1 Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal  and Lavesh Agarwal  Teerthankar Mahaveer University ,  Abstract: Now a day s everyone uses ATM (Automated Teller Machine) for secure transaction but always carrying the ATM card is very difficult. Many times we forget to carry ATM card and sometimes forget the password. Hackers can easily hack the password in the current era. In this paper we introduce the biometric technology in ATM and we also use the extra feature i.e. cell number that easily describe the user identity. Many users have account on same bank so consuming the less time in searching process because each user has its personal cell number, firstly we type the cell number and then can use the biometric technology as an ATM card and biometric password so that without card user can withdraw the cash. We can secure the person s identification and card from thief and hackers through biometric system because each person has unique iris, finger print voice etc. [Mini Agarwal and Lavesh Agarwal. Accessing the bank account without card and password in ATM using biometric technology. Researcher. 2012;4(3):33-37]. (ISSN: ). 7 Keywords: hackers, thief, PIN, connectors, withdraw. Introduction: In a past days withdraw, saving cash and detail of bank account through bank was very tough work but now a days every used the ATM because it s the most easiest way for withdraw the cash and check the any type of details of their accounts. Many banks open its many ATMs on various places so every one easily withdrawal the cash and check the any type of details of their accounts through any bank ATM. But in today life we have many passwords like lock, , car radio, mobile phones, computers, bank lockers ATM card etc and users have many cards like Credit card, Debit card, Identity card, PAN Card etc, so the many problems face by user related to ATM card and its passwords some are given below: 1. Tough work to remembering lots of passwords many times user forgets its passwords through forgetting password some times it creates the big problem like user didn t withdraw the cash any details of account and some times ATM card was hacked. 2. The problem comes around when we forget to carry its ATM card. If he has no cash at that time than it create the big problem. 3. Some times user only choose the one password of all things like , mobile phones etc but it has also deficiencies like if any one knows the his password then the thief or any relative easily use the ATM card. So removing these types of deficiencies we introduced the ATM machine with biometric system. Various biometric technologies are introduced in current era like iris, finger, voice, wrist and so forth. Each user has its unique identity it s based on physical or behavioral attributes. These attributes are never stolen by any person. But if we only use the biometric technology for opening the account instead of ATM card than it is very time consuming process because millions users use the ATM card then users biometric id checked to million users biometric id. This process consumes the many hours. So, we add the extra feature mobile cell number with biometric system. In the ATM firstly we enter the mobile number with human s biometric id like iris, finger, voice etc. So through mobile number firstly we search the persons account then through biometric matching it open s the account and then again need the biometric id as a password for confirmation of withdraw because sometimes user doesn t close the account for security purpose again match the biometric id. Working of Biometric technology: Biometric devices depend on the humans physical and behavioral attributes like figure prints, eye recognition, voice recognition, signature etc. working or operation is similar in all biometric devices. In these devices at the time of human enrollment biometric attributes stored on the in database and at the time of matching input attributes of human matched to the already stored attributes. The performance or total time of biometric devices is depending upon the acceptance and rejection time. If the acceptance time is high means it takes the several minutes in accepting the user and if the rejection time is high it means it s not the correct user. So, if any time means acceptance or rejection time is high then the performance of the biometric is worst. If both acceptance and rejection process takes the less time minutes some seconds then the performance of the biometric process are excellent. So 33
2 the working of biometric is depending upon the enrollment, identification or verification. Fig (1): working of ATM with biometric technology. Storing process Screening the physical /behavioral attributes of human by biometric device z Scanning and features extraction No match Converted in to digital template Stored in database Verified Match Verification process Screening the users attributes by biometric device Scanning and features extraction Converted in to digital template Fig (2): working of biometric device Comparison between password, ATM Card and Biometric system ATM Card Password Biometric Always need for carrying the card Password always need for remembering in memory In this no need for any type of remembering the password Easily hack by other persons Its easily hack by other persons Every human has unique attributes so if any person no this he is nothing doing No need for user identification No need for user identification Need for human identification It doesn t provide any type of It doesn t provide any type of security It provides high level security security So biometric technology are more secured then ATM card and password. And every one easily handle this because in this no need for carryinging and recalling the card and password. Verification through biometric devices in ATM: Now time we used various types of biometric devices but we describe here verification through two or more biometric devices that are described below: 1. Iris technology: In iris technology verification is totally depend upon the users eye at the time of opening the bank account the humans iris enrollment has done in this a large mega-pixel camera taken the iris picture but it concentrate on the 34
