SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 124
Wireless Serial Data Synchronization for Money Transaction
Using Multi Account Embedded ATM Card
Prof. Manasa C1
, Vallela Sai Krishna Reddy2
, Varshitha S Bellad3
,
Rohith P4
, Jeeshan M5
1
(Assistant Professor/Department of CSE, Bangalore Institute of Technology, Bengaluru,
Email: manasa244@gmail.com)
2,3,4,5
(Department of CSE, Bangalore Institute of Technology, Bengaluru)
----------------------------------------************************----------------------------------
Abstract:
The idea behind this work is that to add more than one bank account in an ATM card, so that the user need
not carry more cards with them and complication of handling passwords. Here in this one we embedded
more than one bank account so that the user can transact as she/he wish with a swipe. In addition to this
convenience factor provided by multiaccount ATM we also provide enhance security features for both
authorized/unauthorized users. If the card is swiped by the authorized user then he will get access with a
help of a Eye Tracking method which is designed with help of haarcascade and facial landmark
algorithms. For unauthorized users the wifi module sensor is used. It sends OTP to the authorized user.
The OTP is to be entered through keypad by unauthorized user and the amount is provided only if the
OTP is matched. The system also provides an option of choosing between several banks. The user can
select which bank he desires to perform truncation with. This selection of choice is enabled by
programming the keypad.
Keywords —Multiaccount, Authorized, Unauthorized, Eye Tracking, Haarcascade, Facial Landmark, wifi, OTP
----------------------------------------************************----------------------------------
I. INTRODUCTION
ATM is an abbreviation of Automated Teller
Machine. It is introduced in the year 1959 for
encouraging self service in retail banking. This
makes people to deposit, withdraw and transfer
amount without the help of banking persons and it
can be done at anytime and anywhere. At first, the
ATM was made to transact for the particular bank
customers but later on the ATMs are connected to
interbank network, so that it enables people to
deposit, withdraw and transfer amount from the
ATM machines not belonging to that particular
bank (i.e.) any one can access any banks ATM
machine to carry out their transactions. ATMs rely
on authorisation of a financial transaction by the
card issuer or other authorizing institution via the
communication network. This is often performed
through an ISO 8583messaging system. Many bank
charges ATM usage fees from the customers for the
transactions. At present every customer has an
individual ATM card for each and every bank in
which he/she maintains account. So handling the
cards, their passwords play a major role here. So to
overcome these difficulties we embedded more than
one bank account of the user in a single ATM smart
card, so that the user can swipe the card and can
select the bank from which he/she are interested to
carry out transaction.
II. EXISTING SYSTEM
An automated teller machine (ATM) or cash
machine is an electronic device that allows a bank’s
customers to make cash withdrawals and check
RESEARCH ARTICLE OPEN ACCESS
International Journal of Scientific Research and Engineering Development
©IJSRED: All Rights are Reserved
their account balances without the need or human
teller. Many ATMs also allow people to deposit
cash or cheques, transfer money between their bank
accounts, top up their mobile phones prepaid or
even buy postage stamps.
In most modern ATMs, the customer identifies
him or herself by inserting a plastic card with
magnetic strip or plastic smart card with a chip that
contains his or her account number. The customer
then verifies his or her identity by entering a
passcode (i.e.) personal identification number (PIN)
of four digits. If the number is entered incorrectly
several times consecutively (usually three), most
ATMs will retain the card as a security precaution
to prevent an unauthorized user form discovering
the PIN by guesswork and so on. Moreover there is
a limitation in transaction for the other bank
customers in using the ATM of some other bank
crossing the limit they have to pay transaction fees.
2.1 Objectives
The main objectives of this project are:
Operate different bank accounts instead of having
individual card. Designing a System
Face and Eye using Camera by Using Haarcascade
technique detecting the movement of
calculating it.
This work is to design the system and to train the
system for detecting face region and eye region
within the image that is captured by the camera.
III. PROPOSED SYSTEM
In this proposed system we are a Embedded multi
account ATM card. The idea behind this
multiaccount ATM card is that the customers can
use a single ATM card to operate different bank
accounts instead of having individual card for each
bank account and maintaining their pin’
the cards safely which is a tedious process at
present scenario. The technology behind the
product of the service is that adding all the user
bank accounts to a multiaccount ATM card. In this
if the authorised user swipes his/her smart card in
the ATM machine, then it request for authentication
in the server side. After the user is authenticated
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
their account balances without the need or human
teller. Many ATMs also allow people to deposit
cash or cheques, transfer money between their bank
r mobile phones prepaid or
In most modern ATMs, the customer identifies
him or herself by inserting a plastic card with
magnetic strip or plastic smart card with a chip that
contains his or her account number. The customer
