How To Improve Security Of An Atm



Similar documents
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

Framework for Biometric Enabled Unified Core Banking

Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

Multimodal Biometric Recognition Security System

A Comparative Study on ATM Security with Multimodal Biometric System

Voice Authentication for ATM Security

GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Accessing the bank account without card and password in ATM using biometric technology

Automatic Biometric Student Attendance System: A Case Study Christian Service University College

Artificial Neural Network and Location Coordinates based Security in Credit Cards

addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from

Application-Specific Biometric Templates

ATM Transaction Security Using Fingerprint/OTP

Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)

Development of Academic Attendence Monitoring System Using Fingerprint Identification

A Various Biometric application for authentication and identification

solutions Biometrics integration

Biometrics in Physical Access Control Issues, Status and Trends White Paper

PROPOSED SOLUTION FOR BIOMETRIC FINGERPRINT TIME AND ATTENDANCE MANAGEMENT SYSTEM

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic

Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria E- Banking System

International Journal of Software and Web Sciences (IJSWS)

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks

De-duplication The Complexity in the Unique ID context

Adeoye Temitope Onaolamipo School of Computer Science, Mathematics & Information Technology Houdegbe North America University Republic of Benin

An Enhanced Countermeasure Technique for Deceptive Phishing Attack

This method looks at the patterns found on a fingertip. Patterns are made by the lines on the tip of the finger.

Security Model in E-government with Biometric based on PKI

Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2

Biometrics is the use of physiological and/or behavioral characteristics to recognize or verify the identity of individuals through automated means.

Development of Attendance Management System using Biometrics.

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Authentication Scheme for ATM Based On Biometric K. Kavitha, II-MCA IFET COLLEGE OF ENGINEERING DEPARTMENT OF COMPUTER APPLICATIONS

Design of Highly Secured Automatic Teller Machine System by Using Aadhaar Card and Fingerprint

Multi-Factor Biometrics: An Overview

A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols

IRIS Recognition Based Authentication System In ATM

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords: fingerprints, attendance, enrollment, authentication, identification

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

through ATM Machine 1* Mohd. Arif Siddique and 2 Dr. Amit Kumar Awasthi

AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY

Securing Electronic Medical Records using Biometric Authentication

Money to ATM Fake Currency Detection K. Satish 1, Y.K.Viswanadham 2, I Leela Priya 3

Fingerprint s Core Point Detection using Gradient Field Mask

Establishing the Uniqueness of the Human Voice for Security Applications

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

Uneasy about getting started? Not to worry. SageLink Credit Union has trained employees to help you every step of the way.

White paper Fujitsu Identity Management and PalmSecure

A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION

ATM FRAUD AND COUNTER MEASURES

NFC & Biometrics. Christophe Rosenberger

Fundamentals of Biometric System Design. Chapter 1 Introduction

VoiceSign TM Solution. Voice Signature Overview

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

Efficient on-line Signature Verification System

Analysis of Multimodal Biometric Fusion Based Authentication Techniques for Network Security

BehavioSec participation in the DARPA AA Phase 2

FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS

Reliability of Fingerprint Verification in Ghana

Comparison of K-means and Backpropagation Data Mining Algorithms

Biometric Authentication using Online Signature

Biometrics and Cyber Security

Enhanced Cloud Security through KFAC

Classification of Fingerprints. Sarat C. Dass Department of Statistics & Probability

Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS

COMPARISON OF VARIOUS BIOMETRIC METHODS

Trends in Finger Vein Authentication and Deployment in Europe

Fingerprint-Based Authentication System for Time and Attendance Management

Automatic Speaker Verification (ASV) System Can Slash Helpdesk Costs

Your guide to getting the most from your card

Securing Electronic Medical Records Using Biometric Authentication

Frequently Asked. Questions. Cash Solution TM PIN Prepaid Debit Card

Integration of Sound Signature in 3D Password Authentication System

Using Banking Services

An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach

Assignment 1 Biometric authentication

Smart Card in Biometric Authentication

An Enhanced ATM Security System using Second-Level Authentication

May For other information please contact:

