SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Electronics Communication and Computer Engineering
                                                                                         Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X



              National Conference on Research Trends in Computer Science and Technology - 2012


  Implementation of ATM Security by Using Fingerprint
                 recognition and GSM
   PENNAM KRISHNAMURTHY                                                 MR. M. MADDHUSUDHAN REDDDY
          (M.Tech)                                                                  M.TECH
      Email: ecemurthy@gmail.com                                           Email: maddhusudhanreddi@gmail.com



Abstract - The main objective of this system is to develop an            II. THE CHARACTERISTICS OF THE
embedded system, which is used for ATM                security
                                                                                  SYSTEM DESIGN
applications. In these systems, Bankers will collect the
customer finger prints and mobile number while opening
                                                                               The embedded ATM client authentication system
the accounts then customer only access ATM machine. The
                                                                      is based on fingerprint recognition which is designed after
working of these ATM machine is when customer place
                                                                      analyzed existed ATM system. The S3C2440 chip is used
finger on the finger print module when it access
                                                                      as the core of these embedded system which is associated
automatically generates every time different 4-digit code as
                                                                      with the technologies of fingerprint recognition and
a message to the mobile of the authorized customer through            current high speed network communication.
GSM modem connected to the microcontroller. The code
received by the customer should be entered by pressing the            The primary functions are shown as follows:
keys on the touch screen. After entering it checks whether it            • Fingerprint recognition: The masters' fingerprint
is a valid one or not and allows the customer further access.                 information was used as the standards of
                                                                              identification. It must certify the feature of the
Keywords - ATM terminal; ARM9; fingerprint recognition;
                                                                              human fingerprint before using ATM system.
image enhancement; GSM MODEM.
                                                                         • Remote authentication: System can compare
                                                                              current client's fingerprint information with
                   INTRODUCTION                                               remote fingerprint data server.
                                                                         • Message alarming:  different 4-digit code as a
           Now-a-days, in the self-service banking system                     message to the mobile of the authorized customer
has got extensive popularization with the characteristic                      without any noise, in order to access the
offering high-quality 24 hours service for customer. Using                    Terminal.
the ATM (Automatic Teller Machine) which provide                         • Two discriminate analysis methods: Besides the
customers with the convenient banknote trading is very                        fingerprint recognition, the mode of password
common. However, the financial crime case rises                               recognition can be also used for the system.
repeatedly in recent years, a lot of criminals tamper with
the ATM terminal and steal user's credit card and
password by illegal means. Once user's bank card is lost
and the password is stolen, the criminal will draw all cash                    III. HARDWARE DESIGN AND
in the shortest time, which will bring enormous financial                            SOFTWARE DESIGN
losses to customer. How to carry on the valid identity to
the customer becomes the focus in current financial circle.                   The design of entire system consisted of two part
Traditional ATM systems authenticate generally by using               which are hardware and software. The hardware are
the credit card and the password, the method has some                 designed by the rules of embedded system, and the steps
defects. Using credit card and password cannot verify the             of software consisted of three parts. The more details are
client's identity exactly. In recent years, the algorithm that        shown as follows.
the fingerprint recognition continuously updated and
sending the four digit code by the controller which has               A. Hardware Design
offered new verification means for us, the original
password authentication method combined with the                               The S3C2440 chip is used as the core of entire
biometric identification technology verify the clients'               hardware. Furthermore, the modules of LCD, keyboard,
identity better and achieve the purpose that use of ATM               alarm, fingerprint recognition are connected with the main
machines improve the safety effectively.                              chip (S3C2440).The SRAM and FLASH are also
                                                                      embodied in the system. There are some modules
                                                                      consisted of the system as

All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering &
Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India.
Published by IJECCE (www.ijecce.org)                                                                                     83
International Journal of Electronics Communication and Computer Engineering
                                                                                         Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X