erifies his or her identity by entering a
passcode (i.e.) personal identification number (PIN)
of four digits. If the number is entered incorrectly
several times consecutively (usually three), most
ATMs will retain the card as a security precaution
ent an unauthorized user form discovering
the PIN by guesswork and so on. Moreover there is
a limitation in transaction for the other bank
customers in using the ATM of some other bank
crossing the limit they have to pay transaction fees.
The main objectives of this project are:
Operate different bank accounts instead of having
individual card. Designing a System for tracking
Using Haarcascade
technique detecting the movement of eye and
k is to design the system and to train the
system for detecting face region and eye region
within the image that is captured by the camera.
In this proposed system we are a Embedded multi
The idea behind this
ATM card is that the customers can
use a single ATM card to operate different bank
accounts instead of having individual card for each
count and maintaining their pin’s, carrying
the cards safely which is a tedious process at
The technology behind the
product of the service is that adding all the user
ATM card. In this
user swipes his/her smart card in
the ATM machine, then it request for authentication
the user is authenticated
with his Eye Tracking process, then it displays the
list of all banks that the user is having account.
Now the user can select the bank from which he/she
is willing to perform transaction.
unauthorised user want to get acc
(owner of ATM card permission required) an OTP
which is send to the owner mobile. So by entering
the OTP it can get access and asks to
bank from which he/she is willing to perform
transaction. OTP is generated wifi module se
By these two methodologies except owner no
person know the password of ATM card and there
is no chance to get hack because the owner is to get
access via EyeTracker.
3.1 System Architecture
A system architecture or systems architecture
is the conceptual model that defines the
structure, behavior, and more views of a
system. An architecture description is a formal
description and representation of a system,
organized in a way that supports reasoning
about the structures and behaviors of the
system.
Fig1: Architecture of the proposed system
The RFID reader will read the card and the unique
password which is set by the bank
sent to OpenCV where the password is stored and
then the password is entered through the eye
movement and eye blinking
generation from wifi sensor
authentication process will be done based on the
generated password and the entered password.
Issue 4, July-Aug 2020
www.ijsred.com
Page 125
, then it displays the
list of all banks that the user is having account.
user can select the bank from which he/she
transaction. If the
ised user want to get access then it requires
(owner of ATM card permission required) an OTP
which is send to the owner mobile. So by entering
the OTP it can get access and asks to select the
bank from which he/she is willing to perform
. OTP is generated wifi module sensor.
By these two methodologies except owner no other
person know the password of ATM card and there
is no chance to get hack because the owner is to get
A system architecture or systems architecture
the conceptual model that defines the
structure, behavior, and more views of a
system. An architecture description is a formal
description and representation of a system,
organized in a way that supports reasoning
about the structures and behaviors of the
Architecture of the proposed system
The RFID reader will read the card and the unique
password which is set by the bank.Thispassword is
sent to OpenCV where the password is stored and
then the password is entered through the eye
t and eye blinking or with OTP
generation from wifi sensor. Further the
authentication process will be done based on the
generated password and the entered password.
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 126
IV. METHODOLOGY
4.1 Multibank user Access
The user scans the RFID tag which uses symmetric
encryption algorithm with RFID reader.
The RFID component communicates with the
Arduino (where multiple bank accounts are stored
in the database)using the UART(Universal
Asynchronous Receiver Transmitter) protocol.
UART main purpose is to transmit and receive
serial data. Instead of clock signal, the transmitting
UART adds start and stop bits to the data packet
being transferred.
4.2 Unauthorized authentication
The unauthorised user when he/she wants toaccess
the transaction, first scans the card.The owner of
the account gets the OTP from the bank.This is
OTP method is done through the Wifi ESP8266
module. Finally the unauthorized person gets the
OTP from the owner, further transactions are
carried out
4.3 Eye detection
Eye detection module is used to detect the eye
region in the inputimage. Image that is captured
from the camera is sent to eye detection module
where the haarcascade algorithm is used to detect
the face in the image and in that face region the eye
region will bedetected. The specific window
location is sent to nextmodule.
Haar cascade algorithm: This algorithm is used
to detect the face and eye region in the image
4.4 Feature Extraction
The output of the above module is taken as input in
thismodule.Based on the window location of the
face the key facial structures of the face i.e., eye,
nose, mouth, ears would be found and the specific
(x,y) co-ordinates would be given to the facial
structures starting from 1 to 68.Then the co-
ordinates of the left and right eye will be used to
draw the polygon over the eye region.
Facial land mark detector algorithm: This is used to
detect and label the facial landmarks of theimage.