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

High Resolution Fingerprint Matching Using Level 3 Features

Biometrics in e-governance and Academia using Hand-held Fingerprint Terminals

Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Application of Biometric Technology Solutions to Enhance Security

Two-Factor Authentication Making Sense of all the Options

RFID Based Real Time Password Authentication System for ATM

Transcription:

Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security System to Embed Fingerprinting and Voice Recognition for ATMs Jaswinder Singh, Jaswinder Kaur Department of Computer Engineering, Punjabi University, Patiala Abstract: Automated Teller Machine (ATM) is most commonly used commercial application by people for their money transactions. Over the last thirty years people are largely using and have been depend on ATM. In this paper, a system is proposed to improve the performance in ATM machine security enhancement. Security of customer account is guaranteed by the Personal Identification Number (PIN). But PIN can be shared with others. The fingerprints of every person are unique and cannot be shared. In this paper ATM system security has been improved by integrating the fingerprinting and voice recognition of the user. C# programming language and SQL data base has been used. There is no need to carry cards and memorize passwords. The proposed system can be beneficial for blind persons, senior citizens and uneducated people. Keywords- Fingerprint-Based Authentication, ATM, Voice-Based Authentication, Verification, Security I. INTRODUCTION In the security of the transactions on the ATM has been raising many concerns. The current use of PIN for ATM has been susceptible to unauthorized access, misplacement and forgetfulness. Earlier period there are so many techniques had been designed for an enhanced biometric authenticated ATM system that ensures greater security and increased customer s confidence in the banking sector. A biometric system is a pattern-recognition system that recognizes a pattern based on a feature vector derived from a specific behavioral or physiological characteristic that the person possesses.duvey et.al proposed bio-metric based ATM transaction system which is based on bio-metric data. In bio-metric systems physical bio-metrics characteristics in which include fingerprint, hand, palm geometry, retina, iris and face etc. while popular behavioral characteristics are signature and voice. Bio-metrics technologies are a secure means of authentication because bio-metrics data are unique, it cannot be shared and copied. it also cannot be lost. II. RELATED WORKS An automated teller machine was first introduced in 1960 by City Bank of New York on trial basis. The concept of this machine was for customer to pay useful bills and get a receipt.[1]. Traditional banking systems are undergoing advancements very firstly for example the self service banking system has got great extent popularization with 24 hours high quality service for customer.the banking operation system provides the cash to customer through Automated Teller Machine at anywhere anytime. Automatic Teller Machine was invented to address the following issues in banking system: Quick access to fund withdrawal, Long queue in banking hall, banking at any time, Improvement in the quality of banking services to customers. Safety of bank customer fund in banking has always been a concern since ATM was introduced.the first ATM that stored PIN on the card was developed in United Kingdom in 1965 while the modem and networked ATM was invented in Dallas, Texas, in 1968.Traditional automated teller machine systems are undergone many changes[2].biometric based ATM transaction system which is based on biometric data i.e iris recognition, fingerprint recognition, face recognition,voice recognition etc. In this system biometric data is used along with PIN number and if biometric data of user is matched with stored biometric data then user will allow to do the transactions. Lot of work is done by many researchers to resolve these kinds of problems by biometric approaches. In this section, the work done by earlier researcher. Table 1 Review related to Fingerprinting techniques in ATM S.No. Authors Year Technique Advantages 1. Arun Ross 2005 A set of 8 Gabor filters and hybrid The hybrid matcher is observed to fingerprint matching perform better than the minutiae Scheme matcher. 2. Fengling H, 2005 Two layer of authentication with fingerprint To enhanced the ATM security system 2015, IJARCSSE All Rights Reserved Page 256

