SlideShare a Scribd company logo
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [1]
ATM SECURITY USING FACE RECOGNITION
Renuka devi .P1
,
Maheshwari .R.G2
,
Rekha shree .S3
1
Associate Professor, Department of computer science and Engineering, Paavai Engineering
College,Namakkal.
2,3
U.G Students, Department of computer science and Enigneering, Paavai Engineering College,
Namakkal
rekhabrightspark@gmail.com
maheshwari@gmail.com
renukadevi@gmail.com
ABSTRACT
Now a days everyone where using ATM method for their money transaction, withdrawal, deposit. This system
is mainly used for secured purposed and to take a money at any time with the help of survillnce with safe
manner. There are several bank sector for money usage. Though using this method there is so issue on
withdrawal of money. We know the PIN anybody can use the card. So that’s the issue on today’s world. We
introduce face recognition to access by only particular members. By using you can use one the card authorized
person, join account with someone whom you want to access for your card. This method can also used by twins
with some dissimilarity.
KEYWORDS:
Face recognition,withdrawal,ATM transaction,security,PIN theft, Case Study
INTRODUCTION
In the era there are plenty of members using bank sector to their own purpose. The technology may develop all
the sources of today’s needs. But it has both the advantages and disadvantages of current trend. This method is
very effective compare to fingerprint model, because it has problem on facing at old age. Face recognition
identifies your face and iris and shape of your nose and mouth, which can easily detects your identity. If any
unknown person uses an card cannot be matched, even if they know the PIN of the card. The digital image can
uses to analyze and send to your account to withdrawal of money. It will the database to find a match. This
technique used facial appearance like contour of eyes, nose, chin, lips. This will store details of faces also. This
method is used for adults only. There are two technique method involved for this method.The camera also does
not use any kind of beam. Instead, a special lens has been developed will not only blow up the image of the
iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available
that scan voices and fingerprints.Easier transformation of images to any zone. That can be convertional
method.In 2D dimension method there is an unique method, which was original and individual method. Here
the faces are seen as 2d method the front view of a face and side view of your face. It show the width of the
nose lips. This digital image is captured for detecting the faces. Change in facial expression or difference in
ambient lighting on an appearance that is not directly looking into the camera.
OBJECTIVES
Face recognition finds its application in a variety of fields such as homeland security, criminal identification,
human-computer interaction, privacy security, etc. The face recognition feature inhibits access of account
through stolen or fake cards. The card itself is not enough to access account as it requires the person as well
for the transaction to proceed. Eigen face based method is used for the face recognition. However, the
drawback of using eigen face based method . sometimes be spoofed by the means of fake masks or photos of
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [2]
an account older. To overcome this problem 3D face recognition methods can be used. One-Time passwords
(OTP),OTP ensures that the user is authentic by sending the randomly generated 6-digit code to the
registered mobile number of the corresponding account number.
METHODOLOGY
The first and foremost important step of this system will be to locate a powerful open source facial recognition
program that uses local feature analysis and that is targeted at facial verification. Various facial recognition
algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm
may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These
facial appearances are then used to search for other imagery across matching features. Other algorithm
manages a balcony of face images and then compresses the images face information and it saves only the data
in the image that is used for face detection.
RESULTS AND DISCUSSION
In spite of all these security features, a new technology has been developed. Bank United of Texas
became the first in the United States to offer iris recognition technology at automatic teller machines,
providing the customers a card less, password-free way to get their money out of an ATM.
a.Iris recognition:There no card to show, there's no fingers to ink, no customer inconvenience or
discomfort. It'sjust a photograph of a Bank United customer's eyes. Iris recognition is an automated method
of biometric identification that uses mathematical pattern-recognition techniques on video images of one or
both the issues of an individual eyes whose complex patterns.
b.Biometric technique:The biometric system is used to help registration officers to improve the accuracy
of voter identification. Biometric systems are electronic systems specialized on identifying a user by means
of processing unique psychological or behavioural characteristics of the user.
C.Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the
backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be
d.Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identified.
e.Recognizer:It will check the database to find a match
ACKNOWLEDGEMENT
We thank the staff and our colleagues from the Rural Heath Unit of Jose Abad Santos, Davao Occidental,
Philippines, headed by the Municipal Health Officer, Dr. Amparo A. Lachica, who provided insight and
expertise that greatly assisted the research. We thank the Graduate School of Government and Management,
University of Southeastern Philippines for assistance and for comments that greatly improved the manuscript.
We are expressing our gratitude to our families for being an inspiration. Above all, to God.
CONCLUSION
The facial recognition has proven to be the most secure method of all biometric systems to a point it is widely
used in high level security. If this system is used at this level it should show how much technology has changed
in order to make this method effective in processes of identification and verification.The biometric ATM
system is highly secure as it provides authentication with the information.
Vol-4 Issues 09, September-2020 ISSN: 2456-9348
Impact Factor: 4.520
International Journal of Engineering Technology Research & Management
IJETRM (http://ijetrm.com/) [3]
REFERENCES
[1] The New York Times., Apr. 2013, [online] Available: http://www.nytimes.com/2013/ 04/ 19/ us/
fbi-releases-video-of-boston-bombing-suspects.html.
[2] FEI Face Database., [online] Available.
[3] P. J. Phillips, H. Moon, P. Rauss, S. A. Rizvi, "The FERET evaluation methodology for face-
recognition algorithms", Pro6. X. Tan, B. Triggs, "Enhanced local texture feature sets for face
recognition under difficult lighting conditions", IEEE Trans. Image Process., vol. 19, no. 6, pp. 1635-
1650, Jun. 2010.c. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 137-143, Jun. 1997.
[4] T. Sim, S. Baker, M. Bsat, "The CMU pose illumination and expression (PIE) database", Proc. 5th
IEEE Int. Conf. Autom. Face Gesture Recognit., pp. 46-51, May 2003.
[5] P. Viola, M. J. Jones, "Robust real-time face detection", Int. J. Comput. Vis., vol. 57, no. 2, pp.
137-154, May 2004.
[6] Facevacs Software Developer Kit Cognitec Systems GmbH., 2012, [online] Available
[7] L. Wiskott, J.-M. Fellous, N. Kuiger, C. von der Malsburg, "Face recognition by elastic bunch
graph matching", IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 775-779, Jul. 1997.
[8] Faune Hughes Daniel Lighter Richard Oswald Michael Whitfield "Face Biometrics: A
Longitudinal Study" <em>Seidenberg School of CSIS Pace University</em>.
[9] Gary G. Yen Nethrie Nithianandan "Facial Feature Extraction Using Genetic Algorithm Intelligent
Systems and Control Laboratory School of Electrical and Computer Engineering.