Fig 2: 68 Facial landmark points
4.5 Eye Tracking
Eye tracking is used to track the eye movement and
to detect the eye blinking for updating the
password. The co-ordinates of the eye will be used
to find the midpoint of the eye and through the
midpoint the horizontal and vertical line will be
drawn based on these line the tracking of the eye
movement will updatepassword.
V. RESULTS
5.1 Authorized userTransaction
Firstly user swipes the card then the LCD displays
whether the user wants to continue as the
authorized or unauthorized. After selecting as the
authorized user then it gets to the password entry
through the eye tracker. If password valid then
allows to select the list of multiple banks.
International Journal of Scientific Research and Engineering Development
©IJSRED: All Rights are Reserved
Fig 3: Selecting multiple banks by authorized
person
Fig 4: virtual keypad with eye when not
blinked(red)
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
Selecting multiple banks by authorized
virtual keypad with eye when not
Fig 5:Green color when the eye is blinked.
To show whether password is matched or not.
After selecting a particular bank, the above
message will be displayed to enter the amount.
Then the user enters the amount value. After
entering money it displays to collect. Finally the
transaction ends.
Issue 4, July-Aug 2020
www.ijsred.com
Page 127
Green color when the eye is blinked.
To show whether password is matched or not.
After selecting a particular bank, the above
message will be displayed to enter the amount.
Then the user enters the amount value. After
ey it displays to collect. Finally the
International Journal of Scientific Research and Engineering Development
©IJSRED: All Rights are Reserved
Fig 8: Withdrawing money from particular bank
5.2 Unauthorized userTransaction
Here Instead of Eye Tracker we need to get
access through the OTP which is generated by wifi
module. After that we can follow the same
transaction steps which is shown in fig 8.
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4
Available at www.ijsred.com
©IJSRED: All Rights are Reserved
Withdrawing money from particular bank
Here Instead of Eye Tracker we need to get
access through the OTP which is generated by wifi
module. After that we can follow the same
transaction steps which is shown in fig 8.
Fig 9: unauthorized user transaction with help of
authorized user.
VI. CONCLUSION
The system we are using for handling multiple
accounts here is more efficient than existing
system. This Reduces transaction cost of handling
multiple accounts of a single user. This make
banking system more efficient than the existing
system. Using this the users can perform
transactions for all his bank Accounts using single
smart ATM card with Enhanced security system
such as OTP (one time password) and Eye
recognition. Thus the user can manage his multiple
accounts in various banks with the he
single smart card which provides access and
reduces the complex of managing more than one
ATM card and passwords. This also leads
cost of transaction charges that were on the
customers for making transaction and decrease
their production of smart cards for each every
account the user has. By implementing this ATM
fraud i.e. skimming etc., can beavoided.
Issue 4, July-Aug 2020
www.ijsred.com
Page 128
unauthorized user transaction with help of
The system we are using for handling multiple
more efficient than existing
system. This Reduces transaction cost of handling
multiple accounts of a single user. This make
banking system more efficient than the existing
ing this the users can perform
transactions for all his bank Accounts using single
smart ATM card with Enhanced security system
such as OTP (one time password) and Eye
recognition. Thus the user can manage his multiple
various banks with the help of this
single smart card which provides access and
reduces the complex of managing more than one
also leads to reduce
cost of transaction charges that were on the
transaction and decrease in
their production of smart cards for each every
By implementing this ATM
avoided.
International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020
Available at www.ijsred.com
ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 129
VII. FUTURE SCOPE
Future research will help to do away with PINs
completely and dwarf ATM card authorization by
introducing palm and finger vein authentication
which is fast, accurate and difficult to fake. Since
more than one bank accounts being added, the
existing PIN security are not sufficient enough, so
we can use a biometric scan in the smart card i.e.
multi component card So that the user holds the
card such that the face recognition on the biometric
scan reader while he swipes the registered card and
the image is authenticated at the real time. No one
other than the user and their family can use the
card. Only if the face matches the user can enter
his PIN number otherwise the transaction will not
be allowed until the user is authenticated.
VIII. REFERENCES
[1] ATM Transaction Security Using
Fingerprint Recognition by Mithun
Dutta, KangkhitaKeam Psyche and
Shamima Yasmin,2018.
[2] Face Recognition based new
generation ATM machine by DArun Kumar, M.AhmedAskar, A Ajay, R Ambika,
[3] Highly Secure Multiple Account
Bank Affinity Card-A Successor For
ATM Card, Farha Kouser, Nagaratna,
Pavithra VR, Bhavya Sree,
Ravikiran,2018.
[4] Secure Internet Banking Application”-
Alain Hiltgen,ThorstenKramp.
[5] Real-time Eye Tracking for Password
Authentication,
MehrubeMehrubeoglu, Vuong
Nguyen,2018.
[6] Enhancing Micro-ATM and POS
terminals Authentication System
Using Advanced Biometric
Techniques, Priya tawde, Dr. G
Prasanna Lakshmi,2017.
[7] Smart ATM security system using
FPR, GSM, GPS Bharati M,
Nelligani, N V, Uma Reddy, Nitin
Awasti,2016.
[8] Facial recognition using sensors in
ATM Jaganiga M, Vaitheswari S,
RasitraR, Lakshmi S,2018.
[9] Multi bank ATM family
CardKSridharan,K G yuvaraaj,K C
Rahul, S D Ashok kumar, 2017.
[10] Cardless Automatic teller machine
biometric security system design using
human Fingerprints, Madhuri More,
Sudarshan Kankal, AkshayKumarKharat,
Rupali Adhau,2018.
[11] ATM security using eye and facial
recognition system, Sakshi Shrimal,
Nishant Shrimal,2018.
[12] Chip-and-PIN: Success and
challenges in reducing Fraud from Federal
Reserve Bank of Atlanta