              National Conference on Research Trends in Computer Science and Technology - 2012

follows:                                                              server to match fingerprint data with the master's, if the
     • LCD module: The OMAP5910 is used in this                       result isn't correct, the system will call police
         module as a LCD controller, it supported                     automatically and send alarm to the credit card owner.
         1024*1024 image of 15 gray-scale or 3375                     The block diagram of hardware design is shown in figure
         colours.                                                     1.
     • keyboard module: It can be used for inputting
                                                                      B. Software design
         passwords.
     • SRAM and FLASH: The 16-bit 29LV160BB-                                     The design was component of three parts
         70REC of FLASH chip and the 32-bit                           included the design of main program flow chart, the
         HY57V561620CT-6 of SRAM chip are                             initializing ones, and the algorithm of fingerprint
         connected with the main chip. Their functions                recognition flow chart.
         are storing the running code, the information of
         fingerprint and the algorithm.                                          This system of software is implemented by the
     • Fingerprint         recognition   module:      Atmel           steps as follows: first of all, the Linux kernel and the File
         Company's AT77CI04B be used as a fingerprint                 system are loaded into the main chip. The next, the system
         recognition. It has a 500dpi resolution, anti-press,         is initialized to implement specific task, such as checking
         anti-static, anticorrosion.                                  ATM system, GSM communication and so on, and then
     • Ethernet switch controller: RTL8308B can                       each module reset for ready to run commands. Before
         provides eight 10/100 Mbps RMII Ethernet ports,              using ATM terminal, the mobile number and fingerprint
         which can connect police network and remote                  of the customer is required.
         fingerprint data server.




 Figure I. The block diagram of hardware
                                                                      Figure 2. The overall flow chart of software
Before using the ATM terminal, the client's fingerprint
feature will be connected to the remote fingerprint data              First the system is required the owner's fingerprint. If all
                                                                      the recognition is right, the system would send password
All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering &
Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India.
Published by IJECCE (www.ijecce.org)                                                                                     84
International Journal of Electronics Communication and Computer Engineering
                                                                                         Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X



              National Conference on Research Trends in Computer Science and Technology - 2012

to the Account holder and he will enter the same password             attempt multiple tasks. The initializing flow chart is
in touch screen for accessing the ATM Terminal. If                    shown in figure 3.
Authentication Failure then it send the alert message to
the Account holder and Bank. The overall flow chart of
software is shown in
                                                                      C. The design of fingerprint recognition
figure 2.
                                                                      algorithm
         In the process of inputting fingerprint, the
AT77CI04B which is a linear sensor that captures                               The design of algorithm based on fingerprint
fingerprint images by sweeping the finger over the                    recognition is so vital for the whole system. We would
sensing area, will used for acquiring the image of                    approach two steps to process the images of fingerprint.
fingerprint. This product embed true hardware based 8-
way navigation and click functions. The fingerprint                   1) The detail of fingerprint recognition process.
information will be temporarily stored in SRAM and
upload to the remote finger data server to compare
                                                                                The first step was the acquisition of fingerprint
through bank network. The result of process will be
                                                                      image by above device mentioned in the algorithm, and
controlled by main chip(S3C2440).                                     the results could be sent to the following process.
                                                                      secondly, pre-processing the images acquired. After
                                                                      obtain the fingerprint image, it must be pre-processing.
                                                                      Generally, pre-processing of one's is filtering, histogram
                                                                      computing, image enhancement and image binarization.
                                                                      Lastly, the characteristic value was extracted, and the
                                                                      results of the above measures would be compared with the
                                                                      information of owner's fingerprint in the database so as to
                                                                      verify whether the character is matched, and then the
                                                                      system returned the results matched or not.

                                                                      2) The design of fingerprint image enhancement

                                                                               Fingerprint recognition module is an extremely
                                                                      important part of the system, the high-quality images was
                                                                      the major factors of influencing the performance in the
                                                                      system. The algorithm of fingerprint recognition based on
                                                                      the algorithm of Gabor and direction filter was used.
                                                                      fingerprint enhancement algorithm based on Gabor filter
                                                                      could be better to remove noise, strengthen the definition
                                                                      between the ridge and valley, it could significantly
                                                                      improve the image enhancement processing capacity, but
                                                                      this algorithm was slow in dealing with the high capacity
                                                                      requirements.