More Related Content

Similar to ATM SECURITY USING FACE RECOGNITION

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
Poooi2
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
IRJET Journal
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
IAESIJAI
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
Rohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
Rohit Shrivastava
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
JASHU JASWANTH
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
IRJET Journal
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
ijtsrd
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET Journal
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
priyabratamansingh1
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET Journal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
IRJET Journal
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
talkaton
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET Journal
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
Nikyaa7
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
IRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AM Publications
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
bkbk37
 

Similar to ATM SECURITY USING FACE RECOGNITION (20)

facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
Development of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCVDevelopment of Real Time Face Recognition System using OpenCV
Development of Real Time Face Recognition System using OpenCV
 
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
Attendance management system using face recognition
Attendance management system using face recognitionAttendance management system using face recognition
Attendance management system using face recognition
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
FACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGYFACE RECOGNITION TECHNOLOGY
FACE RECOGNITION TECHNOLOGY
 
3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications3D Face Recognition Technology in Network Security Applications
3D Face Recognition Technology in Network Security Applications
 
Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
IRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its ApplicationsIRJET-A Survey on Face Recognition based Security System and its Applications
IRJET-A Survey on Face Recognition based Security System and its Applications
 
Facial Recognition Technology
Facial Recognition TechnologyFacial Recognition Technology
Facial Recognition Technology
 
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
IRJET- Deep Learning Based Card-Less Atm Using Fingerprint And Face Recogniti...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
IRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face RecognitionIRJET- IoT based Door Access Control using Face Recognition
IRJET- IoT based Door Access Control using Face Recognition
 
Facial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdfFacial Recognition Mini project 3.pdf
Facial Recognition Mini project 3.pdf
 
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
IRJET- An Innovative Approach for Interviewer to Judge State of Mind of an In...
 
Automatic Attendance system using Facial Recognition
Automatic Attendance system using Facial RecognitionAutomatic Attendance system using Facial Recognition
Automatic Attendance system using Facial Recognition
 
IRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of ThingsIRJET- Vision based Security System and Automation using Internet of Things
IRJET- Vision based Security System and Automation using Internet of Things
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Introduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdfIntroduction Many institutes like and universities always.pdf
Introduction Many institutes like and universities always.pdf
 

More from Lisa Cain

005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus
Lisa Cain
 
Best Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions EssaysBest Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions Essays
Lisa Cain
 
Example Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - EagnlrqfzqwvlExample Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - Eagnlrqfzqwvl
Lisa Cain
 
Why Are Cause And Effect Essays Written
Why Are Cause And Effect Essays WrittenWhy Are Cause And Effect Essays Written
Why Are Cause And Effect Essays Written
Lisa Cain
 
Writing Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make ThiWriting Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make Thi
Lisa Cain
 
Example Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation HandoExample Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation Hando
Lisa Cain
 
How To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay SkeHow To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay Ske
Lisa Cain
 
