should be compilable on multiple
systems, including Linux and Windows variants, and should be customizable to the
extent of allowing for variations in processing power of the machines onto which it
would be deployed.
We will then need to familiarize ourselves with the internal workings of the
program so that we can learn its strengths and limitations. Simple testing of this
program will also need to occur so that we could evaluate its effectiveness. Several
sample images will be taken of several individuals to be used as test cases – one
each for “account” images, and several each for “live” images, each of which would
vary pose, lighting conditions, and expressions.
CONCLUSION
We thus develop an ATM model that is more reliable in providing security by using
facial recognition software. By keeping the time elapsed in the verification process
to a negligible amount we even try to maintain the efficiency of this ATM system to a
greater degree.