SlideShare a Scribd company logo
1 of 3
Download to read offline
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [1]
ATM SECURITY USING FACE RECOGNITION
Renuka devi .P1
,
Maheshwari .R.G2
,
Rekha shree .S3
1
Associate Professor, Department of computer science and Engineering, Paavai Engineering
College,Namakkal.
2,3
U.G Students, Department of computer science and Enigneering, Paavai Engineering College,
Namakkal
rekhabrightspark@gmail.com
maheshwari@gmail.com
renukadevi@gmail.com
ABSTRACT
Now a days everyone where using ATM method for their money transaction, withdrawal, deposit. This system
is mainly used for secured purposed and to take a money at any time with the help of survillnce with safe
manner. There are several bank sector for money usage. Though using this method there is so issue on
withdrawal of money. We know the PIN anybody can use the card. So that’s the issue on today’s world. We
introduce face recognition to access by only particular members. By using you can use one the card authorized
person, join account with someone whom you want to access for your card. This method can also used by twins
with some dissimilarity.
KEYWORDS:
Face recognition,withdrawal,ATM transaction,security,PIN theft, Case Study
INTRODUCTION
In the era there are plenty of members using bank sector to their own purpose. The technology may develop all
the sources of today’s needs. But it has both the advantages and disadvantages of current trend. This method is
very effective compare to fingerprint model, because it has problem on facing at old age. Face recognition
identifies your face and iris and shape of your nose and mouth, which can easily detects your identity. If any
unknown person uses an card cannot be matched, even if they know the PIN of the card. The digital image can
uses to analyze and send to your account to withdrawal of money. It will the database to find a match. This
technique used facial appearance like contour of eyes, nose, chin, lips. This will store details of faces also. This
method is used for adults only. There are two technique method involved for this method.The camera also does
not use any kind of beam. Instead, a special lens has been developed will not only blow up the image of the
iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available
that scan voices and fingerprints.Easier transformation of images to any zone. That can be convertional
method.In 2D dimension method there is an unique method, which was original and individual method. Here
the faces are seen as 2d method the front view of a face and side view of your face. It show the width of the
nose lips. This digital image is captured for detecting the faces. Change in facial expression or difference in
ambient lighting on an appearance that is not directly looking into the camera.
OBJECTIVES
Face recognition finds its application in a variety of fields such as homeland security, criminal identification,
human-computer interaction, privacy security, etc. The face recognition feature inhibits access of account
through stolen or fake cards. The card itself is not enough to access account as it requires the person as well
for the transaction to proceed. Eigen face based method is used for the face recognition. However, the
drawback of using eigen face based method . sometimes be spoofed by the means of fake masks or photos of
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [2]
an account older. To overcome this problem 3D face recognition methods can be used. One-Time passwords
(OTP),OTP ensures that the user is authentic by sending the randomly generated 6-digit code to the
registered mobile number of the corresponding account number.
METHODOLOGY
The first and foremost important step of this system will be to locate a powerful open source facial recognition
program that uses local feature analysis and that is targeted at facial verification. Various facial recognition
algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm
may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These
facial appearances are then used to search for other imagery across matching features. Other algorithm
manages a balcony of face images and then compresses the images face information and it saves only the data
in the image that is used for face detection.
RESULTS AND DISCUSSION
In spite of all these security features, a new technology has been developed. Bank United of Texas
became the first in the United States to offer iris recognition technology at automatic teller machines,
providing the customers a card less, password-free way to get their money out of an ATM.
a.Iris recognition:There no card to show, there's no fingers to ink, no customer inconvenience or
discomfort. It'sjust a photograph of a Bank United customer's eyes. Iris recognition is an automated method
of biometric identification that uses mathematical pattern-recognition techniques on video images of one or
both the issues of an individual eyes whose complex patterns.
b.Biometric technique:The biometric system is used to help registration officers to improve the accuracy
of voter identification. Biometric systems are electronic systems specialized on identifying a user by means
of processing unique psychological or behavioural characteristics of the user.
C.Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the
backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be
d.Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identified.
e.Recognizer:It will check the database to find a match
ACKNOWLEDGEMENT
We thank the staff and our colleagues from the Rural Heath Unit of Jose Abad Santos, Davao Occidental,
Philippines, headed by the Municipal Health Officer, Dr. Amparo A. Lachica, who provided insight and
expertise that greatly assisted the research. We thank the Graduate School of Government and Management,
University of Southeastern Philippines for assistance and for comments that greatly improved the manuscript.
We are expressing our gratitude to our families for being an inspiration. Above all, to God.
CONCLUSION
The facial recognition has proven to be the most secure method of all biometric systems to a point it is widely
used in high level security. If this system is used at this level it should show how much technology has changed
in order to make this method effective in processes of identification and verification.The biometric ATM
system is highly secure as it provides authentication with the information.
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [3]
REFERENCES
[1] The New York Times., Apr. 2013, [online] Available: http://www.nytimes.com/2013/ 04/ 19/ us/
fbi-releases-video-of-boston-bombing-suspects.html.
[2] FEI Face Database., [online] Available.
[3] P. J. Phillips, H. Moon, P. Rauss, S. A. Rizvi, "The FERET evaluation methodology for face-
recognition algorithms", Pro6. X. Tan, B. Triggs, "Enhanced local texture feature sets for face
recognition under difficult lighting conditions", IEEE Trans. Image Process., vol. 19, no. 6, pp. 1635-
1650, Jun. 2010.c. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 137-143, Jun. 1997.
[4] T. Sim, S. Baker, M. Bsat, "The CMU pose illumination and expression (PIE) database", Proc. 5th
IEEE Int. Conf. Autom. Face Gesture Recognit., pp. 46-51, May 2003.
[5] P. Viola, M. J. Jones, "Robust real-time face detection", Int. J. Comput. Vis., vol. 57, no. 2, pp.
137-154, May 2004.
[6] Facevacs Software Developer Kit Cognitec Systems GmbH., 2012, [online] Available
[7] L. Wiskott, J.-M. Fellous, N. Kuiger, C. von der Malsburg, "Face recognition by elastic bunch
graph matching", IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 775-779, Jul. 1997.
[8] Faune Hughes Daniel Lighter Richard Oswald Michael Whitfield "Face Biometrics: A
Longitudinal Study" <em>Seidenberg School of CSIS Pace University</em>.
[9] Gary G. Yen Nethrie Nithianandan "Facial Feature Extraction Using Genetic Algorithm Intelligent
Systems and Control Laboratory School of Electrical and Computer Engineering.