3 some specific points see in fig (1) and converted in to a useful or digital template and saved in to the database with cell number of the user because for speeding the process we use the cell number as the temporary identity. At the time of verification current input compared to the stored template. If the match found it means he is a correct user otherwise he is not the authenticated user. When user want to access the account through ATM at that time ATM firstly display the message enter yours cell number. After entering the cell number if cell number is correct then through biometric machine in ATM user gives his physical attributes means iris then attached camera in the ATM machine takes the images of iris and converts the specific points in to digital form these digital template compared to the stored image if match found then the user is correct user otherwise he is fraud. When account is opened if user wants to withdraw the money at that time for security purpose ATM machine with biometric technology again do the verification because some times users forget to close their accounts. IRIS Screening IRIS scanning Features Extracted Digital template Decision yes/no Fig (3): Iris verification process 2. Finger print technology: Finger print technology is same to the iris technology. This technology totally depends upon the prints of finger. At the time of opening the bank account in enrolled process bank take the finger print of the user and extract the extra features from the finger and then these extra features converted in to the digital template this digital template stored in the database with cell number of the user because for speeding the process we use the cell number as the temporary identity. When user want to access the account through ATM at that time ATM firstly display the message enter yours cell number. After entering the cell number if cell number is correct then through biometric machine in ATM user gives his physical attributes means finger prints then these current finger prints and converted to the digital template and then compared to the user finger print template that stored with cell number if it matches then user go to his account. Otherwise machine display wrong user. At the time of performing any operation user again takes the finger print and check it for security purpose. Fig (4): Finger prints verification process . 3. Voice recognition: Voice recognition is a simple and easiest method of biometric. This technology totally depends upon the user voice. At the time of opening the account in the bank in enrolled process bank captures the word or a sentence of a user to voice recorder. This word or sentence converted in to the spectrogram. Spectrogram is a graph that represents on the basis of sound frequency and the time this graph store on the database with cell number of the user because for speeding the process we use the cell number as the temporary identity. When user want to access the account through ATM at that time ATM firstly display the message enter yours cell number. After entering the cell number if cell number is correct then through biometric machine in ATM user gives his voice then this voice converts in to the spectrogram. This spectrogram compared to the stored spectrogram if both are matches then account is open 35
4 otherwise it shows the message try again. At the time of performing any operation like withdraw etc ATM machine again verify the voice for security purpose. 4. Facial recognition: Facial recognition in biometric is very simple technology. This technology totally depends on the humans face. At the time of enrolling process bank captures the user image. This user image divides in to several grids these several grids have human features these human extracted features stored on the database with cell number of the user because for speeding the process we use the cell number as the temporary identity. When user want to access the account through ATM at that time ATM firstly display the message enter yours cell number. After entering the cell number if cell number is correct then through biometric machine in ATM user scan his face as an input. Extra features extracted in to the users face scan and compared to the stored database. If both are matches then account is open otherwise it shows the message try again. At the time of performing any operation like withdraw etc ATM machine again verify the voice for security purpose. Requirements for ATM with biometric technology: Fig (5): Steps in facial recognition Some of the requirements are given below: Automated teller machine (ATM) Voice, iris, finger facial biometric scanner Cables, connectors, usb ports, ups, recorder Any operating system like windows, Linux etc Database storage like oracle, sql etc Any application software like c#, java,.net etc Biometric software, drivers and experts ATM operator Software engineers Tester engineers Users Comparison between Iris, facial, finger and voice recognition: Iris Finger Voice facial Specific requirement camera Finger scanner Voice recorder camera Input conversion Feature extraction Feature extraction spectrogram points cost Costly Medium cheap medium Reliability high medium low medium Accuracy high medium low medium Processing slow fast fast slow Interferences Irritations, glasses Dust, injury Cold, noise Swelling, injury, surgery 36
