SlideShare a Scribd company logo
1 of 26
Technical Seminar
on
BIOMETRIC IDENTIFICATION IN ATM’S
Under the Guidance of
P.V.R.K.MURTHY, M.Tech
Assistant Professor
Presented By
•Biometric ATM are used for wide range of applications like for
Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type
interface along with at-least one Biometrics capture device like
Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face
recognition camera. They are often called Multi-Biometrics ATM, Wall
mount Biometrics ATM, Biometrics Devices / Machine.
•Most of the ATM in the past have been using ID cards to identify users
but with the wide acceptance of Biometrics , a new generation of
Biometrics ATM are being deployed for wide range of applications
worldwide.
INTRODUCTION
What is Biometrics ?
• The meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
• Biometrics is the science and technology of measuring and
analyzing biological data.
• The first known example of biometrics in practice was a form of
finger printing being used in China in the 14th century.
• Biometrics refers to technologies that measure and analyze human
body characteristics such as DNA, fingerprints, eye retinas and
irises, voice patterns,facial patterns and hand measurments for
authentication purposes.
HOW BIOMETRICS WORKS ?
• Biometrics systems work by recording and comparing biometric
characteristics.
• When an individual first uses a biometric system, their identifying
features are enrolled as a reference for future comparison. This
reference may be stored in a central database or on a card (or both)
depending on the needs of the application.
• When biometric recognition is
required, the individual 's
biometric characteristics are
recorded again. This time
however, the identifying features
are compared by the system with
the stored reference to determine
if there is a close match
TYPES OF BIOMETRICS
HAND
• The three dimensional shape of a
person’s hand has several
advantages as an identification
device.
• Scanning a hand and producing a
result takes 1.2seconds.It requires
little space for data storage about 9
bytes which can fit easily magnetic
strip credit cards.
FINGER PRINT
A fingerprint scanner system has two basic jobs :
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in pre-scanned
images.
• Only specific characteristics, which are unique to every
fingerprint, are filtered and saved as an encrypted biometric key or
mathematical representation.
No image of a fingerprint is ever saved, only a series of numbers
(a binary code), which is used for verification. The algorithm
cannot be reconverted to an image, so no one can duplicate your
fingerprints.
BIOMETRIC SYSTEM
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown
individual.
Verification:
• A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.
• Verification is faster and performs better.
• In a verification, the user must first enter his or her identity to
the biometric system. User ID's can be forgotten and cards can
be lost, making access impossible.
MULTIBIOMETRICS
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION
An automatic personal identification system based on fingerprints or
faces is often not able to meet the system performance requirements.
A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT,
FACE AND SPEECH
This system takes the advantage of the capabilities of each individual
biometric. It can be used to overcome some of the limitations of a single
biometrics.
•ATM Card frauds
•Use of ATM card duplicators
•Card sharing by family and friends
•Inability to trace the wrongful users
•ATM PINs can be shared on phone or recorded
using secret cameras
ISSUES IN CURRENT ATM
NETWORKS
BIOMETRIC ATMS SOLVE
THESE ISSUES & OFF
•Single/Multi factor Biometric Authentication:
Fingerprint, Iris, Face, Pal vein
•Multifactor Authentication: Card + PIN +
Biometrics
•Online or offline Authentication using smart cards
•Card less Authentication
•Biometrics is combination of card or PIN
APPLICATIONS OF BIOMETRIC
ATM
• Banking & Finance
• Food coupons / Tickets / Canteen ATM
• Membership Verification ATM
• Transaction / Check Deposit ATM
• Self Service ATM
• Retail ATM
•while a criminal might be able to obtain a password illegally,
getting a user's fingerprints would be much more
complicated.
•In addition, contrary to traditional ID cards or badges, you
can't actually lose physical features, making maintenance
more cost efficient for the business or organization, and the
technology more convenient for users.
ADVANTAGES
•Biometric identification machines are traditionally more
expensive to buy than traditional ones.
•Biometric identification machines are not always entirely
accurate. For example, an individual with a cold may not be able
to identify himself using a voice identification device, and
people who gain or lose weight may suddenly lose access to a
place protected by a system analyzing facial features.
DISADVANTAGES
CONCLUSION
Biometric tokens are the safest means of preventing ATM frauds.
• The main reason for introducing biometric systems is to increase
overall security.
• Biometrics offers greater security and convenience than traditional
methods of personal recognition.
• In some applications, biometrics can replace or supplement the
existing technology. In others, it is the only viable approach.
• The biometric system is only one part of an overall identification or
authentication process, and the other parts of that process will play an
equal role in determining its effectiveness
ATMS OF THE FUTURE
Today’s biometric scanners go far beyond basic fingerprint recognition.
• In Poland and Japan, consumers are already using Hitachi's infrared
scanners that capture the unique pattern of capillaries in the finger and
hand.
• The most secure biometric technology uses a device designed to
perform an iris scan based on more than 2,000 unique measurement
points.
• According to developers, people and pets all over the world will be
connected to a system that uses iris scan identification within the next
decade.
REFERENCES
•Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in
Information Technology, Excel Publication, New Delhi (2009)
• James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,
Biometric Systems: Technology, Design and Performance
Evaluation, Springer .
• Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar,
Handbook of Fingerprint Recognition, Springer .
• John Chirillo, Scott Blaul, Implementing Biometric Security,
Wiley Red Books
BIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPT

More Related Content

What's hot

Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 

What's hot (20)

Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Fingerprint Biometrics
Fingerprint BiometricsFingerprint Biometrics
Fingerprint Biometrics
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Bank locker system
Bank locker systemBank locker system
Bank locker system
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
Zigbee technology ppt
Zigbee technology pptZigbee technology ppt
Zigbee technology ppt
 
Biometric technology .pptx
Biometric technology .pptxBiometric technology .pptx
Biometric technology .pptx
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
Biometric's final ppt
Biometric's final pptBiometric's final ppt
Biometric's final ppt
 
Biometrics Technology PPT
Biometrics Technology PPTBiometrics Technology PPT
Biometrics Technology PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
Biometrics
BiometricsBiometrics
Biometrics
 

Similar to BIOMETRIC IDENTIFICATION IN ATM’S PPT

Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
CoreGaming3
 

Similar to BIOMETRIC IDENTIFICATION IN ATM’S PPT (20)

Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Security
SecuritySecurity
Security
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx2019001791_Fingerprint_Authentication.pptx
2019001791_Fingerprint_Authentication.pptx
 
sagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptxsagarppt111111-150929182421-lva1-app6891.pptx
sagarppt111111-150929182421-lva1-app6891.pptx
 
Biopay By Dharmendra Singh[Srm University] Ncr Delhi
Biopay  By Dharmendra Singh[Srm University] Ncr DelhiBiopay  By Dharmendra Singh[Srm University] Ncr Delhi
Biopay By Dharmendra Singh[Srm University] Ncr Delhi
 

More from sravya raju

More from sravya raju (7)

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Hawk Eye Technology ppt
Hawk Eye Technology pptHawk Eye Technology ppt
Hawk Eye Technology ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

BIOMETRIC IDENTIFICATION IN ATM’S PPT

  • 1. Technical Seminar on BIOMETRIC IDENTIFICATION IN ATM’S Under the Guidance of P.V.R.K.MURTHY, M.Tech Assistant Professor Presented By
  • 2. •Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine. •Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. INTRODUCTION
  • 3. What is Biometrics ? • The meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure). • Biometrics is the science and technology of measuring and analyzing biological data. • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century. • Biometrics refers to technologies that measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns,facial patterns and hand measurments for authentication purposes.
  • 4. HOW BIOMETRICS WORKS ? • Biometrics systems work by recording and comparing biometric characteristics. • When an individual first uses a biometric system, their identifying features are enrolled as a reference for future comparison. This reference may be stored in a central database or on a card (or both) depending on the needs of the application.
  • 5. • When biometric recognition is required, the individual 's biometric characteristics are recorded again. This time however, the identifying features are compared by the system with the stored reference to determine if there is a close match
  • 7. HAND • The three dimensional shape of a person’s hand has several advantages as an identification device. • Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards.
  • 8.
  • 9. FINGER PRINT A fingerprint scanner system has two basic jobs : • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. • Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation.
  • 10. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 11.
  • 12. BIOMETRIC SYSTEM Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better.
  • 13. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible.
  • 14.
  • 16. INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL IDENTIFICATION An automatic personal identification system based on fingerprints or faces is often not able to meet the system performance requirements. A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND SPEECH This system takes the advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 17. •ATM Card frauds •Use of ATM card duplicators •Card sharing by family and friends •Inability to trace the wrongful users •ATM PINs can be shared on phone or recorded using secret cameras ISSUES IN CURRENT ATM NETWORKS
  • 18. BIOMETRIC ATMS SOLVE THESE ISSUES & OFF •Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face, Pal vein •Multifactor Authentication: Card + PIN + Biometrics •Online or offline Authentication using smart cards •Card less Authentication •Biometrics is combination of card or PIN
  • 19. APPLICATIONS OF BIOMETRIC ATM • Banking & Finance • Food coupons / Tickets / Canteen ATM • Membership Verification ATM • Transaction / Check Deposit ATM • Self Service ATM • Retail ATM
  • 20. •while a criminal might be able to obtain a password illegally, getting a user's fingerprints would be much more complicated. •In addition, contrary to traditional ID cards or badges, you can't actually lose physical features, making maintenance more cost efficient for the business or organization, and the technology more convenient for users. ADVANTAGES
  • 21. •Biometric identification machines are traditionally more expensive to buy than traditional ones. •Biometric identification machines are not always entirely accurate. For example, an individual with a cold may not be able to identify himself using a voice identification device, and people who gain or lose weight may suddenly lose access to a place protected by a system analyzing facial features. DISADVANTAGES
  • 22. CONCLUSION Biometric tokens are the safest means of preventing ATM frauds. • The main reason for introducing biometric systems is to increase overall security. • Biometrics offers greater security and convenience than traditional methods of personal recognition. • In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. • The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness
  • 23. ATMS OF THE FUTURE Today’s biometric scanners go far beyond basic fingerprint recognition. • In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. • The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. • According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.
  • 24. REFERENCES •Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in Information Technology, Excel Publication, New Delhi (2009) • James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer . • Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint Recognition, Springer . • John Chirillo, Scott Blaul, Implementing Biometric Security, Wiley Red Books