More Related Content

Similar to ATM SECURITY USING FACE RECOGNITION

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVIRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognitionIAESIJAI
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYJASHU JASWANTH
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security ApplicationsIRJET Journal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET Journal
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET Journal
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdftalkaton
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET Journal
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionNikyaa7
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfbkbk37
 

Similar to ATM SECURITY USING FACE RECOGNITION (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 

More from Lisa Cain

005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ ThatsnotusLisa Cain
 
Best Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions EssaysBest Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions EssaysLisa Cain
 
Example Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - EagnlrqfzqwvlExample Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - EagnlrqfzqwvlLisa Cain
 
Why Are Cause And Effect Essays Written
Why Are Cause And Effect Essays WrittenWhy Are Cause And Effect Essays Written
Why Are Cause And Effect Essays WrittenLisa Cain
 
Writing Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make ThiWriting Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make ThiLisa Cain
 
Example Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation HandoExample Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation HandoLisa Cain
 
How To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay SkeHow To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay SkeLisa Cain
 
Essays Custom - The Writing Center.
Essays Custom - The Writing Center.Essays Custom - The Writing Center.
Essays Custom - The Writing Center.Lisa Cain
 
Success What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, SuccessSuccess What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, SuccessLisa Cain
 
Pencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint NorbertPencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint NorbertLisa Cain
 
Citing Research Paper - Reasearch Essay
Citing Research Paper - Reasearch EssayCiting Research Paper - Reasearch Essay
Citing Research Paper - Reasearch EssayLisa Cain
 
Example Of An Introduction For A R
Example Of An Introduction For A RExample Of An Introduction For A R
Example Of An Introduction For A RLisa Cain
 
Palimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald DahlPalimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald DahlLisa Cain
 
Fundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACYFundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACYLisa Cain
 
How To Write A Formal Letter Learn English
How To Write A Formal Letter Learn EnglishHow To Write A Formal Letter Learn English
How To Write A Formal Letter Learn EnglishLisa Cain
 
Writing Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make ItWriting Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make ItLisa Cain
 
Find Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here DiscoverFind Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here DiscoverLisa Cain
 
Kitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, FunKitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, FunLisa Cain
 
How To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTechHow To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTechLisa Cain
 
Fish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, WFish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, WLisa Cain
 

More from Lisa Cain (20)

005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus
 
Best Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions EssaysBest Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions Essays
 
Example Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - EagnlrqfzqwvlExample Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - Eagnlrqfzqwvl
 
Why Are Cause And Effect Essays Written
Why Are Cause And Effect Essays WrittenWhy Are Cause And Effect Essays Written
Why Are Cause And Effect Essays Written
 
Writing Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make ThiWriting Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make Thi
 
Example Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation HandoExample Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation Hando
 
How To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay SkeHow To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay Ske
 
Essays Custom - The Writing Center.
Essays Custom - The Writing Center.Essays Custom - The Writing Center.
Essays Custom - The Writing Center.
 
Success What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, SuccessSuccess What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, Success
 
Pencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint NorbertPencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint Norbert
 
Citing Research Paper - Reasearch Essay
Citing Research Paper - Reasearch EssayCiting Research Paper - Reasearch Essay
Citing Research Paper - Reasearch Essay
 
Example Of An Introduction For A R
Example Of An Introduction For A RExample Of An Introduction For A R
Example Of An Introduction For A R
 
Palimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald DahlPalimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald Dahl
 
Fundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACYFundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACY
 
How To Write A Formal Letter Learn English
How To Write A Formal Letter Learn EnglishHow To Write A Formal Letter Learn English
How To Write A Formal Letter Learn English
 
Writing Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make ItWriting Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make It
 
Find Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here DiscoverFind Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here Discover
 
Kitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, FunKitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, Fun
 
How To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTechHow To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTech
 
Fish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, WFish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, W
 

