Face Reorganization Method for Cyber Security System in Financial Sector Using FPGA Implementation



Similar documents
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology

through ATM Machine 1* Mohd. Arif Siddique and 2 Dr. Amit Kumar Awasthi

Protected Cash Withdrawal in Atm Using Mobile Phone

Nagpur, Maharashtra, India

Advanced Car Parking System with GSM Supported Slot Messenger

ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY

REMOTE HOST PROCESS CONTROL AND MONITORING OF INDUSTRY APPLIANCES

Intelligent Home Automation and Security System

INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) BUS TRACKING AND TICKETING SYSTEM

Low-resolution Image Processing based on FPGA

TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS

RFID based Bill Generation and Payment through Mobile

Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN

Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner

Gsm Based Controlled Switching Circuit Between Supply Mains and Captive Power Plant

A Game Theory Modal Based On Cloud Computing For Public Cloud

ATM Transaction Security Using Fingerprint/OTP

Keywords: GPS, GSM, AVR Microcontroller, SMS.

International Journal of Software and Web Sciences (IJSWS) GPS and GSM Based Database Systems for User Access

Identifying More Efficient Ways of Load balancing the Web (http) Requests.

International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research)

A Tokenization and Encryption based Multi-Layer Architecture to Detect and Prevent SQL Injection Attack

Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology

ENHANCED HYBRID FRAMEWORK OF RELIABILITY ANALYSIS FOR SAFETY CRITICAL NETWORK INFRASTRUCTURE

Dynamic Query Updation for User Authentication in cloud Environment

Roulette Wheel Selection Model based on Virtual Machine Weight for Load Balancing in Cloud Computing

FPGA Based Home Security System

An Intelligent Parking Guidance and Information System by using image processing technique

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

Performance Measuring in Smartphones Using MOSES Algorithm

How To Understand And Understand The Science Of Engineering In India

Barcode Based Automated Parking Management System

How To Understand The Architecture Of A Client Server System

A Foolproof Biometric Attendance Management System

Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

RFID Based Centralized Patient Monitoring System and Tracking (RPMST)

Remote Android Assistant with Global Positioning System Tracking

Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

Design and Implementation of a Reliable Wireless Real-Time Home Automation System Based on Arduino Uno Single-Board Microcontroller

Remote Monitoring, Controlling and Lost Hardware Detecting through GSM

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

NIOS II Based Embedded Web Server Development for Networking Applications

Vehicle Scrutinizing using GPS & GSM Technologies Implemented with Ardunio controller

FPGA Design of Reconfigurable Binary Processor Using VLSI

A MULTI SENSOR REMOTE HOME SECURITY SYSTEM USING LabVIEW

Krunal Patel Department of Information Technology A.D.I.T. Engineering College (G.T.U.) India. Fig. 1 P2P Network

AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY

Energy Efficiency in Green Computing using Linear Power Model

3D On-chip Data Center Networks Using Circuit Switches and Packet Switches

Integration of Sound Signature in 3D Password Authentication System

URBAN MOBILITY IN CLEAN, GREEN CITIES

ISSN: ISO 9001:2008 Certified International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 3, May 2013

Boole-WebLab-Deusto: Integration of a Remote Lab in a Tool for Digital Circuits Design

ANDROID BASED HOME AUTOMATION AND VISION SURVEILLANCE USING RASPBERRY PI

INDEX. Please click on a section title to go to the respective page WELCOME ON BOARD... 04

Typical programme structures for MSc programmes in the School of Computing Science

Feasibility Study of Implementation of Cell Phone Controlled, Password Protected Door Locking System

Modern Multipupose Security And Power Management System

Wireless power meter monitoring with power theft detection and intimation system using GSM and Zigbee networks

An Efficient Windows Cardspace identity Management Technique in Cloud Computing

Framework for Biometric Enabled Unified Core Banking

Keywords: fingerprints, attendance, enrollment, authentication, identification

A MULTILEVEL INVERTER FOR SYNCHRONIZING THE GRID WITH RENEWABLE ENERGY SOURCES BY IMPLEMENTING BATTERY CUM DC-DC CONERTER

Analytical Model for Automating Purchases using RFID-enabled Shelf and Cart

DELEGATING LOG MANAGEMENT TO THE CLOUD USING SECURE LOGGING

MICROCONTROLLER BASED SMART HOME WITH SECURITY USING GSM TECHNOLOGY

DEVELOPMENT OF HOME SECURITY SYSTEM USING GSM MODULE

SMS banking using Cell phone

SECUDROID - A Secured Authentication in Android Phones Using 3D Password

DEVELOPMENT OF INDIVIDUAL HOME SECURITY SYSTEM USING CAN AND ZIGBEE PROTOCOL

Study on Differential Protection of Transmission Line Using Wireless Communication

E-commerce refers to paperless exchange of business information using following ways.