Contenu connexe

Tendances

IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
Atm Service in bangladesh
Atm Service in bangladeshAtm Service in bangladesh
Atm Service in bangladeshSultan Mahmood
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atmkhurda
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDYanand reddy
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURERadhika Venkat
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET Journal
 

Tendances (20)

IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Atm Service in bangladesh
Atm Service in bangladeshAtm Service in bangladesh
Atm Service in bangladesh
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
project_report
project_reportproject_report
project_report
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
N044057478
N044057478N044057478
N044057478
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDY
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
ATM with an EYE
ATM with an EYEATM with an EYE
ATM with an EYE
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment System
 

Similaire à Wireless Serial Data Synchronization for Money Transaction Using Multi Account Embedded ATM Card

BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- BankingAniketPujari
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingYiannis Hatzopoulos
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_industhemightycissp
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Out sources of atm
Out sources of atmOut sources of atm
Out sources of atmDharmik
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 

Similaire à Wireless Serial Data Synchronization for Money Transaction Using Multi Account Embedded ATM Card (20)

BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- Banking
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
Atm
AtmAtm
Atm
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Moneypad
MoneypadMoneypad
Moneypad
 
40120140501002
4012014050100240120140501002
40120140501002
 
Uniform payment system_for_banking_indus
Uniform payment system_for_banking_indusUniform payment system_for_banking_indus
Uniform payment system_for_banking_indus
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Ppt
PptPpt
Ppt
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
Out sources of atm
Out sources of atmOut sources of atm
Out sources of atm
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 

Plus de IJSRED

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security SystemIJSRED
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityIJSRED
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseIJSRED
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesIJSRED
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by FranceIJSRED
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition SystemIJSRED
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPIJSRED
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. AmaraIJSRED
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsIJSRED
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cartIJSRED
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...IJSRED
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen ManagementIJSRED
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsIJSRED
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionIJSRED
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...IJSRED
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemIJSRED
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistantIJSRED
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaIJSRED
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....IJSRED
 