                                                                      GSM

                                                                                Global System for Mobile Communications (
                                                                      GSM: originally from Group Special Mobile) is the most
                                                                      popular standard for mobile phones in the world. Its
                                                                      promoter, the GSM Association, estimates that 82% of the
 Figure 3. The flow chart of fingerprint recognition                  global mobile market uses the standard GSM is used by
         The initializing process means that set the                  over 2 billion people across more than 212 countries and
hardware and software and then start the multiple mission             territories. GSM differs from its predecessors in that both
module, each module will be started according to the                  signalling and speech channels are digital call quality, and
priority processes. At first, initialize the system clock,            thus is considered a second generation (2G) mobile phone
and execute the codes of open interrupt and the open                  system. This has also meant that data communication was
interrupt task. Then, the system would judge and enter                built into the system using the 3rd Generation Partnership
process of module. finally, the system would start to                 Project (3GPP). GSM also pioneered a low-cost
                                                                      alternative to voice calls, the Short message service. GSM


All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering &
Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India.
Published by IJECCE (www.ijecce.org)                                                                                     85
International Journal of Electronics Communication and Computer Engineering
                                                                                         Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X



              National Conference on Research Trends in Computer Science and Technology - 2012

is a digital mobile telephone system that is w i d e l y              General Packet Radio System (GPRS), Enhanced Data
used in Europe and other parts of the world.                          rate for GSM Evolution (EDGE), and Universal Mobile
                                                                      Telecommunications Service(UMTS).
         GSM uses a variation of Time Division Multiple
Access(TDMA) and GSM is the most widely used of the                             IV. RESULTS & CONCLUSIONS
three digital wireless telephone technologies (TDMA,
GSM, and CDMA). GSM digitizers and compresses data,                             The Implementation of ATM security by using
then sends it down a channel with two other streams of                fingerprint recognition and GSM MODEM took
user data, each in its own time slot. It operates at either           advantages of the stability and reliability of fingerprint
the 900 MHz or 1,800 MHz frequency band. GSM is the                   characteristics. Additional, the system also contains the
de facto wireless telephone standard in Europe. GSM has               original verifying methods which was inputting owner's
over one billion users worldwide and is available in 190              password which is send by the controller. The security
countries.                                                            features were enhanced largely for the stability and
                                                                      reliability of owner recognition. The whole system was
Technical details:                                                    build on the technology of embedded system which makes
                                                                      the system more safe, reliable and easy to use.
          GSM is a cellular network, which means that
mobile phones connect to it by searching for cells in the                                   REFERENCES
immediate vicinity. GSM networks operate in four
different frequency ranges.                                           [1]    Lin Hong, Wan Yifei, Anil Jain. Fingerprint image
                                                                             enhancement:     algorithm    and    performance
         Most GSM networks operate in the 900 MHz or                         evaluation[J]. IEEE Transactions on Pattern
1800 MHz bands. Some countries in the                                        Analysis and Machine intelligence. 1998,20(8):
Americans(including Canada and the United States) use                        777-789.
the 850 MHz and 1900 MHz bands because the 900 and                    [2]    ESaatci, V Tavsanogh. Fingerprint image
1800 MHz frequency bands were already allocated. The                         enhancement using CNN gabor-Cpe filter[C].
rarer 400 and 450 MHz frequency bands are assigned in                        Proceedings of the 7th IEEE International
some countries, notably Scandinavia, where these                             Workshop on Cellular Neural Networks and their
frequencies were previously used for first-generation                        Applications 2002: 377-382.
systems.                                                              [3]    Gu J, Zhou J, Zhang D.A combination model for
                                                                             orientation field     of fingerprints. Pattern
The Future of GSM                                                            Recognition, 2004, 37: 543-553.
                                                                      [4]    Cheng J, Tian J. Fingerprint enhancement with
        GSM together with other technologies is part of                      dyadic scale-space. Pattern Recognition Letters,
an evolution of wireless mobile telecommunication that                       2004, 25(11): 1273-1284.
includes High-Speed Circuit-Switched Data(DSCSD),




All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering &
Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India.
Published by IJECCE (www.ijecce.org)                                                                                     86

More Related Content

What's hot

Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
pavan
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 

What's hot (20)

Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
Design and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring systemDesign and Implementation of Security Based ATM theft Monitoring system
Design and Implementation of Security Based ATM theft Monitoring system
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Ieee+Hardware+List+2009
Ieee+Hardware+List+2009Ieee+Hardware+List+2009
Ieee+Hardware+List+2009
 
To protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technologyTo protect user’s password from theft by using rfid and mems technology
To protect user’s password from theft by using rfid and mems technology
 
Sdfgh
SdfghSdfgh
Sdfgh
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
Moving ATM Applications to Smartphones with a Secured PinEntry Methods
Moving ATM Applications to Smartphones with a Secured PinEntry MethodsMoving ATM Applications to Smartphones with a Secured PinEntry Methods
Moving ATM Applications to Smartphones with a Secured PinEntry Methods
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Presentation iot
Presentation iotPresentation iot
Presentation iot
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.Embedded System Design for Iris Recognition System.
Embedded System Design for Iris Recognition System.
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 

Similar to 000

Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
ZTech Proje
 

Similar to 000 (20)

Finger print based security system
Finger print based security systemFinger print based security system
Finger print based security system
 
ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.ACR88 product presentation by Advanced Card Systems Ltd.
ACR88 product presentation by Advanced Card Systems Ltd.
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Fingerprint base security system
Fingerprint base security systemFingerprint base security system
Fingerprint base security system
 
085 n008
085 n008085 n008
085 n008
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
GSM Report_2013
GSM Report_2013GSM Report_2013
GSM Report_2013
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...Psdot 11 highly secured net banking system using fingerprint recognition tech...
Psdot 11 highly secured net banking system using fingerprint recognition tech...
 
Psdot 19 four factor password authentication
Psdot 19 four factor password authenticationPsdot 19 four factor password authentication
Psdot 19 four factor password authentication
 
Fingerprint based electronic voting system
Fingerprint based electronic voting systemFingerprint based electronic voting system
Fingerprint based electronic voting system
 
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEMBm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
Bm 07 FINGER PRINT BASED VEHICLE SECURITY SYSTEM
 
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULESINNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
INNOVATIVE AUTOMOBILE SECURITY SYSTEM USING VARIOUS SECURITY MODULES
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
A Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition AlgorithmA Digital Pen with a Trajectory Recognition Algorithm
A Digital Pen with a Trajectory Recognition Algorithm
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
Chapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptxChapter-2 Internet of Things.pptx
Chapter-2 Internet of Things.pptx
 