Essays Custom - The Writing Center.
Essays Custom - The Writing Center.Essays Custom - The Writing Center.
Essays Custom - The Writing Center.
Lisa Cain
 
Success What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, SuccessSuccess What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, Success
Lisa Cain
 
Pencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint NorbertPencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint Norbert
Lisa Cain
 
Citing Research Paper - Reasearch Essay
Citing Research Paper - Reasearch EssayCiting Research Paper - Reasearch Essay
Citing Research Paper - Reasearch Essay
Lisa Cain
 
Example Of An Introduction For A R
Example Of An Introduction For A RExample Of An Introduction For A R
Example Of An Introduction For A R
Lisa Cain
 
Palimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald DahlPalimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald Dahl
Lisa Cain
 
Fundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACYFundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACY
Lisa Cain
 
How To Write A Formal Letter Learn English
How To Write A Formal Letter Learn EnglishHow To Write A Formal Letter Learn English
How To Write A Formal Letter Learn English
Lisa Cain
 
Writing Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make ItWriting Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make It
Lisa Cain
 
Find Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here DiscoverFind Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here Discover
Lisa Cain
 
Kitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, FunKitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, Fun
Lisa Cain
 
How To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTechHow To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTech
Lisa Cain
 
Fish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, WFish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, W
Lisa Cain
 

More from Lisa Cain (20)

005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus005 Essay Examples How To Start An With ~ Thatsnotus
005 Essay Examples How To Start An With ~ Thatsnotus
 
Best Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions EssaysBest Tips For Writing And Editing Admissions Essays
Best Tips For Writing And Editing Admissions Essays
 
Example Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - EagnlrqfzqwvlExample Abstract Scientific Article - Eagnlrqfzqwvl
Example Abstract Scientific Article - Eagnlrqfzqwvl
 
Why Are Cause And Effect Essays Written
Why Are Cause And Effect Essays WrittenWhy Are Cause And Effect Essays Written
Why Are Cause And Effect Essays Written
 
Writing Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make ThiWriting Paper Printable Now, LetS Make Thi
Writing Paper Printable Now, LetS Make Thi
 
Example Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation HandoExample Of Apa Citation In Paper APA Citation Hando
Example Of Apa Citation In Paper APA Citation Hando
 
How To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay SkeHow To Write An Introduction For Academic Essay Ske
How To Write An Introduction For Academic Essay Ske
 
Essays Custom - The Writing Center.
Essays Custom - The Writing Center.Essays Custom - The Writing Center.
Essays Custom - The Writing Center.
 
Success What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, SuccessSuccess What Is Success, Essay On Education, Success
Success What Is Success, Essay On Education, Success
 
Pencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint NorbertPencil On The Paper, Close Up Saint Norbert
Pencil On The Paper, Close Up Saint Norbert
 
Citing Research Paper - Reasearch Essay
Citing Research Paper - Reasearch EssayCiting Research Paper - Reasearch Essay
Citing Research Paper - Reasearch Essay
 
Example Of An Introduction For A R
Example Of An Introduction For A RExample Of An Introduction For A R
Example Of An Introduction For A R
 
Palimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald DahlPalimpsest The Six Sharpened Pencils Of Roald Dahl
Palimpsest The Six Sharpened Pencils Of Roald Dahl
 
Fundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACYFundations Paper - ELEMENTARY LITERACY
Fundations Paper - ELEMENTARY LITERACY
 
How To Write A Formal Letter Learn English
How To Write A Formal Letter Learn EnglishHow To Write A Formal Letter Learn English
How To Write A Formal Letter Learn English
 
Writing Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make ItWriting Good Hooks Worksheet Unique Make It
Writing Good Hooks Worksheet Unique Make It
 
Find Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here DiscoverFind Best Research Paper Writing Service Reviews Here Discover
Find Best Research Paper Writing Service Reviews Here Discover
 
Kitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, FunKitten Writing Santa A Letter Funny Animal Memes, Fun
Kitten Writing Santa A Letter Funny Animal Memes, Fun
 
How To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTechHow To Write A Term Paper Properly Guide - WatchMeTech
How To Write A Term Paper Properly Guide - WatchMeTech
 
Fish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, WFish Writing Paper Have Fun Teaching, Writing Paper, W
Fish Writing Paper Have Fun Teaching, Writing Paper, W
 

Recently uploaded

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
IsmaelVazquez38
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
deepaannamalai16
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
nitinpv4ai
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
National Information Standards Organization (NISO)
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
khuleseema60
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
deepaannamalai16
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
zuzanka
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
Celine George
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
danielkiash986
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
RidwanHassanYusuf
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 

Recently uploaded (20)

Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 
Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.Bossa N’ Roll Records by Ismael Vazquez.
Bossa N’ Roll Records by Ismael Vazquez.
 
