SlideShare une entreprise Scribd logo
1  sur  14
Prepared By:-
Suraksha Sanghavi
TE Computer
Roll No :- 40
Guided By :-
Prof.S.B.Ambhore
1
I. Introduction
II. ATM
III. Literature Survey
IV. Iris Recognition
V. WORKING
VI. ADVANTAGES
VII. DISADVANTAGES
VIII. CONCLUSION
IX. REFERENCES
ATM Security WITH IRIS RECOGNITION 2
ATM Security WITH IRIS RECOGNITION 3
 An automated teller machine
(ATM) is :
 Made money transactions easy for
customers to bank.
 Device that provides the customers of
a financial transactions in a public
space without the need for a bank .
 Security requiring combination
Physical access card + Password(PIN)
ATM Security WITH IRIS RECOGNITION 4
Pin
 People write PINs and disclose to others increasing the
risk of fraud and PINs can be stolen by observation
 PIN is a confidential code issued to the
cardholder to permit access to that account
 The PIN does not prove the identification of the
cardholder
ATM Security WITH IRIS RECOGNITION 5
 Finger Printing
 Facial Recognition
 Iris Recognition
ATM Security WITH IRIS RECOGNITION 6
SR.NO TECHNIQUE LIMITATION
1 Finger print It can make mistakes with the dryness
or dirty of the finger’s skin
2 Facial recognition Affected by changes in lighting
ATM Security WITH IRIS RECOGNITION 7
 Iris technology, which uses the iris pattern of
an individual as an identity proof
 In 1953 – Algorithm developed , First used by
John Daugman
 As the initiative 1st the bank had installed iris
based ATM’s inside Kroger Supermarket stores
in Houston, Dallas and Fort Worth.
ATM Security WITH IRIS RECOGNITION 8
ATM Security WITH IRIS RECOGNITION 9
 Easy to access
 Highly protected, internal organ of the eye
 Limited genetic penetrance of iris patterns
 Patterns apparently stable throughout life
 High Accuracy
ATM Security WITH IRIS RECOGNITION 10
 Costly
 The person should be present at the spot.
 Small target
 Sometimes False acceptances and rejections.
 Flash of camera should not become so bright.
ATM Security WITH IRIS RECOGNITION 11
 More reliable in providing security by using iris recognition
software.
 For scanning it required vey negligible amount of time .
 Permeant security password till end of life.
ATM Security WITH IRIS RECOGNITION 12
1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And
Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of
E&Tc , ytiet, Bhivpuri Road, Karjat
2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris
Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN,
India.
3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)”
Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and
Communication MIET, Jammu, India
4. www.biometric.com / Biometric Iris Recognition and Its Application
5. www.google.com/MyBlog:ATM with an Eye.
6. www.wikipedia.org/iris recognition
ATM Security WITH IRIS RECOGNITION 13
ATM Security WITH IRIS RECOGNITION 14

Contenu connexe

Tendances

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future walletMokshada Birari
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Pavan Kumar MT
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1leenak770
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologySYED HOZAIFA ALI
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyPushkar Dutt
 
Face recognization
Face recognizationFace recognization
Face recognizationleenak770
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pihetvi naik
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprintAnIsh Kumar
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognitionIRJET Journal
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learningSwatiNarkhede1
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Walletjolly9293
 

Tendances (20)

An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.Biometrics Technology Seminar Report.
Biometrics Technology Seminar Report.
 
Face recognization 1
Face recognization 1Face recognization 1
Face recognization 1
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Face recognition
Face recognitionFace recognition
Face recognition
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face recognization
Face recognizationFace recognization
Face recognization
 
Face recognition with pi
Face recognition with piFace recognition with pi
Face recognition with pi
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Security
SecuritySecurity
Security
 
Automated attendance system using Face recognition
Automated attendance system using Face recognitionAutomated attendance system using Face recognition
Automated attendance system using Face recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Biometric recognition using deep learning
Biometric recognition using deep learningBiometric recognition using deep learning
Biometric recognition using deep learning
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 

Similaire à An eye with an atm

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm securityeSAT Journals
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptxLameesAnees
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 

Similaire à An eye with an atm (20)

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
H029044050
H029044050H029044050
H029044050
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
D0351022026
D0351022026D0351022026
D0351022026
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
project_report
project_reportproject_report
project_report
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 

Plus de Suraksha Sanghavi

Plus de Suraksha Sanghavi (7)

Case study
Case studyCase study
Case study
 
Sampling and its type
Sampling and its typeSampling and its type
Sampling and its type
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring system
 
Smart water tank
Smart water tankSmart water tank
Smart water tank
 
K tree
K  treeK  tree
K tree
 
Case study of goggle map
Case study of goggle mapCase study of goggle map
Case study of goggle map
 
Case Study Of Webgraph
Case Study Of WebgraphCase Study Of Webgraph
Case Study Of Webgraph
 

Dernier

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 

Dernier (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 

An eye with an atm

  • 1. Prepared By:- Suraksha Sanghavi TE Computer Roll No :- 40 Guided By :- Prof.S.B.Ambhore 1
  • 2. I. Introduction II. ATM III. Literature Survey IV. Iris Recognition V. WORKING VI. ADVANTAGES VII. DISADVANTAGES VIII. CONCLUSION IX. REFERENCES ATM Security WITH IRIS RECOGNITION 2
  • 3. ATM Security WITH IRIS RECOGNITION 3
  • 4.  An automated teller machine (ATM) is :  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a bank .  Security requiring combination Physical access card + Password(PIN) ATM Security WITH IRIS RECOGNITION 4
  • 5. Pin  People write PINs and disclose to others increasing the risk of fraud and PINs can be stolen by observation  PIN is a confidential code issued to the cardholder to permit access to that account  The PIN does not prove the identification of the cardholder ATM Security WITH IRIS RECOGNITION 5
  • 6.  Finger Printing  Facial Recognition  Iris Recognition ATM Security WITH IRIS RECOGNITION 6
  • 7. SR.NO TECHNIQUE LIMITATION 1 Finger print It can make mistakes with the dryness or dirty of the finger’s skin 2 Facial recognition Affected by changes in lighting ATM Security WITH IRIS RECOGNITION 7
  • 8.  Iris technology, which uses the iris pattern of an individual as an identity proof  In 1953 – Algorithm developed , First used by John Daugman  As the initiative 1st the bank had installed iris based ATM’s inside Kroger Supermarket stores in Houston, Dallas and Fort Worth. ATM Security WITH IRIS RECOGNITION 8
  • 9. ATM Security WITH IRIS RECOGNITION 9
  • 10.  Easy to access  Highly protected, internal organ of the eye  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life  High Accuracy ATM Security WITH IRIS RECOGNITION 10
  • 11.  Costly  The person should be present at the spot.  Small target  Sometimes False acceptances and rejections.  Flash of camera should not become so bright. ATM Security WITH IRIS RECOGNITION 11
  • 12.  More reliable in providing security by using iris recognition software.  For scanning it required vey negligible amount of time .  Permeant security password till end of life. ATM Security WITH IRIS RECOGNITION 12
  • 13. 1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of E&Tc , ytiet, Bhivpuri Road, Karjat 2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN, India. 3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)” Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and Communication MIET, Jammu, India 4. www.biometric.com / Biometric Iris Recognition and Its Application 5. www.google.com/MyBlog:ATM with an Eye. 6. www.wikipedia.org/iris recognition ATM Security WITH IRIS RECOGNITION 13
  • 14. ATM Security WITH IRIS RECOGNITION 14