Wlan Monitoring Using Android Phone

Android based Secured Vehicle Key Finder System

Futuristic Cart For Shopping With Product Inventory Management System

International Journal of Engineering Technology, Management and Applied Sciences. November 2014, Volume 2 Issue 6, ISSN

3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India

Design of Wireless Home automation and security system using PIC Microcontroller

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

OVER SPEED VIOLATION MANAGEMENT OF A VEHICLE THROUGH ZIGBEE

Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642

Behavior Analysis in Crowded Environments. XiaogangWang Department of Electronic Engineering The Chinese University of Hong Kong June 25, 2011

Single Sign-On Secure Authentication Password Mechanism

ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS

Accessing Private Network via Firewall Based On Preset Threshold Value

DESIGN FOR MONITORING AND OPTIMIZATION OF POWER DEMAND FOR WIRELESSLY COMMUNICATING ELECTRIC LOADS

Biometric Authentication Platform for a Safe, Secure, and Convenient Society

ICPS: Intelli Cloud Print Service

NOVEL VIGILANT REAL TIME MONITORING AND SECURITY SYSTEM FOR ATM CENTRE

Real Time Vehicle Theft Identity and Control System Based on ARM 9

Transcription:

IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. I (Mar - Apr. 2014), PP 63-67 Face Reorganization Method for Cyber Security System in Financial Sector Using FPGA Implementation Mr. R.Vignesh Kumar 1, Mrs.T.Kanimozhi 2, T. Uma Mahesweri 3 1 (M.E) Scholar-Embedded System, 2 Assistant Professor, 3 Assistant Professor Department of Electrical and Electronics Engineering R.V.S.College of Engineering and Technology-Dindigul, Tamilnadu- India Abstract:Automated teller machines (ATMs) are well known devices typically used by individuals to carry out a variety of personal and business financial transactions and/or banking functions. ATMs have become very popular with the public for their availability and general user sociability. ATMs are now found in several locations having a regular or high volume of customer traffic. For instance, ATMs are typically found in restaurants, superstores, Convenience stores, shopping mall, schools, gas stations, hotels, work locations, banking centers, airports, entertaining establishments, transport facilities and a myriad of other locations. This has added new competences and features, though most of the time, the executions are registered and networking is not always possible. Yet there is an increasing demand for advanced banking, where appliances respond automatically to changing environmental conditions and can be easily controlled through one common device. This paper offerings a possible solution whereby the user controls devices by employing a central Field Programmable Gate Array (FPGA) controller to which the devices and sensors are interfaced. Control is transferred to the FPGA from a mobile phone through its GSM interface. ATMs are typically available to consumers on a continuous basis such that consumers have the ability to carry out their ATM financial transactions and/or banking functions at any time of the day and on any day of the week. Keywords: FPGA, GSM, Face reorganization, SIM, ATM I. Introduction In this paper we can create the new generation ATM machine which can be operate without the ATM card. In this system ATM machine can be operator by using our SIM card and Face identification. When we insert our SIM in the reader unit of the ATM machine it transfers the mobile to the server. In server we can gather the related information of the mobile number (i.e.) the user s particulars of Bank account and their photographs etc. This paper presents a possible solution whereby the user controls devices by employing a central Field Programmable Gate Array (FPGA) controller to which the devices and sensors are interfaced. According to increasing development of technology and in order to approaching most citizen services are presented electronically Using clever electronic cards. On the subject of this statistic, people have numerous smart cards which are increasing in number every day. In the face of so many advantages, these cards have various disadvantages such as multiplicity, difficult to carrying, inaccessibility of card readers in many places, waiting in the lines of ATMs, etc. In this paper we will present a new method named as multipurpose smart SIM card in order to resolve these problems. The Recommended SIM card, worked based on the mobile database architecture that we will discuss about this architecture and location dependent queries processing in it.then we will study the difficulty of finding the nearby and best unoccupied ATM as a case study and at last we will propose a method to authenticate users in this system. II. Existing System: Existing ATMs are convenient and easy to use for most consumers. Existing ATMs typically provide directions on an ATM display screen that are read by a user to provide for collaborative operation of the ATM. Having read the display the commands, a user is able to use and operate the ATM via data and information pass on a keypad. However the drawback in the existing system is that the user must carry their ATM card without fail. But in many cases we fail to recall it. So only we designed this system which services us in the ATM machine without the ATM card. 63 Page

