• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Security
 

Security

on

  • 1,174 views

security of ATM by image processing

security of ATM by image processing

Statistics

Views

Total Views
1,174
Views on SlideShare
1,174
Embed Views
0

Actions

Likes
3
Downloads
190
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Security Security Presentation Transcript

    • AYUSHI GUPTA BTECH 5 SEMESTER BANASTHALI UNIVERSITY
    • AUTOMATIC TELLER MACHINE  An automated teller machine (ATM) is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.  In ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information
    • WHY WE NEED SECURITY ? 1.Skimming: it is one of the most popular method of ATM attack accounting for 80% of ATM fraud. 2.Cash and Card Trapping 3.Pin Compromise 4.System Attacks
    • What is Biometric? A biometric is a unique measurable characteristics of a human being that can be used to automatically recognize an individual or verify an individual identity LIFE MEASURE Types of biometric: • Single model biometric system. • Multi model biometric system BIOS METROS BIOMETRICS
    • PRINCIPLES AND STANDARDS OF BIOMETRICS: “EVERYONE IN WORLD IS UNIQUE AND THIS UNIQUENESS CAN BE USED FOR IDENTITY VERIFICATION”  UNIQUENESS  INTEROPERABILITY  COLLECTABILITY  PERFORMANCE
    • CHARACTERSTICS PHYSICAL: 1 FACE 2 FINGER 3 IRIS 4 PALM VEIN
    • Behaviour Characteristics: 1.Keystroke 2.Voice 3.Gait 4.Signature
    • How Biometric Works ?
    • g Identification (1:N) Biometric reader Biometric Matcher IDENTIFICATION VS. VERIFICATION Database Verification (1:1) Biometric reader Biometric Matcher ID Image Database This person is xyz Match I am xyz Enrollment subsystem Authentication subsystem
    • Digital Image Processing IMAGE: 1. It is defined in the “real world”, is considered to be a function of two real variables, for example, a (X,Y) with a as the amplitude (e.g. brightness) of the image at the real coordinate position (X,Y). 2 .An image is considered to contain sub-images referred to as regions-of-interest, ROIs 3.Each element of the matrix, pixel, is used to represent a intensity. 0 1 1 1 DIGITIZE
    • The entire process of Image Processing is divided into three areas: (i) Discretization and representation : Converting visual information into a discrete form: suitable for computer processing :to save storage space as well as time requirement in subsequent processing. (ii) Processing : Improving image quality by filtering etc ; compressing data to save storage and channel capacity during transmission. (iii) Analysis: Extracting image features; qualifying shapes, interpretation and recognition.
    • Face Recognition System  Facial recognition uses a software known as Facelt ie. based on ability to recognize face and measure various features of face.  Every face has distinct peaks ,valleys that make up facial features Facelt identifies this landmarks as nodal points.  These nodal points are measured creating a numerical code called face print representing face in database
    • Fingerprint Recognition 1. When hand is aligned on scanning screen and applied to sensor window of reader ,the hand is scanned and gray scale image is captured 2.A special computer software then identifies the key minutiae points from the image 3.The points are then converted into the digital representation called the numerical template 4.The numerical template is then compared with questioned sample and if match is found the persons authentication is proved
    • Biometric Palm Vein 1 . Scanner emits infrared light .Haemoglobin in veins absorb infrared light creating image of vein pattern and captured by Scanner. 2 The scan is stored in database Iris Recognition 1.It uses a camera to take picture of eye. 2.Software locates centre of pupil , edge of eyebrows , eyelashes. 3.Very secure, every eye is unique
    • MULTIMODAL BIOMETRICS Multimodal biometrics is an integration of various biometric systems.  It improves the accuracy of the overall system and it provides a secondary means of enrollment and verification, if sufficient data is not extracted from the given biometric sample.  Multimodal biometrics along with two-tier security provides a higher level of security.
    • MODALITIES USED:  Multi-algorithmic biometric systems  Multi-instance biometric systems  Multi-biometric systems  Multi-sensorial biometric systems BIOMETRIC FUSION: A Mechanism that combine classification results from each biometric channel is called biometric fusion.
    • APPLICATIONS:  TIME AND ATTENDANCE SYSTEM  AIRPORTS  LIBRARIES  PC ACCESS
    • ADVANTAGES  Increase of reliability and identification quality, while reducing FAR (False Acceptance Rate) error rates.  A variety of identifiers that can be used together or separately.  Usefull for senior citizens and rural people
    • DISADVANTAGES • Noise: unwanted disturbance(in single modal system ) • Cost (w.r.t instruments) • Time Consuming
    • CONCLUSION: Multimodal biometrics along with two-tier security provides a higher level of security. The error rates like FAR (False Acceptance Rate) and FRR (False Reject Rate) has been reduced, which avoids the various types of attacks in ATM system and fraudulent activities are reduced. The chance given for hackers to make use of fake biometrics to act as an authorized user is strictly avoided, which makes the ATM system more secure. But the cost spend to design and implement this type of system is higher when compared to the existing ATM system.
    • References 1. http ://airccj.org/CSCP/vol2/csit2316.pdf 2. http://citeseer.ist.psu.edu/viewdoc/summary 3. T. Kanade. Computer Recognition of Human Faces 4. www.inttlelix.com- Application of face recognition 5. ehwww.u.es/ ccwintco/uploads/e/ eb /PFC- IonMarques.pdf