SlideShare a Scribd company logo
1 of 24
Project
on
“Real-time Face Detection & Security System for ATM
Machine”
Guided By : Prof. Bhagyashree Kadam
JSPM’s
Bhivarabai Sawant Institute of Technology & Research
Accredited with ‘B++’ Grade by NAAC
Presented By
Department of Information Technology
1. Akash Jadhav - 72171616E
2. Kishor Dukre - 72171613L
3. Vaibhav Kumbhar - 72171622K
4. Shivraj Sakunde - 72171626B
CONTENTS
– Introduction
– Problem statement
– Literature survey
– Existing System
– Proposed system
– System Architecture
– Algorithm
– Data Flow Diagram
– Component diagram
– Use case diagram
– Output
– System requirement
– Advantages and Limitations
– Conclusions and Future work.
– List of publications
– References
INTRODUCTION
 Face recognition-based ATM system will revolutionized the way we interact with banking
services, combining advanced technology with convenience and enhanced security. With the
ability to authenticate users based on their unique facial features, this system will replace the
traditional reliance on passwords and PINs.
 By leveraging sophisticated algorithms and high-resolution cameras, face recognition ATM offer a
seamless and user-friendly experience, ensuring rapid and accurate identification of customers.
This innovative approach not only streamlines banking operations but also mitigates the risks
associated with card fraud and identity theft.
 Face recognition eliminates the need for physical ATM cards, making transactions more
convenient for users. Users no longer need to carry their cards, remember PINs, or worry about
losing their cards. They can simply approach an ATM, look into the camera, and the system will
authenticate their identity.
3
LITERATURE REVIEW
Sr. No. Paper Title Year Description
1
Autonomous Face Detection
System from Real-time Video
Streaming for Ensuring the
Intelligence Security System
IEEE (2020)
2020
Face detection is a popular research topic to the
researchers at present in the
Biometric system. The aim of this research is to
develop a system which can detect
human face or faces from a live video streaming
2
Systematic Review of
Intelligence Video
Surveillance: Trends,
Techniques, Frameworks,
and Datasets” IEEE (2019)
2019
In this paper, Intelligent Video Surveillance (IVIST)
is also introduced. IVIST is a prototype system with
EDCAR knowledge that provides automatic support
to implement related inference procedures such as
object tracking and detection to trigger alarms.
3
Authentic Face Detection and
Encryption for Security
Assurance IEEE (2018)
2018
The rapid evolution of authentic face detection has
been witnessed from the past
along with the security assurance in the field of
information technology. Now being a necessary note
of issue the concept of face detection along with
encryption.
PROBLEM STATEMENT
Use face recognition technology to develop an ATM system that will offer a user-
friendly and secure alternative for individuals who have difficulty remembering
passwords. provide a convenient and accessible way to access banking services,
reducing the stress and frustration associated with traditional password-based
authentication systems. Forgetting passwords can be frustrating, especially when it
comes to accessing important services like banking.
MOTIVATION
The face recognition technology has advanced significantly in recent years, allowing
for efficient recognition even in different lighting conditions, angles, and facial
expressions. With face recognition technology, individuals no longer need to
remember complex passwords or PINs to access their accounts. Instead, their facial
features serve as their unique identifier. Face recognition eliminates the need for
physical ATM cards, making transactions more convenient for users. Users no longer
need to carry their cards, remember PINs, or worry about losing their cards.
ABSTRACT
Our face recognition-based ATM system project aims to develop a secure and convenient
authentication method for accessing ATM services. Traditional ATM systems rely on physical cards
and PINs, which can be susceptible to theft, fraud, or forgotten passwords. In this project, face
recognition technology is leveraged to authenticate users based on their unique facial features,
eliminating the need for cards and PINs. The system utilizes high-resolution cameras and advanced
algorithms to capture and analyze facial images, comparing them against a database of enrolled
users. The project focuses on addressing challenges such as accuracy, privacy, accessibility, and
security. By implementing face recognition technology, the project aims to provide a seamless and
user-friendly experience for ATM users while enhancing security and mitigating the risks associated
with traditional authentication methods. Through rigorous testing and evaluation, the project aims to
demonstrate the feasibility and effectiveness of face recognition-based ATM systems in real-world
banking environments.
SYSTEM ARCHITECTURE
Human Live Face
Recognition
Webcam Capture Image Preprocess Image
Feature Extraction
(SIFT Key Points )
Classification
(based on SVM)
Face Recognition
(Authorize)
Open ATM