3.1BLOCK DIAGRAM: III. Proposed System: 3.2Mobile Section 3.2.1Status page Login Page Figure (3.1)Proposed Technique Switching Command Status report Figure(3.2)Status page 3.3WORK FLOW OF THE PROPOSED TECHNIQUE In this proposed system we have created the new generation ATM machine which can be operator without the ATM card. By using this scheme ATM mechanism can be operated using our SIM and Face identification. When we insert our SIM in the reader unit of the ATM machine it transfers the mobile to the server. In server we can gather the related information of the mobile number (i.e.) the user s particulars of Bank account and their photographs etc. The camera presented near the ATM machine will capture the user s image and compare it with the user image in the server using MATLAB. Only when the image matches it requests the pin number and further operations will starts. Otherwise the process will terminate automatically. So by using this system necessity of ATM card is entirely eliminated. Here we can operate the ATM machine by using our SIM card itself. Using this system we can avoid malfunctions. Also our transaction will be greatly secured. Additionally more application can also be added in this system. Here we can implement multiple bank account details into one ATM and we can use one ATM card for withdrawing our different bank accounts. Also Another one application of this system is to find the nearest ATM centre which is working properly. With the help of our GSM technology. 64 Page

IV. User Authentication Methods 4.1 FACE REORGANIZATION PROCESS Figure (4.1) Step-1 Figure (4.2) Step-2 65 Page

Figure (4.3) Step-3 Figure (4.4) Step-4 V. Conclusion The VHDL code was simulated and synthesized finally it was implemented in FPGA successfully. During the examination we find out that the face detection using Mat lab execution, There It proves to us that the detection algorithm can detect the face and the ATM was operated successfully using Visual studio. Also the embedded smart banking security system is executed AUTHORS PROFILE R.Vignesh Kumar was born in 1990 Tamilnadu, India..He received the B.E degree in electrical & electronics engineering from RVS College of engineering & tech, india in 2012. And presently doing his Master of Engineering in Embedded Systems in RVS College of engineering & tech, india. His current research includes Digital image processing & FPGA implementation. 66 Page

T. Kanimozhi was born in Tamilnadu, India in 1980, she received the B.E degree in electrical & electronics engineering from the Madurai kamaraj university India in 2001 and the M.Sc. Degree in power engineering from Nanyang technological university, Singapore in 2009. She is currently working as an assistant professor in RVS College of engineering & tech., India. Her current research interests included renewable energy sources, and power management. T. Uma Mahesweri was born in Tamilnadu in 1980, India, she received the B.E degree in electrical & electronics engineering from the Madurai kamaraj university, India in 2004 and the M.E., degree in power electronics and drives from P.S.N.A college of engineering and Technology, Dindigul in 2009.She is currently working as an assistant professor in RVS College of engineering & tech., India. Her current research interests included renewable energy sources, and Power Electronics. References [1] M. Ejiri, T. Uno, M. Mese and S. Ikeda, A Process for Detecting Defects in Complicated Patterns, Computer Graphics and Image Processing, Vol.2, No.3-4, 1973, pp. 326-339. [2] S. Kashioka, M. Ejiri and Y. Sakamoto, A Transistor Wire-Bonding System Utilizing Multiple Local Pattern Matching Techniques, IEEE Trans. on SMC, Vol.SMC-6, No.8, Oct. 1977, pp. 562-570. [3] H. Yoda, Y. Ohuchi, Y. Taniguchi and M. Ejiri, An Automatic Wafer Inspection System Using Pipelined Image Processing Techniques, IEEE Trans. on PAMI, Vol. PAMI-10, No.10, 1988, pp.4-16. [4] M. Ejiri, H. Yoda, H.Sakou and Y. Sakamoto, Knowledge-Directed Inspection for Complex Multilayered Patterns, Machine Vision and Applications, vol.2, no.3, 1989, pp.155-166. [5] D. Barbara, "Mobile computing and databases - a survey", IEEE Transaction on Knowledge and Data Engineering, vol. 11, no.i, pp. 67 Page