Plus de IJSRED (20)

IJSRED-V3I6P13
IJSRED-V3I6P13IJSRED-V3I6P13
IJSRED-V3I6P13
 
School Bus Tracking and Security System
School Bus Tracking and Security SystemSchool Bus Tracking and Security System
School Bus Tracking and Security System
 
BigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunityBigBasket encashing the Demonetisation: A big opportunity
BigBasket encashing the Demonetisation: A big opportunity
 
Quantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf DiseaseQuantitative and Qualitative Analysis of Plant Leaf Disease
Quantitative and Qualitative Analysis of Plant Leaf Disease
 
DC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric VehiclesDC Fast Charger and Battery Management System for Electric Vehicles
DC Fast Charger and Battery Management System for Electric Vehicles
 
Growth Path Followed by France
Growth Path Followed by FranceGrowth Path Followed by France
Growth Path Followed by France
 
Acquisition System
Acquisition SystemAcquisition System
Acquisition System
 
Parallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MPParallelization of Graceful Labeling Using Open MP
Parallelization of Graceful Labeling Using Open MP
 
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. AmaraStudy of Phenotypic Plasticity of  Fruits of Luffa Acutangula Var. Amara
Study of Phenotypic Plasticity of Fruits of Luffa Acutangula Var. Amara
 
Understanding Architecture of Internet of Things
Understanding Architecture of Internet of ThingsUnderstanding Architecture of Internet of Things
Understanding Architecture of Internet of Things
 
Smart shopping cart
Smart shopping cartSmart shopping cart
Smart shopping cart
 
An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...An Emperical Study of Learning How Soft Skills is Essential for Management St...
An Emperical Study of Learning How Soft Skills is Essential for Management St...
 
Smart Canteen Management
Smart Canteen ManagementSmart Canteen Management
Smart Canteen Management
 
Gandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic EthicsGandhian trusteeship and Economic Ethics
Gandhian trusteeship and Economic Ethics
 
Impacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric SolutionImpacts of a New Spatial Variable on a Black Hole Metric Solution
Impacts of a New Spatial Variable on a Black Hole Metric Solution
 
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
A Study to Assess the Effectiveness of Planned Teaching Programme on Knowledg...
 
Inginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition SystemInginious Trafalgar Contrivition System
Inginious Trafalgar Contrivition System
 
Farmer's Analytical assistant
Farmer's Analytical assistantFarmer's Analytical assistant
Farmer's Analytical assistant
 
Functions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in IndiaFunctions of Forensic Engineering Investigator in India
Functions of Forensic Engineering Investigator in India
 
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
Participation Politique Feminine En Competition Électorale Au Congo-Kinshasa....
 

Dernier

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Dernier (20)

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 

Wireless Serial Data Synchronization for Money Transaction Using Multi Account Embedded ATM Card