Training
Face Database
Unauthorized
No Login
ALGORITHM
Haar Cascade algorithm:
1. Collecting Positive and Negative Images: Collect a set of positive and negative images. Positive
images should contain the object you want to detect, and negative images should not contain the object.
2. Preparing the Training Data: Convert the positive and negative images to grayscale, resize them to
the same size, and store them in a file with labels indicating whether they are positive or negative.
3. Creating the Haar Features: The Haar features are created by defining rectangular regions in the
image and calculating the difference between the sum of pixel values inside the rectangle and the sum of
pixel values outside the rectangle.
4. Training the Classifier: Train the classifier using the positive and negative images and the Haar
features. This is done using a machine learning algorithm such as AdaBoost or Support Vector Machines
(SVM).
5. Creating the Cascade Classifier: The trained classifier is converted into a cascade of
classifiers, which are applied to sub-regions of the image in a hierarchical manner. This
allows the algorithm to quickly reject regions that are unlikely to contain the object.
6. Detecting Objects in Images: The cascade classifier is applied to the image to detect
objects. This is done by moving a sliding window over the image and applying the cascade
classifier to each sub-region.
7. Filtering False Positives: The algorithm may detect false positives, which are regions
that are not actually the object of interest. These false positives are filtered out using various
techniques such as non-maximum suppression.
8. Fine-tuning: Finally, the algorithm is fine-tuned to improve its accuracy and reduce false
positives. This can be done by adjusting various parameters such as the scale of the sliding
window and the threshold for detecting the object.
DATA FLOW DIAGRAM
Level 0
Level 1
COMPONENT DIAGRAM
USE CASE DIAGRAM
OUTPUT
ADVANTAGES
1.Password-Free Authentication: With face recognition technology, individuals no longer
need to remember complex passwords or PINs to access their accounts. Instead, their facial
features serve as their unique identifier.
2.Rapid and Accurate Authentication: Face recognition systems can authenticate
individuals quickly and accurately.
3.Increased Convenience: Face recognition eliminates the need for physical ATM cards,
making transactions more convenient for users. Users no longer need to carry their cards,
remember PINs, or worry about losing their cards..
4.Enhanced User Experience: Face recognition-based ATMs provide a more user-friendly
experience.
SYSTEM REQUIREMENTS
Software Requirements Minimum Recommended
OS Windows 7 Windows 10 or higher
Database SQLite 3.34 SQLite 3.42
IDE VS Code 1.52 VS Code 1.78
Python python 3.8 Python 3.11
Hardware Requirements Minimum Recommended
Processor Intel core i5 10th gen Intel core i7 12th gen
Camera 16 MP 48 MP
RAM 8 GB 16 GB
HDD 2GB 4 GB or more
CONCLUSION
In conclusion, a real-time person detection project has several potential applications in various
industries such as security, surveillance, retail, and healthcare. The project involves using
computer vision techniques to detect people in real-time video streams, and it can be achieved
through various methods such as Haar cascades, deep learning, and other machine learning
algorithms.
FUTURE SCOPE
1. Contactless Transactions: The COVID-19 pandemic has accelerated the demand for
contactless transactions. An ATM system using face detection technology eliminates the need
for physical touchpoints, providing a more hygienic option.
2. Personalization: The ATM system can personalize the user experience by recognizing their
face and displaying preferred language, currency, and transaction history.
3. Data Collection: The system can collect data on user preferences and transaction patterns,
enabling banks to offer targeted marketing and personalized promotions.
4. Enhanced Security: With face detection technology, the ATM system can identify the user
based on their facial features, making it more secure and reducing the chances of fraud or theft.
LIMITATIONS
1. False Positives: Real-time person detection projects can generate false positives, which can
result in unnecessary alarms or interventions.
2. Technical Limitations: The accuracy of real-time person detection projects can be affected by
factors such as lighting, environmental conditions, and technical limitations of the sensors or
algorithms used.
3. Biases and Discrimination: Facial recognition systems have been found to exhibit biases,
including racial, gender, and age biases. If not properly trained or calibrated, these systems may
disproportionately misidentify certain groups, leading to discrimination and exclusion.
REFERENCES
1. Face Recognition in Real-world Surveillance Videos with Deep Learning Method” Department of
Information and Technology University of Science and Technology of China IEEE (2017)
2. Authentic Face Detection and Encryption for Security Assurance IEEE (2018)
3. Face Detection based ATM Security System using Embedded Linux Platform IEEE (2017)