5 Survey: In a survey of biometric technology we saw that 85% people trust on the iris technology because they said hackers hack the finger prints, voice, facial recognition but them can t change or got the same eye. Each person have unique eye. But 10% users said that finger print is the easy method for biometric because only in this we scan our finger. And 5% people likes voice recognition because only in this we say a one word or sentence and last 5% people likes the facial recognition because this like a click a picture through camera. Conclusion: In this paper only we represent that if we have no ATM card or no password then we also access the our account through ATM. We only want to secure our transaction because each person has their unique physical or behavioral attributes that can t be stolen by any one. We remove the password and card forgetting problem. Through biometric technology verification process is done easily and also increasing the account security. 1. Lynne Coventry, Antonella De Angeli and Graham Johnson Usability and Biometric Verification at the ATM Interface Ft. Lauderdale, Florida, USA April 5-10, Emuoyibofarhe, Fajuyigbe O., Emuoyibofarhe O.N, Alamu F.O. A Framework for the Integration of Biometric Into Nigerian Banking ATM System International Journal of Computer Applications ( ) Volume 34 No.4, November Deane, F.P., Henderson R.D., Mahar D.P. and Saliba A.J. Theoretical examination of the effects of anxiety and electronic performance monitoring on biometric security systems, interacting with Computers, Ashbourn, J. Biometrics. Advanced Identity Verification. Springer Verlag, London, Automated Teller Machine (2007) machine. 6. Fig (4) 6900/456993/html/nn2page1.stm. References: 1/21/
Your new checking account Getting started guide Welcome to checking made easy At Wells Fargo, our checking accounts are designed to simplify your everyday finances so you can enjoy more of life. To make
Physical Security in Mission Critical Facilities White Paper 82 Revision 2 by Suzanne Niles > Executive summary Physical security controlling personnel access to facilities is critical to achieving data
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Issue s in Informing Science and Information Technology Volume 6, 2009 SMS User Interface Result Checking System Emmanuel Rotimi Adagunodo Obafemi Awolowo University, Ile-Ife, Osun State, Nigeria email@example.com
March 2012 The Virtual Office Running your Business from a Distance Contents 1 Introduction... 4 2 Online Banking... 4 2.1 Banking Services... 6 2.2 First Nations Bank Small business accounts... 7 2.2.1
Positional Data and Active Code (ACD) Used for the Cash Receipts and Settlement Scheme Arayuki Takahashi Makoto Ohnuki Michitaka Umemura With the Internet firmly in place in our society today, the frequency
Frequently Asked Questions (FAQ s) November, 2013 This list of FAQs is a subset of a larger list derived by the Agency. This list is tailored to meet the needs of users at Headquarters. If you do not find
A Novel Multisensoric System Recording and Analyzing Human Biometric Features for Biometric and Biomedical Applications DISSERTATION ZUR ERLANGUNG DES DOKTORGRADES DER NATURWISSENSCHAFTEN (DR. RER. NAT.)
Card-Not-Present Fraud Working Committee White Paper: Near-Term Solutions to Address the Growing Threat of Card-Not-Present Fraud Version 1.0 Date: April 2015 About the EMV Migration Forum The EMV Migration
By: Rob McDougall Upstream Works Software March 2009 First Call Resolution affects every aspect of your business. Understand the ways it affects you, and the 6 benefits you ll get from improving it. Learn
ADOBE PHOTOSHOP LIGHTROOM 5 QUICK START GUIDE Victoria Bampton www.lightroomqueen.com/lr5quickstart www.lightroomqueen.com 1 LEGAL NOTICE: 2013 Victoria Bampton. All rights reserved This ebook is available
Master Thesis Spring 2012 School of Health and Society Department Design and Computer Science Embedded Systems Study on Electronic Health Record and its Implementation Writer Qian Huang Qin Yin Instructor
CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.
Pros 4 Technology Online Backup Features Introduction Computers are the default storage medium for most businesses and virtually all home users. Because portable media is quickly becoming an outdated and
Voipswitch Manual for version 340 and higher by Gabriel Georgescu 1 OVERVIEW 3 SOFTSWITCH 4 REQUIREMENTS. 10 PROGRAM INSTALLATION. 10 LAUNCHING THE MAIN APPLICATION VOIPSWITCH 12 GATEWAYS 18 GK/REGISTRAR
Personal Banking Bank Account Conditions. Applicable from 30 July 2015. Bank Account Conditions. This booklet contains the general conditions that apply to our personal bank accounts and some related services.
IT Security Trends Walter Fumy Siemens AG ICN EN TNA 4 81737 München firstname.lastname@example.org Abstract This paper examines recent trends in the area of information security. It presents attacks and vulnerabilities
DocuFire for Windows User Manual Version: 5.20 Date: February 19, 2010 Web: http://www.docufire.com TABLE OF CONTENTS Introduction to DocuFire for Windows... 4 Contacting Technical Support... 4 Getting
Checking Account Management 595 Market Street, 16th Floor San Francisco, CA 94105 888.456.2227 www.balancepro.net Whether you have a history of overdraft or nonsufficient funds charges or you just want
A beginners guide in how to make a Laptop/PC more secure. This guide will go through the common ways that a user can make their computer more secure. Here are the key points covered: 1) Device Password
Privacy by Design Solutions for Biometric One-to-Many Identification Systems IPC Technical Report June 2014 Ann Cavoukian, Ph.D. Information and Privacy Commissioner Ontario, Canada Alex Stoianov, Ph.D.
T s And C s. General terms and Effective conditions April 2012 Effective April 2015 It s Ours. a What s Inside Here. General provisions 1 1. What are these terms about? 1 2. When can our terms and product
EaseUS Todo Backup User guide - 1 - Table of contents Welcome... - 5 - Overview... - 6 - How to use this manual... - 7 - New in EaseUS Todo Backup 6.5... - 8 - Getting started... - 9 - Hardware requirements...
THE POWER OF INTELLIGENT MAIL ( I-MAIL ) Pitney Bowes believes that technology can be deployed to help: Mailers and recipients interact more effectively with the Postal Service; The Postal Service manage