30-03-2011, 10:56 AM
presented by:
Suresh kumar
ATM WITH AN EYE.pptx (Size: 276.1 KB / Downloads: 151)
An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller.
On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN).
Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchase cell phone prepaid credit. Thus, ATMs often provide the best possible exchange rate for foreign travelers and are heavily used for this purpose as well.
ATMs are known by various other names including Automated Transaction Machine, automated banking machine, cashpoint (in Britain),money machine, bank machine, cash machine, hole-in-the-wall, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India)
Card fraud
In an attempt to prevent criminals from shoulder surfing the customer's PINs, some banks draw privacy areas on the floor. For a low-tech form of fraud, the easiest is to simply steal a customer's card. A later variant of this approach is to trap the card inside of the ATM's card reader with a device often referred to as a Lebanese loop. When the customer gets frustrated by not getting the card back and walks away from the machine, the criminal is able to remove the card and withdraw cash from the customer's account.
Another simple form of fraud involves attempting to get the customer's bank to issue a new card and stealing it from their mail.
Iris Recognition Properties of the iris
Has highly distinguishing texture
Right eye differs from left eye
Twins have different iris texture
Not trivial to capture quality image
+ Works well with cooperative subjects
+ Used in many airports in the world
Hardware
An ATM is typically made up of the following devices:
• CPU
• Magnetic and/or Chip card reader
• PIN Pad
• Secure cryptoprocessor,
• Display
• Function key buttons or a Touchscreen
• Record Printer
• Vault
• Housing
Represent iris texture as a binary vector of 2048 bits
Find (nearly circular) iris and create 8 bands or zones
Cross correlate 1024 local areas with a Gabor wavelet
Use 2nd directional derivative and 1st directional derivative
Summary of feature extraction
Obtain quality image of certain (left) eye
Find boundary of pupil and outside of iris
Normalize radii to range, say, 0.5 to 1.0
Define the 8 bands by radii ranges
Perform 2 dot products at each of 1024 locations defined around the bands by radius rho and angle phi
How is the matching done to templates of enrolled persons?
Person scanned under controlled environment and iris pattern is stored with ID (say address, SS#, etc.)
Might be several million such templates for frequent flyers (6B for all world)
At airport or ATM, scan unknown person’s left eye; then compute Hamming distance to ALL templates.
Distributions of true matches versus non matches
Design of former SENSAR ATM iris scanner
Recognition is possible by comparing unknown scan to MILLIONS of stored templates
Less than 32% unmatched bits means “MATCH”
Only need to count unmatched bits – use exclusive OR with machine words
Mask off bad patches due to eyelid or eyelash interference (have to detect that)
Suresh kumar
ATM WITH AN EYE.pptx (Size: 276.1 KB / Downloads: 151)
An automated teller machine (ATM) or automatic banking machine (ABM) is a computerised telecommunications device that provides the clients of a financial institution with access to financial transactions in a public space without the need for a cashier, human clerk or bank teller.
On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smart card with a chip, that contains a unique card number and some security information such as an expiration date or CVVC (CVV). Authentication is provided by the customer entering a personal identification number (PIN).
Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchase cell phone prepaid credit. Thus, ATMs often provide the best possible exchange rate for foreign travelers and are heavily used for this purpose as well.
ATMs are known by various other names including Automated Transaction Machine, automated banking machine, cashpoint (in Britain),money machine, bank machine, cash machine, hole-in-the-wall, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India)
Card fraud
In an attempt to prevent criminals from shoulder surfing the customer's PINs, some banks draw privacy areas on the floor. For a low-tech form of fraud, the easiest is to simply steal a customer's card. A later variant of this approach is to trap the card inside of the ATM's card reader with a device often referred to as a Lebanese loop. When the customer gets frustrated by not getting the card back and walks away from the machine, the criminal is able to remove the card and withdraw cash from the customer's account.
Another simple form of fraud involves attempting to get the customer's bank to issue a new card and stealing it from their mail.
Iris Recognition Properties of the iris
Has highly distinguishing texture
Right eye differs from left eye
Twins have different iris texture
Not trivial to capture quality image
+ Works well with cooperative subjects
+ Used in many airports in the world
Hardware
An ATM is typically made up of the following devices:
• CPU
• Magnetic and/or Chip card reader
• PIN Pad
• Secure cryptoprocessor,
• Display
• Function key buttons or a Touchscreen
• Record Printer
• Vault
• Housing
Represent iris texture as a binary vector of 2048 bits
Find (nearly circular) iris and create 8 bands or zones
Cross correlate 1024 local areas with a Gabor wavelet
Use 2nd directional derivative and 1st directional derivative
Summary of feature extraction
Obtain quality image of certain (left) eye
Find boundary of pupil and outside of iris
Normalize radii to range, say, 0.5 to 1.0
Define the 8 bands by radii ranges
Perform 2 dot products at each of 1024 locations defined around the bands by radius rho and angle phi
How is the matching done to templates of enrolled persons?
Person scanned under controlled environment and iris pattern is stored with ID (say address, SS#, etc.)
Might be several million such templates for frequent flyers (6B for all world)
At airport or ATM, scan unknown person’s left eye; then compute Hamming distance to ALL templates.
Distributions of true matches versus non matches
Design of former SENSAR ATM iris scanner
Recognition is possible by comparing unknown scan to MILLIONS of stored templates
Less than 32% unmatched bits means “MATCH”
Only need to count unmatched bits – use exclusive OR with machine words
Mask off bad patches due to eyelid or eyelash interference (have to detect that)