More Related Content

Similar to Final PPT.pptx

IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition AlogrithmIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingIRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AIijtsrd
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...IRJET Journal
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVIKAS KULKARNI
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMIRJET Journal
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 

Similar to Final PPT.pptx (20)

best pharma journals
best pharma journals best pharma journals
best pharma journals
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
D0351022026
D0351022026D0351022026
D0351022026
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
IRJET-  	  Smart Surveillance Cam using Face Recongition AlogrithmIRJET-  	  Smart Surveillance Cam using Face Recongition Alogrithm
IRJET- Smart Surveillance Cam using Face Recongition Alogrithm
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
S0102297102
S0102297102S0102297102
S0102297102
 
Bank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image ProcessingBank Locker System Using Fingerprint Authentication & Image Processing
Bank Locker System Using Fingerprint Authentication & Image Processing
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
N044057478
N044057478N044057478
N044057478
 
Smart Verification of Passenger using AI
Smart Verification of Passenger using AISmart Verification of Passenger using AI
Smart Verification of Passenger using AI
 
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
Remote User Authentication using blink mechanism - ‘Iblink’ with Machine Lear...
 
Vehicle security system usinf finger print technology
Vehicle security system usinf finger print technologyVehicle security system usinf finger print technology
Vehicle security system usinf finger print technology
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 