3. Gerik 2007 Replacing the combination of cards higher security level Alexander and pins with only biometrics 4. Abhishek Nagar 2009 improve the recognition performance Improve the data base problem of as well as the security of a fingerprint fingerprint based biometric cryptosystem, called finger print fuzzy 5. Jain,A.K.;Lin Hong; 6. Dr.K. Umamaheswari 2011 Improved minutiae extraction Algorithm 2011 multi modal biometric system and uses face and fingerprint features for biometric Verification 7. Anil Jain 2011 A Band Pass Filter 8. Vijay Singh 2012 discussed importance of dual Rathore verification process 9. Subh 2012 key points generation is the iterative process of evaluating the costs of each fingerprint and iris 10. Bhosale, 2012 proposed system hybridize featurebased Sawant fingerprint, iris and PIN ability to compensate adaptively for the nonlinear deformations more evident in the case of a larger database of users to remove the noise and preserve true ridges/structures higher security level strength to exclude false feature and minutiae points from its extracted list proposed systems hybridize featurebased fingerprint, iris and PIN 11. Himanshi Budhiraja 12. Alexander.N Ndife 2013 biometric personal authentication system using a novel combination of iris and fingerprint 2013 AFIM model encompasses all the functionalities of the traditional ATMs with integration of biometric fingerprint To enhanced the ATM security system Improve the data base problem Table 2. Review related to Voice Recognition techniques in ATM Sr.No. Authors Year Technique Advantages 1. Bhupinder Singh 2012 Speech Recognition Process using disable persons can operate Hidden Markov Model. computer with their own voice commands. 2. Mahalakshmi.M 2012 implementation of Hidden Markov allows to provide a much more model algorithm (HMM) to calculate speech rate. secured voice recognition system in ATM machine. 3. AMIT KUMAR SINHA 4. AKSHATA PATIL 2013 SPEECH RECOGNITION with the help of MATLAB Programming which requires wave format speech signals. 2014 using the MAT LAB software to the iris and voice recognition Improve the wave format of voice signals. one is able to access the other systems III. PROPOSED SYSTEM Our system integrate biometric identification into normal, traditional authentication technique use by electronic ATM machines now a days to ensure a strong unbreakable security and non-repudiate transactions. In order to increase the security we are using the combination of three authentication methods of card, fingerprint, and PIN with voice. Our proposed System makes use of the Finger Print Scanning Technology and voice Recognition Technology to authenticate the user. Our proposed System require user to generate the finger print sample and voice sample at the time of creating account in bank. Then these data s are stored in authentication database. The user now uses the ATM machines without pin number The User can now enter the ATM Room and have to place his fingers in the finger print scanning device. Then the system will authenticate with samples stored in authentication database. If the accuracy is 98% with the sample stored in database then it will enter mode. One is voice recognition and another is password. if select the voice recognition mode then check for the voice samples to be stored in database. 2015, IJARCSSE All Rights Reserved Page 257

Fig 1. Flow Chart of Proposed System If match voice sample then select type of transaction and transaction completed. If select the password mode then enter the PIN. if PIN verification and identification correctly done. then select type of transaction and transaction completed. IV. FINGER SCAN TECHNOLOGY Finger Print technology is the initial bio metric sciences and uses unique features of the fingerprint to verify or identify of individuals. It is most deployed technology among other bio metric characteristics, used in application ranging from physical access and logical access. Each and every human have unique characteristics and patterns. A Finger Print pattern or sample consists of lines and spaces. These lines are referred as ridges while the spaces between these ridges are called valleys. These ridges and valleys are matched for verification and authorization. These unique finger print traits are referred as minutiae and comparisons are made on these traits. The typical live scan produces 40 minutiae.[5]. There are five stages in finger scan verification and identification they are finger print image acquisition, processing, location of distinctive characteristics, template creation and template matching. Image acquisition stage involves preprocessing, such as scaling. Image processing is the process of improving the appearance of an image. These results in a series of thick black ridges contrasted to white valleys [6]. In this process image features are detected and enhanced for verification against the stored minutia file. Image enhancement is used to reduce the distortion of fingerprint caused by scars, cuts and dirt [7]. The next stage in the finger process is to locate particular distinctive characteristics. Finger print ridges and valleys form particular patterns such as i)arch: The ridges enter from side of the finger then rise in the center which forms an arc then exit the other side of the finger. ii) Loop: The ridges enter from side of a finger, forming curve then exit on that same side. iii) Whorl: Ridges form circularly around a central point on the finger. Fig 2 Three Level Fingerprint Verification Process. Source:- SavitaChoudhary et.al(2014) The common types of minutiae are ridge endings and bifurcation. This is the point at which one ridges divides into two. Then template is created using that. 2015, IJARCSSE All Rights Reserved Page 258