  • 1. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED:All Rights are Reserved Page 124 Wireless Serial Data Synchronization for Money Transaction Using Multi Account Embedded ATM Card Prof. Manasa C1 , Vallela Sai Krishna Reddy2 , Varshitha S Bellad3 , Rohith P4 , Jeeshan M5 1 (Assistant Professor/Department of CSE, Bangalore Institute of Technology, Bengaluru, Email: manasa244@gmail.com) 2,3,4,5 (Department of CSE, Bangalore Institute of Technology, Bengaluru) ----------------------------------------************************---------------------------------- Abstract: The idea behind this work is that to add more than one bank account in an ATM card, so that the user need not carry more cards with them and complication of handling passwords. Here in this one we embedded more than one bank account so that the user can transact as she/he wish with a swipe. In addition to this convenience factor provided by multiaccount ATM we also provide enhance security features for both authorized/unauthorized users. If the card is swiped by the authorized user then he will get access with a help of a Eye Tracking method which is designed with help of haarcascade and facial landmark algorithms. For unauthorized users the wifi module sensor is used. It sends OTP to the authorized user. The OTP is to be entered through keypad by unauthorized user and the amount is provided only if the OTP is matched. The system also provides an option of choosing between several banks. The user can select which bank he desires to perform truncation with. This selection of choice is enabled by programming the keypad. Keywords —Multiaccount, Authorized, Unauthorized, Eye Tracking, Haarcascade, Facial Landmark, wifi, OTP ----------------------------------------************************---------------------------------- I. INTRODUCTION ATM is an abbreviation of Automated Teller Machine. It is introduced in the year 1959 for encouraging self service in retail banking. This makes people to deposit, withdraw and transfer amount without the help of banking persons and it can be done at anytime and anywhere. At first, the ATM was made to transact for the particular bank customers but later on the ATMs are connected to interbank network, so that it enables people to deposit, withdraw and transfer amount from the ATM machines not belonging to that particular bank (i.e.) any one can access any banks ATM machine to carry out their transactions. ATMs rely on authorisation of a financial transaction by the card issuer or other authorizing institution via the communication network. This is often performed through an ISO 8583messaging system. Many bank charges ATM usage fees from the customers for the transactions. At present every customer has an individual ATM card for each and every bank in which he/she maintains account. So handling the cards, their passwords play a major role here. So to overcome these difficulties we embedded more than one bank account of the user in a single ATM smart card, so that the user can swipe the card and can select the bank from which he/she are interested to carry out transaction. II. EXISTING SYSTEM An automated teller machine (ATM) or cash machine is an electronic device that allows a bank’s customers to make cash withdrawals and check RESEARCH ARTICLE OPEN ACCESS
  • 2. International Journal of Scientific Research and Engineering Development ©IJSRED: All Rights are Reserved their account balances without the need or human teller. Many ATMs also allow people to deposit cash or cheques, transfer money between their bank accounts, top up their mobile phones prepaid or even buy postage stamps. In most modern ATMs, the customer identifies him or herself by inserting a plastic card with magnetic strip or plastic smart card with a chip that contains his or her account number. The customer then verifies his or her identity by entering a passcode (i.e.) personal identification number (PIN) of four digits. If the number is entered incorrectly several times consecutively (usually three), most ATMs will retain the card as a security precaution to prevent an unauthorized user form discovering the PIN by guesswork and so on. Moreover there is a limitation in transaction for the other bank customers in using the ATM of some other bank crossing the limit they have to pay transaction fees. 2.1 Objectives The main objectives of this project are: Operate different bank accounts instead of having individual card. Designing a System Face and Eye using Camera by Using Haarcascade technique detecting the movement of calculating it. This work is to design the system and to train the system for detecting face region and eye region within the image that is captured by the camera. III. PROPOSED SYSTEM In this proposed system we are a Embedded multi account ATM card. The idea behind this multiaccount ATM card is that the customers can use a single ATM card to operate different bank accounts instead of having individual card for each bank account and maintaining their pin’ the cards safely which is a tedious process at present scenario. The technology behind the product of the service is that adding all the user bank accounts to a multiaccount ATM card. In this if the authorised user swipes his/her smart card in the ATM machine, then it request for authentication in the server side. After the user is authenticated International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4 Available at www.ijsred.com ©IJSRED: All Rights are Reserved their account balances without the need or human teller. Many ATMs also allow people to deposit cash or cheques, transfer money between their bank r mobile phones prepaid or In most modern ATMs, the customer identifies him or herself by inserting a plastic card with magnetic strip or plastic smart card with a chip that contains his or her account number. The customer erifies his or her identity by