000

  • 1. International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 Implementation of ATM Security by Using Fingerprint recognition and GSM PENNAM KRISHNAMURTHY MR. M. MADDHUSUDHAN REDDDY (M.Tech) M.TECH Email: ecemurthy@gmail.com Email: maddhusudhanreddi@gmail.com Abstract - The main objective of this system is to develop an II. THE CHARACTERISTICS OF THE embedded system, which is used for ATM security SYSTEM DESIGN applications. In these systems, Bankers will collect the customer finger prints and mobile number while opening The embedded ATM client authentication system the accounts then customer only access ATM machine. The is based on fingerprint recognition which is designed after working of these ATM machine is when customer place analyzed existed ATM system. The S3C2440 chip is used finger on the finger print module when it access as the core of these embedded system which is associated automatically generates every time different 4-digit code as with the technologies of fingerprint recognition and a message to the mobile of the authorized customer through current high speed network communication. GSM modem connected to the microcontroller. The code received by the customer should be entered by pressing the The primary functions are shown as follows: keys on the touch screen. After entering it checks whether it • Fingerprint recognition: The masters' fingerprint is a valid one or not and allows the customer further access. information was used as the standards of identification. It must certify the feature of the Keywords - ATM terminal; ARM9; fingerprint recognition; human fingerprint before using ATM system. image enhancement; GSM MODEM. • Remote authentication: System can compare current client's fingerprint information with INTRODUCTION remote fingerprint data server. • Message alarming:  different 4-digit code as a Now-a-days, in the self-service banking system message to the mobile of the authorized customer has got extensive popularization with the characteristic without any noise, in order to access the offering high-quality 24 hours service for customer. Using Terminal. the ATM (Automatic Teller Machine) which provide • Two discriminate analysis methods: Besides the customers with the convenient banknote trading is very fingerprint recognition, the mode of password common. However, the financial crime case rises recognition can be also used for the system. repeatedly in recent years, a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash III. HARDWARE DESIGN AND in the shortest time, which will bring enormous financial SOFTWARE DESIGN losses to customer. How to carry on the valid identity to the customer becomes the focus in current financial circle. The design of entire system consisted of two part Traditional ATM systems authenticate generally by using which are hardware and software. The hardware are the credit card and the password, the method has some designed by the rules of embedded system, and the steps defects. Using credit card and password cannot verify the of software consisted of three parts. The more details are client's identity exactly. In recent years, the algorithm that shown as follows. the fingerprint recognition continuously updated and sending the four digit code by the controller which has A. Hardware Design offered new verification means for us, the original password authentication method combined with the The S3C2440 chip is used as the core of entire biometric identification technology verify the clients' hardware. Furthermore, the modules of LCD, keyboard, identity better and achieve the purpose that use of ATM alarm, fingerprint recognition are connected with the main machines improve the safety effectively. chip (S3C2440).The SRAM and FLASH are also embodied in the system. There are some modules consisted of the system as All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering & Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India. Published by IJECCE (www.ijecce.org) 83
  • 2. International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 follows: server to match fingerprint data with the master's, if the • LCD module: The OMAP5910 is used in this result isn't correct, the system will call police module as a LCD controller, it supported automatically and send alarm to the credit card owner. 1024*1024 image of 15 gray-scale or 3375 The block diagram of hardware design is shown in figure colours. 1. • keyboard module: It can be used for inputting B. Software design passwords. • SRAM and FLASH: The 16-bit 29LV160BB- The design was component of three parts 70REC of FLASH chip and the 32-bit included the design of main program flow chart, the HY57V561620CT-6 of SRAM chip are initializing ones, and the algorithm of fingerprint connected with the main chip. Their functions recognition flow chart. are storing the running code, the information of fingerprint and the algorithm. This system of software is implemented by the • Fingerprint recognition module: Atmel steps as follows: first of all, the Linux kernel and the File Company's AT77CI04B be used as a fingerprint system are loaded into the main chip. The next, the system recognition. It has a 500dpi resolution, anti-press, is initialized to implement specific task, such as checking anti-static, anticorrosion. ATM system, GSM communication and so on, and then • Ethernet switch controller: RTL8308B can each module reset for ready to run commands. Before provides eight 10/100 Mbps RMII Ethernet ports, using ATM terminal, the mobile number and fingerprint which can connect police network and remote of the customer is required. fingerprint data server. Figure I. The block diagram of hardware Figure 2. The overall flow chart of software Before using the ATM terminal, the client's fingerprint feature will be connected to the remote fingerprint data First the system is required the owner's fingerprint. If all the recognition is right, the system would send password All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering & Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India. Published by IJECCE (www.ijecce.org) 84