V. VOICE RECOGNITION TECHNOLOGY Voice recognition is the ability of a machine or program to receive or to understand and carry out spoken commands. It is generally regarded as one of the convenient and safe recognition technique [13]. Voice verification combines behavioral and physiological factors to produce speech patterns that can be captured by voice processing technology (Rubab and Jhat 2011). Voice recognition techniques can be divided into different categories depends on the type of authentication domain (Ruud et al., 2003): i. Fixed Text Method: in which the customer speak a predetermined word that is recorded during registration on the system. ii. Text Dependent Method: Here, the system prompts the user to say a specific word, to use these to computed on the basis of the user s fundamental voice pattern and match with recorded data. iii. Text Independent Method: This is an advanced technique where the customer need not articulate any specific word. The matching is done by the system on the basis of the fundamental voice patterns irrespective of the language and the text used. iv. Conversational Technique: verifies identity of the speaker by inquiring about the knowledge that is secret or unlikely to be known or guessed by someone else. In voice recognition systems, inherent properties of the speaker like fundamental frequency, cadence, nasal tone, inflection etc. are used for voice authentication. It work by analyzing the waveforms and air pressure patterns produced while a person talks. user speaks into the microphone. microphone capture sound waves and generates electrical impulses and sound card converts voice signal into digital signal These systems may use the characteristics of an individual voice or some pre -arranges words. Voice is one of the most convenient biometric but is not reliable due to bad accuracy. A person with a cold or throat problems may face problems using the voice recognition system as it may be rejected. The system has the following phases: Training phase Testing (operational) Phase Fig 3. Voice Recognition System. 5.1 Training phase Training phase in this phase a persons are registered and their voices are recorded. Features extracted from the recorded voices are used Then template is created using that. 5.2 Testing (operational) Phase Testing or operational phase in this phase a person who wants to access the ATM is required to enter voice in speaker. The entered voice is processed and compared. At this point system decides the feature extracted from the given voice matches with the template of claimed person. Threshold is set in order to give a definite answer of access acceptance or rejection. When degree of similarity between a given voice and model is greater than threshold the system will accept the access otherwise the system will reject the person to access the ATM 2015, IJARCSSE All Rights Reserved Page 259

Fig 4. System Architecture of Voice Transaction VI. DESIGN IMPLEMENTATION The implementation of this work was carried out on a Visual basic Network (V.B.Net) framework using C# language. The application was made in six interfaces: login interface, enroll fingerprint interface, Transaction mode interface, Voice interface, PIN no. and transaction type selection interface. i)login interface: user enter card. A dialogue box appears prompting an invalid or valid card number, If the Card number is valid, the customer is directed to the next phase. ii) Enroll fingerprint interface: in this phase the authentication box for inputting of the fingerprint. A Scanning device takes a mathematical snapshot of user unique biological traits. This snap shot is saved in a finger print database as a minutia file. Fig 5 Fingerprint Verification System. The fingerprint reader accepts the fingerprint and seeks to match with the already enrolled templates in the bank database. If it matches, the customer will be authenticated, otherwise access will be denied. iii)transaction mode interface: The customer is taken to transaction mode phase where he/she chooses among PIN or voice mode of transactions. iv) PIN mode interface: if user select PIN number mode then user enter the PIN. If the PIN number is valid, the customer is enter the transaction selection process. v) Voice mode interface: if user select voice mode then here use Conversational Technique of voice recognition. in which verifies identity of the customer by inquiring about the knowledge that is secret or unlikely to be known or guessed by someone else. That information is store bank database that time account is open. vi)transaction type Selection: In this interface user select the transaction type. If choose withdrawal type. At completion of the withdrawal, then print the slip and shows the customer current balance. 2015, IJARCSSE All Rights Reserved Page 260