entering a passcode (i.e.) personal identification number (PIN) of four digits. If the number is entered incorrectly several times consecutively (usually three), most ATMs will retain the card as a security precaution ent an unauthorized user form discovering the PIN by guesswork and so on. Moreover there is a limitation in transaction for the other bank customers in using the ATM of some other bank crossing the limit they have to pay transaction fees. The main objectives of this project are: Operate different bank accounts instead of having individual card. Designing a System for tracking Using Haarcascade technique detecting the movement of eye and k is to design the system and to train the system for detecting face region and eye region within the image that is captured by the camera. In this proposed system we are a Embedded multi The idea behind this ATM card is that the customers can use a single ATM card to operate different bank accounts instead of having individual card for each count and maintaining their pin’s, carrying the cards safely which is a tedious process at The technology behind the product of the service is that adding all the user ATM card. In this user swipes his/her smart card in the ATM machine, then it request for authentication the user is authenticated with his Eye Tracking process, then it displays the list of all banks that the user is having account. Now the user can select the bank from which he/she is willing to perform transaction. unauthorised user want to get acc (owner of ATM card permission required) an OTP which is send to the owner mobile. So by entering the OTP it can get access and asks to bank from which he/she is willing to perform transaction. OTP is generated wifi module se By these two methodologies except owner no person know the password of ATM card and there is no chance to get hack because the owner is to get access via EyeTracker. 3.1 System Architecture A system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviors of the system. Fig1: Architecture of the proposed system The RFID reader will read the card and the unique password which is set by the bank sent to OpenCV where the password is stored and then the password is entered through the eye movement and eye blinking generation from wifi sensor authentication process will be done based on the generated password and the entered password. Issue 4, July-Aug 2020 www.ijsred.com Page 125 , then it displays the list of all banks that the user is having account. user can select the bank from which he/she transaction. If the ised user want to get access then it requires (owner of ATM card permission required) an OTP which is send to the owner mobile. So by entering the OTP it can get access and asks to select the bank from which he/she is willing to perform . OTP is generated wifi module sensor. By these two methodologies except owner no other person know the password of ATM card and there is no chance to get hack because the owner is to get A system architecture or systems architecture the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviors of the Architecture of the proposed system The RFID reader will read the card and the unique password which is set by the bank.Thispassword is sent to OpenCV where the password is stored and then the password is entered through the eye t and eye blinking or with OTP generation from wifi sensor. Further the authentication process will be done based on the generated password and the entered password.
  • 3. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 126 IV. METHODOLOGY 4.1 Multibank user Access The user scans the RFID tag which uses symmetric encryption algorithm with RFID reader. The RFID component communicates with the Arduino (where multiple bank accounts are stored in the database)using the UART(Universal Asynchronous Receiver Transmitter) protocol. UART main purpose is to transmit and receive serial data. Instead of clock signal, the transmitting UART adds start and stop bits to the data packet being transferred. 4.2 Unauthorized authentication The unauthorised user when he/she wants toaccess the transaction, first scans the card.The owner of the account gets the OTP from the bank.This is OTP method is done through the Wifi ESP8266 module. Finally the unauthorized person gets the OTP from the owner, further transactions are carried out 4.3 Eye detection Eye detection module is used to detect the eye region in the inputimage. Image that is captured from the camera is sent to eye detection module where the haarcascade algorithm is used to detect the face in the image and in that face region the eye region will bedetected. The specific window location is sent to nextmodule. Haar cascade algorithm: This algorithm is used to detect the face and eye region in the image 4.4 Feature Extraction The output of the above module is taken as input in thismodule.Based on the window location of the face the key facial structures of the face i.e., eye, nose, mouth, ears would be found and the specific (x,y) co-ordinates would be given to the facial structures starting from 1 to 68.Then the co- ordinates of the left and right eye will be used to draw the polygon over the eye region. Facial land mark detector algorithm: This is used to detect and label the facial landmarks of theimage.   Fig 2: 68 Facial landmark points 4.5 Eye Tracking Eye tracking is used to track the eye movement and to detect the eye blinking for updating the password. The co-ordinates of the eye will be used to find the midpoint of the eye and through the midpoint the horizontal and vertical line will be drawn based on these line the tracking of the eye movement will updatepassword. V. RESULTS 5.1 Authorized userTransaction Firstly user swipes the card then the LCD displays whether the user wants to continue as the authorized or unauthorized. After selecting as the authorized user then it gets to the password entry through the eye tracker. If password valid then allows to select the list of multiple banks.