  • 3. International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 to the Account holder and he will enter the same password attempt multiple tasks. The initializing flow chart is in touch screen for accessing the ATM Terminal. If shown in figure 3. Authentication Failure then it send the alert message to the Account holder and Bank. The overall flow chart of software is shown in C. The design of fingerprint recognition figure 2. algorithm In the process of inputting fingerprint, the AT77CI04B which is a linear sensor that captures The design of algorithm based on fingerprint fingerprint images by sweeping the finger over the recognition is so vital for the whole system. We would sensing area, will used for acquiring the image of approach two steps to process the images of fingerprint. fingerprint. This product embed true hardware based 8- way navigation and click functions. The fingerprint 1) The detail of fingerprint recognition process. information will be temporarily stored in SRAM and upload to the remote finger data server to compare The first step was the acquisition of fingerprint through bank network. The result of process will be image by above device mentioned in the algorithm, and controlled by main chip(S3C2440). the results could be sent to the following process. secondly, pre-processing the images acquired. After obtain the fingerprint image, it must be pre-processing. Generally, pre-processing of one's is filtering, histogram computing, image enhancement and image binarization. Lastly, the characteristic value was extracted, and the results of the above measures would be compared with the information of owner's fingerprint in the database so as to verify whether the character is matched, and then the system returned the results matched or not. 2) The design of fingerprint image enhancement Fingerprint recognition module is an extremely important part of the system, the high-quality images was the major factors of influencing the performance in the system. The algorithm of fingerprint recognition based on the algorithm of Gabor and direction filter was used. fingerprint enhancement algorithm based on Gabor filter could be better to remove noise, strengthen the definition between the ridge and valley, it could significantly improve the image enhancement processing capacity, but this algorithm was slow in dealing with the high capacity requirements. GSM Global System for Mobile Communications ( GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 82% of the Figure 3. The flow chart of fingerprint recognition global mobile market uses the standard GSM is used by The initializing process means that set the over 2 billion people across more than 212 countries and hardware and software and then start the multiple mission territories. GSM differs from its predecessors in that both module, each module will be started according to the signalling and speech channels are digital call quality, and priority processes. At first, initialize the system clock, thus is considered a second generation (2G) mobile phone and execute the codes of open interrupt and the open system. This has also meant that data communication was interrupt task. Then, the system would judge and enter built into the system using the 3rd Generation Partnership process of module. finally, the system would start to Project (3GPP). GSM also pioneered a low-cost alternative to voice calls, the Short message service. GSM All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering & Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India. Published by IJECCE (www.ijecce.org) 85
  • 4. International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN 2249 –071X National Conference on Research Trends in Computer Science and Technology - 2012 is a digital mobile telephone system that is w i d e l y General Packet Radio System (GPRS), Enhanced Data used in Europe and other parts of the world. rate for GSM Evolution (EDGE), and Universal Mobile Telecommunications Service(UMTS). GSM uses a variation of Time Division Multiple Access(TDMA) and GSM is the most widely used of the IV. RESULTS & CONCLUSIONS three digital wireless telephone technologies (TDMA, GSM, and CDMA). GSM digitizers and compresses data, The Implementation of ATM security by using then sends it down a channel with two other streams of fingerprint recognition and GSM MODEM took user data, each in its own time slot. It operates at either advantages of the stability and reliability of fingerprint the 900 MHz or 1,800 MHz frequency band. GSM is the characteristics. Additional, the system also contains the de facto wireless telephone standard in Europe. GSM has original verifying methods which was inputting owner's over one billion users worldwide and is available in 190 password which is send by the controller. The security countries. features were enhanced largely for the stability and reliability of owner recognition. The whole system was Technical details: build on the technology of embedded system which makes the system more safe, reliable and easy to use. GSM is a cellular network, which means that mobile phones connect to it by searching for cells in the REFERENCES immediate vicinity. GSM networks operate in four different frequency ranges. [1] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance Most GSM networks operate in the 900 MHz or evaluation[J]. IEEE Transactions on Pattern 1800 MHz bands. Some countries in the Analysis and Machine intelligence. 1998,20(8): Americans(including Canada and the United States) use 777-789. the 850 MHz and 1900 MHz bands because the 900 and [2] ESaatci, V Tavsanogh. Fingerprint image 1800 MHz frequency bands were already allocated. The enhancement using CNN gabor-Cpe filter[C]. rarer 400 and 450 MHz frequency bands are assigned in Proceedings of the 7th IEEE International some countries, notably Scandinavia, where these Workshop on Cellular Neural Networks and their frequencies were previously used for first-generation Applications 2002: 377-382. systems. [3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern The Future of GSM Recognition, 2004, 37: 543-553. [4] Cheng J, Tian J. Fingerprint enhancement with GSM together with other technologies is part of dyadic scale-space. Pattern Recognition Letters, an evolution of wireless mobile telecommunication that 2004, 25(11): 1273-1284. includes High-Speed Circuit-Switched Data(DSCSD), All copyrights Reserved by NCRTCST-2012,Departments of Computer Science and Engineering & Information Technology,CMR College of Engineering and Technology,Hyderabad,A.P,India. Published by IJECCE (www.ijecce.org) 86