VII. ADVANTAGES OF PROPOSED SYSTEM 1. Provide 3 Step Strong Authentication 2. Our System replaces card system with physiological characteristics. 3. Hidden cost of ATM Card Management can be avoided. 4. It s ideal for rural masses 5. Useful for senior system because no need to carry cards and memorize passwords 6. Card Stolen problems and related call centers are not required which will reduce the cost of operation of bank. 7. Due to bio metric system no one is able to access the other systems. 8. User can change the authentication any time in home branch with few simple procedures. 9. It is easy to use. 10. It is used instead of PIN number Limitation 1. The requirement of bio metric devices in ATM Machines will improve the cost of ATM Machine but it will balance in operation cost of the ATM Machine. 2. Every time, account holders should come to ATM to collect money 3. Due to three step authentication process timing is very high but it ensures absolute security to users. VIII. CONCLUSION ATMs have become more important to the society. There are millions of money transactions that happen in a single day through ATM. There are many frauds that occur in ATM, mainly due to PIN. So, this proposed system enhances security on money transactions and has also made ATMs an easier access for the less educated. This method when fully deployed will not only increase the authentication, but will also help in the implementation of complex ATMs (performs deposits and money transfer), as this system provides increased security. REFERENCES [1] Jain, Anil K.; Ross, "Introduction to Biometrics", pp. 45-60, 2011. [2] Mohammed Lawman Ahmed Use Of Biometrics to tackle ATM fraud, International Conference on Business and Economics Research, IACSIT Press, Kuala Lumpur, Malaysia, Vol. 1, pp.: 331-335, 2011. [3] B. Himanshi, T. Himani and G. Harshi, Fusion of Iris and Fingerprint Biometric For Recognition, International Journal Of Advance Research In Science And Engineering, vol. 2, April 2013, pp. 35-41. [4] Duvey Anurag, Goyal Dinesh, Hemrajani, Dr. Naveen A Reliable ATM Protocol and Comparative Analysis on Various Parameters with other ATM Protocols, IJCCT, Vol. 01, pp.: 192-197, Issue No. 56, 06 Aug 2013. [5] Jain AK, Prabhakar S, Chen, high security Fingerprint verification system, 1999. [6] Arun Ross, Jidnya Shah and Anil K. Jain, Towards Reconstructing Fingerprints from Minutiae Points", Vol. 5799, pp 68-80, USA, 2005 [7] Jian Feng, Anil K. Jain, Fellow, "Fingerprint Reconstruction: From Minutiae to Phase", IEEE, Vol. 33, No. 2, pp. 209-223, February 2011 [8] Alexander.N Ndife, An Enhanced Technique in ATM Risk Reduction using Automated Biometrics Fingerprint in Nigeria International Journal of Scientific Engineering and Technology, Volume No.2, Issue No.11, pp : 1132-1138, 2013. [9] Amit Kumar, Speech Recognition using MATLAB, International Journal of Advances In Computer Science, Volume- 1, Issue- 2, Nov-2013. [10] Krinivasan, Chandrasekhar, "An Efficient Fuzzy Based Filtering Technique for Fingerprint Image Enhancement", American Journal of Scientific Research, No. 43, pp. 125-140, 2012 [11] Subh and Vanithaasri, A Study on Authenticated Admittance of ATM Clients Using Biometrics Based Cryptosystem, IJAET, 456-463,2012. [12] Santhi and Kumar, Novel Hybrid Technology in ATM Security Using Biometrics. Journal of Theoretical and Applied Information Technology, 2012. [13] Mahalakshmi, Enhanced voice recognition to reduce fraudulence in ATM Machine, IJCNS, Volume 4. No 1. 2012. [14] AKSHATA PATIL, Voice Enabled ATM Machine with IRIS Recognition for Authentication, Proceedings of 3rd IRF International Conference, Goa, India, 2011 2015, IJARCSSE All Rights Reserved Page 261