  • 4. International Journal of Scientific Research and Engineering Development ©IJSRED: All Rights are Reserved Fig 3: Selecting multiple banks by authorized person Fig 4: virtual keypad with eye when not blinked(red) International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4 Available at www.ijsred.com ©IJSRED: All Rights are Reserved Selecting multiple banks by authorized virtual keypad with eye when not Fig 5:Green color when the eye is blinked. To show whether password is matched or not. After selecting a particular bank, the above message will be displayed to enter the amount. Then the user enters the amount value. After entering money it displays to collect. Finally the transaction ends. Issue 4, July-Aug 2020 www.ijsred.com Page 127 Green color when the eye is blinked. To show whether password is matched or not. After selecting a particular bank, the above message will be displayed to enter the amount. Then the user enters the amount value. After ey it displays to collect. Finally the
  • 5. International Journal of Scientific Research and Engineering Development ©IJSRED: All Rights are Reserved Fig 8: Withdrawing money from particular bank 5.2 Unauthorized userTransaction Here Instead of Eye Tracker we need to get access through the OTP which is generated by wifi module. After that we can follow the same transaction steps which is shown in fig 8. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4 Available at www.ijsred.com ©IJSRED: All Rights are Reserved Withdrawing money from particular bank Here Instead of Eye Tracker we need to get access through the OTP which is generated by wifi module. After that we can follow the same transaction steps which is shown in fig 8. Fig 9: unauthorized user transaction with help of authorized user. VI. CONCLUSION The system we are using for handling multiple accounts here is more efficient than existing system. This Reduces transaction cost of handling multiple accounts of a single user. This make banking system more efficient than the existing system. Using this the users can perform transactions for all his bank Accounts using single smart ATM card with Enhanced security system such as OTP (one time password) and Eye recognition. Thus the user can manage his multiple accounts in various banks with the he single smart card which provides access and reduces the complex of managing more than one ATM card and passwords. This also leads cost of transaction charges that were on the customers for making transaction and decrease their production of smart cards for each every account the user has. By implementing this ATM fraud i.e. skimming etc., can beavoided. Issue 4, July-Aug 2020 www.ijsred.com Page 128 unauthorized user transaction with help of The system we are using for handling multiple more efficient than existing system. This Reduces transaction cost of handling multiple accounts of a single user. This make banking system more efficient than the existing ing this the users can perform transactions for all his bank Accounts using single smart ATM card with Enhanced security system such as OTP (one time password) and Eye recognition. Thus the user can manage his multiple various banks with the help of this single smart card which provides access and reduces the complex of managing more than one also leads to reduce cost of transaction charges that were on the transaction and decrease in their production of smart cards for each every By implementing this ATM avoided.
  • 6. International Journal of Scientific Research and Engineering Development-– Volume 3 Issue 4, July-Aug 2020 Available at www.ijsred.com ISSN : 2581-7175 ©IJSRED: All Rights are Reserved Page 129 VII. FUTURE SCOPE Future research will help to do away with PINs completely and dwarf ATM card authorization by introducing palm and finger vein authentication which is fast, accurate and difficult to fake. Since more than one bank accounts being added, the existing PIN security are not sufficient enough, so we can use a biometric scan in the smart card i.e. multi component card So that the user holds the card such that the face recognition on the biometric scan reader while he swipes the registered card and the image is authenticated at the real time. No one other than the user and their family can use the card. Only if the face matches the user can enter his PIN number otherwise the transaction will not be allowed until the user is authenticated. VIII. REFERENCES [1] ATM Transaction Security Using Fingerprint Recognition by Mithun Dutta, KangkhitaKeam Psyche and Shamima Yasmin,2018. [2] Face Recognition based new generation ATM machine by DArun Kumar, M.AhmedAskar, A Ajay, R Ambika, [3] Highly Secure Multiple Account Bank Affinity Card-A Successor For ATM Card, Farha Kouser, Nagaratna, Pavithra VR, Bhavya Sree, Ravikiran,2018. [4] Secure Internet Banking Application”- Alain Hiltgen,ThorstenKramp. [5] Real-time Eye Tracking for Password Authentication, MehrubeMehrubeoglu, Vuong Nguyen,2018. [6] Enhancing Micro-ATM and POS terminals Authentication System Using Advanced Biometric Techniques, Priya tawde, Dr. G Prasanna Lakshmi,2017. [7] Smart ATM security system using FPR, GSM, GPS Bharati M, Nelligani, N V, Uma Reddy, Nitin Awasti,2016. [8] Facial recognition using sensors in ATM Jaganiga M, Vaitheswari S, RasitraR, Lakshmi S,2018. [9] Multi bank ATM family CardKSridharan,K G yuvaraaj,K C Rahul, S D Ashok kumar, 2017. [10] Cardless Automatic teller machine biometric security system design using human Fingerprints, Madhuri More, Sudarshan Kankal, AkshayKumarKharat, Rupali Adhau,2018. [11] ATM security using eye and facial recognition system, Sakshi Shrimal, Nishant Shrimal,2018. [12] Chip-and-PIN: Success and challenges in reducing Fraud from Federal Reserve Bank of Atlanta