Recently uploaded

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

ATM SECURITY USING FACE RECOGNITION

  • 1. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [1] ATM SECURITY USING FACE RECOGNITION Renuka devi .P1 , Maheshwari .R.G2 , Rekha shree .S3 1 Associate Professor, Department of computer science and Engineering, Paavai Engineering College,Namakkal. 2,3 U.G Students, Department of computer science and Enigneering, Paavai Engineering College, Namakkal rekhabrightspark@gmail.com maheshwari@gmail.com renukadevi@gmail.com ABSTRACT Now a days everyone where using ATM method for their money transaction, withdrawal, deposit. This system is mainly used for secured purposed and to take a money at any time with the help of survillnce with safe manner. There are several bank sector for money usage. Though using this method there is so issue on withdrawal of money. We know the PIN anybody can use the card. So that’s the issue on today’s world. We introduce face recognition to access by only particular members. By using you can use one the card authorized person, join account with someone whom you want to access for your card. This method can also used by twins with some dissimilarity. KEYWORDS: Face recognition,withdrawal,ATM transaction,security,PIN theft, Case Study INTRODUCTION In the era there are plenty of members using bank sector to their own purpose. The technology may develop all the sources of today’s needs. But it has both the advantages and disadvantages of current trend. This method is very effective compare to fingerprint model, because it has problem on facing at old age. Face recognition identifies your face and iris and shape of your nose and mouth, which can easily detects your identity. If any unknown person uses an card cannot be matched, even if they know the PIN of the card. The digital image can uses to analyze and send to your account to withdrawal of money. It will the database to find a match. This technique used facial appearance like contour of eyes, nose, chin, lips. This will store details of faces also. This method is used for adults only. There are two technique method involved for this method.The camera also does not use any kind of beam. Instead, a special lens has been developed will not only blow up the image of the iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available that scan voices and fingerprints.Easier transformation of images to any zone. That can be convertional method.In 2D dimension method there is an unique method, which was original and individual method. Here the faces are seen as 2d method the front view of a face and side view of your face. It show the width of the nose lips. This digital image is captured for detecting the faces. Change in facial expression or difference in ambient lighting on an appearance that is not directly looking into the camera. OBJECTIVES Face recognition finds its application in a variety of fields such as homeland security, criminal identification, human-computer interaction, privacy security, etc. The face recognition feature inhibits access of account through stolen or fake cards. The card itself is not enough to access account as it requires the person as well for the transaction to proceed. Eigen face based method is used for the face recognition. However, the drawback of using eigen face based method . sometimes be spoofed by the means of fake masks or photos of
  • 2. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [2] an account older. To overcome this problem 3D face recognition methods can be used. One-Time passwords (OTP),OTP ensures that the user is authentic by sending the randomly generated 6-digit code to the registered mobile number of the corresponding account number. METHODOLOGY The first and foremost important step of this system will be to locate a powerful open source facial recognition program that uses local feature analysis and that is targeted at facial verification. Various facial recognition algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial appearances are then used to search for other imagery across matching features. Other algorithm manages a balcony of face images and then compresses the images face information and it saves only the data in the image that is used for face detection. RESULTS AND DISCUSSION In spite of all these security features, a new technology has been developed. Bank United of Texas became the first in the United States to offer iris recognition technology at automatic teller machines, providing the customers a card less, password-free way to get their money out of an ATM. a.Iris recognition:There no card to show, there's no fingers to ink, no customer inconvenience or discomfort. It'sjust a photograph of a Bank United customer's eyes. Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both the issues of an individual eyes whose complex patterns. b.Biometric technique:The biometric system is used to help registration officers to improve the accuracy of voter identification. Biometric systems are electronic systems specialized on identifying a user by means of processing unique psychological or behavioural characteristics of the user. C.Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be d.Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identified. e.Recognizer:It will check the database to find a match ACKNOWLEDGEMENT We thank the staff and our colleagues from the Rural Heath Unit of Jose Abad Santos, Davao Occidental, Philippines, headed by the Municipal Health Officer, Dr. Amparo A. Lachica, who provided insight and expertise that greatly assisted the research. We thank the Graduate School of Government and Management, University of Southeastern Philippines for assistance and for comments that greatly improved the manuscript. We are expressing our gratitude to our families for being an inspiration. Above all, to God. CONCLUSION The facial recognition has proven to be the most secure method of all biometric systems to a point it is widely used in high level security. If this system is used at this level it should show how much technology has changed in order to make this method effective in processes of identification and verification.The biometric ATM system is highly secure as it provides authentication with the information.
  • 3. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [3] REFERENCES [1] The New York Times., Apr. 2013, [online] Available: http://www.nytimes.com/2013/ 04/ 19/ us/ fbi-releases-video-of-boston-bombing-suspects.html. [2] FEI Face Database., [online] Available. [3] P. J. Phillips, H. Moon, P. Rauss, S. A. Rizvi, "The FERET evaluation methodology for face- recognition algorithms", Pro6. X. Tan, B. Triggs, "Enhanced local texture feature sets for face recognition under difficult lighting conditions", IEEE Trans. Image Process., vol. 19, no. 6, pp. 1635- 1650, Jun. 2010.c. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 137-143, Jun. 1997. [4] T. Sim, S. Baker, M. Bsat, "The CMU pose illumination and expression (PIE) database", Proc. 5th IEEE Int. Conf. Autom. Face Gesture Recognit., pp. 46-51, May 2003. [5] P. Viola, M. J. Jones, "Robust real-time face detection", Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, May 2004. [6] Facevacs Software Developer Kit Cognitec Systems GmbH., 2012, [online] Available [7] L. Wiskott, J.-M. Fellous, N. Kuiger, C. von der Malsburg, "Face recognition by elastic bunch graph matching", IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 775-779, Jul. 1997. [8] Faune Hughes Daniel Lighter Richard Oswald Michael Whitfield "Face Biometrics: A Longitudinal Study" <em>Seidenberg School of CSIS Pace University</em>. [9] Gary G. Yen Nethrie Nithianandan "Facial Feature Extraction Using Genetic Algorithm Intelligent Systems and Control Laboratory School of Electrical and Computer Engineering.