Final PPT.pptx

  • 1. Project on “Real-time Face Detection & Security System for ATM Machine” Guided By : Prof. Bhagyashree Kadam JSPM’s Bhivarabai Sawant Institute of Technology & Research Accredited with ‘B++’ Grade by NAAC Presented By Department of Information Technology 1. Akash Jadhav - 72171616E 2. Kishor Dukre - 72171613L 3. Vaibhav Kumbhar - 72171622K 4. Shivraj Sakunde - 72171626B
  • 2. CONTENTS – Introduction – Problem statement – Literature survey – Existing System – Proposed system – System Architecture – Algorithm – Data Flow Diagram – Component diagram – Use case diagram – Output – System requirement – Advantages and Limitations – Conclusions and Future work. – List of publications – References
  • 3. INTRODUCTION  Face recognition-based ATM system will revolutionized the way we interact with banking services, combining advanced technology with convenience and enhanced security. With the ability to authenticate users based on their unique facial features, this system will replace the traditional reliance on passwords and PINs.  By leveraging sophisticated algorithms and high-resolution cameras, face recognition ATM offer a seamless and user-friendly experience, ensuring rapid and accurate identification of customers. This innovative approach not only streamlines banking operations but also mitigates the risks associated with card fraud and identity theft.  Face recognition eliminates the need for physical ATM cards, making transactions more convenient for users. Users no longer need to carry their cards, remember PINs, or worry about losing their cards. They can simply approach an ATM, look into the camera, and the system will authenticate their identity. 3
  • 4. LITERATURE REVIEW Sr. No. Paper Title Year Description 1 Autonomous Face Detection System from Real-time Video Streaming for Ensuring the Intelligence Security System IEEE (2020) 2020 Face detection is a popular research topic to the researchers at present in the Biometric system. The aim of this research is to develop a system which can detect human face or faces from a live video streaming 2 Systematic Review of Intelligence Video Surveillance: Trends, Techniques, Frameworks, and Datasets” IEEE (2019) 2019 In this paper, Intelligent Video Surveillance (IVIST) is also introduced. IVIST is a prototype system with EDCAR knowledge that provides automatic support to implement related inference procedures such as object tracking and detection to trigger alarms. 3 Authentic Face Detection and Encryption for Security Assurance IEEE (2018) 2018 The rapid evolution of authentic face detection has been witnessed from the past along with the security assurance in the field of information technology. Now being a necessary note of issue the concept of face detection along with encryption.
  • 5. PROBLEM STATEMENT Use face recognition technology to develop an ATM system that will offer a user- friendly and secure alternative for individuals who have difficulty remembering passwords. provide a convenient and accessible way to access banking services, reducing the stress and frustration associated with traditional password-based authentication systems. Forgetting passwords can be frustrating, especially when it comes to accessing important services like banking.
  • 6. MOTIVATION The face recognition technology has advanced significantly in recent years, allowing for efficient recognition even in different lighting conditions, angles, and facial expressions. With face recognition technology, individuals no longer need to remember complex passwords or PINs to access their accounts. Instead, their facial features serve as their unique identifier. Face recognition eliminates the need for physical ATM cards, making transactions more convenient for users. Users no longer need to carry their cards, remember PINs, or worry about losing their cards.
  • 7. ABSTRACT Our face recognition-based ATM system project aims to develop a secure and convenient authentication method for accessing ATM services. Traditional ATM systems rely on physical cards and PINs, which can be susceptible to theft, fraud, or forgotten passwords. In this project, face recognition technology is leveraged to authenticate users based on their unique facial features, eliminating the need for cards and PINs. The system utilizes high-resolution cameras and advanced algorithms to capture and analyze facial images, comparing them against a database of enrolled users. The project focuses on addressing challenges such as accuracy, privacy, accessibility, and security. By implementing face recognition technology, the project aims to provide a seamless and user-friendly experience for ATM users while enhancing security and mitigating the risks associated with traditional authentication methods. Through rigorous testing and evaluation, the project aims to demonstrate the feasibility and effectiveness of face recognition-based ATM systems in real-world banking environments.
  • 8. SYSTEM ARCHITECTURE Human Live Face Recognition Webcam Capture Image Preprocess Image Feature Extraction (SIFT Key Points ) Classification (based on SVM) Face Recognition (Authorize) Open ATM Training Face Database Unauthorized No Login
  • 9. ALGORITHM Haar Cascade algorithm: 1. Collecting Positive and Negative Images: Collect a set of positive and negative images. Positive images should contain the object you want to detect, and negative images should not contain the object. 2. Preparing the Training Data: Convert the positive and negative images to grayscale, resize them to the same size, and store them in a file with labels indicating whether they are positive or negative. 3. Creating the Haar Features: The Haar features are created by defining rectangular regions in the image and calculating the difference between the sum of pixel values inside the rectangle and the sum of pixel values outside the rectangle. 4. Training the Classifier: Train the classifier using the positive and negative images and the Haar features. This is done using a machine learning algorithm such as AdaBoost or Support Vector Machines (SVM).
  • 10. 5. Creating the Cascade Classifier: The trained classifier is converted into a cascade of classifiers, which are applied to sub-regions of the image in a hierarchical manner. This allows the algorithm to quickly reject regions that are unlikely to contain the object. 6. Detecting Objects in Images: The cascade classifier is applied to the image to detect objects. This is done by moving a sliding window over the image and applying the cascade classifier to each sub-region. 7. Filtering False Positives: The algorithm may detect false positives, which are regions that are not actually the object of interest. These false positives are filtered out using various techniques such as non-maximum suppression. 8. Fine-tuning: Finally, the algorithm is fine-tuned to improve its accuracy and reduce false positives. This can be done by adjusting various parameters such as the scale of the sliding window and the threshold for detecting the object.
  • 16.
  • 17.
  • 18.
  • 19. ADVANTAGES 1.Password-Free Authentication: With face recognition technology, individuals no longer need to remember complex passwords or PINs to access their accounts. Instead, their facial features serve as their unique identifier. 2.Rapid and Accurate Authentication: Face recognition systems can authenticate individuals quickly and accurately. 3.Increased Convenience: Face recognition eliminates the need for physical ATM cards, making transactions more convenient for users. Users no longer need to carry their cards, remember PINs, or worry about losing their cards.. 4.Enhanced User Experience: Face recognition-based ATMs provide a more user-friendly experience.
  • 20. SYSTEM REQUIREMENTS Software Requirements Minimum Recommended OS Windows 7 Windows 10 or higher Database SQLite 3.34 SQLite 3.42 IDE VS Code 1.52 VS Code 1.78 Python python 3.8 Python 3.11 Hardware Requirements Minimum Recommended Processor Intel core i5 10th gen Intel core i7 12th gen Camera 16 MP 48 MP RAM 8 GB 16 GB HDD 2GB 4 GB or more
  • 21. CONCLUSION In conclusion, a real-time person detection project has several potential applications in various industries such as security, surveillance, retail, and healthcare. The project involves using computer vision techniques to detect people in real-time video streams, and it can be achieved through various methods such as Haar cascades, deep learning, and other machine learning algorithms.
  • 22. FUTURE SCOPE 1. Contactless Transactions: The COVID-19 pandemic has accelerated the demand for contactless transactions. An ATM system using face detection technology eliminates the need for physical touchpoints, providing a more hygienic option. 2. Personalization: The ATM system can personalize the user experience by recognizing their face and displaying preferred language, currency, and transaction history. 3. Data Collection: The system can collect data on user preferences and transaction patterns, enabling banks to offer targeted marketing and personalized promotions. 4. Enhanced Security: With face detection technology, the ATM system can identify the user based on their facial features, making it more secure and reducing the chances of fraud or theft.
  • 23. LIMITATIONS 1. False Positives: Real-time person detection projects can generate false positives, which can result in unnecessary alarms or interventions. 2. Technical Limitations: The accuracy of real-time person detection projects can be affected by factors such as lighting, environmental conditions, and technical limitations of the sensors or algorithms used. 3. Biases and Discrimination: Facial recognition systems have been found to exhibit biases, including racial, gender, and age biases. If not properly trained or calibrated, these systems may disproportionately misidentify certain groups, leading to discrimination and exclusion.
  • 24. REFERENCES 1. Face Recognition in Real-world Surveillance Videos with Deep Learning Method” Department of Information and Technology University of Science and Technology of China IEEE (2017) 2. Authentic Face Detection and Encryption for Security Assurance IEEE (2018) 3. Face Detection based ATM Security System using Embedded Linux Platform IEEE (2017)