Standardized tool for Intelligence test.
Standardized tool for Intelligence test.Standardized tool for Intelligence test.
Standardized tool for Intelligence test.
 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
 
Bonku-Babus-Friend by Sathyajith Ray (9)
Bonku-Babus-Friend by Sathyajith Ray  (9)Bonku-Babus-Friend by Sathyajith Ray  (9)
Bonku-Babus-Friend by Sathyajith Ray (9)
 
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
Jemison, MacLaughlin, and Majumder "Broadening Pathways for Editors and Authors"
 
MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025MDP on air pollution of class 8 year 2024-2025
MDP on air pollution of class 8 year 2024-2025
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.HYPERTENSION - SLIDE SHARE PRESENTATION.
HYPERTENSION - SLIDE SHARE PRESENTATION.
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptxRESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
RESULTS OF THE EVALUATION QUESTIONNAIRE.pptx
 
How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17How to Predict Vendor Bill Product in Odoo 17
How to Predict Vendor Bill Product in Odoo 17
 
Pharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brubPharmaceutics Pharmaceuticals best of brub
Pharmaceutics Pharmaceuticals best of brub
 
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptxBIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
BIOLOGY NATIONAL EXAMINATION COUNCIL (NECO) 2024 PRACTICAL MANUAL.pptx
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 

ATM SECURITY USING FACE RECOGNITION

  • 1. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [1] ATM SECURITY USING FACE RECOGNITION Renuka devi .P1 , Maheshwari .R.G2 , Rekha shree .S3 1 Associate Professor, Department of computer science and Engineering, Paavai Engineering College,Namakkal. 2,3 U.G Students, Department of computer science and Enigneering, Paavai Engineering College, Namakkal rekhabrightspark@gmail.com maheshwari@gmail.com renukadevi@gmail.com ABSTRACT Now a days everyone where using ATM method for their money transaction, withdrawal, deposit. This system is mainly used for secured purposed and to take a money at any time with the help of survillnce with safe manner. There are several bank sector for money usage. Though using this method there is so issue on withdrawal of money. We know the PIN anybody can use the card. So that’s the issue on today’s world. We introduce face recognition to access by only particular members. By using you can use one the card authorized person, join account with someone whom you want to access for your card. This method can also used by twins with some dissimilarity. KEYWORDS: Face recognition,withdrawal,ATM transaction,security,PIN theft, Case Study INTRODUCTION In the era there are plenty of members using bank sector to their own purpose. The technology may develop all the sources of today’s needs. But it has both the advantages and disadvantages of current trend. This method is very effective compare to fingerprint model, because it has problem on facing at old age. Face recognition identifies your face and iris and shape of your nose and mouth, which can easily detects your identity. If any unknown person uses an card cannot be matched, even if they know the PIN of the card. The digital image can uses to analyze and send to your account to withdrawal of money. It will the database to find a match. This technique used facial appearance like contour of eyes, nose, chin, lips. This will store details of faces also. This method is used for adults only. There are two technique method involved for this method.The camera also does not use any kind of beam. Instead, a special lens has been developed will not only blow up the image of the iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available that scan voices and fingerprints.Easier transformation of images to any zone. That can be convertional method.In 2D dimension method there is an unique method, which was original and individual method. Here the faces are seen as 2d method the front view of a face and side view of your face. It show the width of the nose lips. This digital image is captured for detecting the faces. Change in facial expression or difference in ambient lighting on an appearance that is not directly looking into the camera. OBJECTIVES Face recognition finds its application in a variety of fields such as homeland security, criminal identification, human-computer interaction, privacy security, etc. The face recognition feature inhibits access of account through stolen or fake cards. The card itself is not enough to access account as it requires the person as well for the transaction to proceed. Eigen face based method is used for the face recognition. However, the drawback of using eigen face based method . sometimes be spoofed by the means of fake masks or photos of
  • 2. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [2] an account older. To overcome this problem 3D face recognition methods can be used. One-Time passwords (OTP),OTP ensures that the user is authentic by sending the randomly generated 6-digit code to the registered mobile number of the corresponding account number. METHODOLOGY The first and foremost important step of this system will be to locate a powerful open source facial recognition program that uses local feature analysis and that is targeted at facial verification. Various facial recognition algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial appearances are then used to search for other imagery across matching features. Other algorithm manages a balcony of face images and then compresses the images face information and it saves only the data in the image that is used for face detection. RESULTS AND DISCUSSION In spite of all these security features, a new technology has been developed. Bank United of Texas became the first in the United States to offer iris recognition technology at automatic teller machines, providing the customers a card less, password-free way to get their money out of an ATM. a.Iris recognition:There no card to show, there's no fingers to ink, no customer inconvenience or discomfort. It'sjust a photograph of a Bank United customer's eyes. Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both the issues of an individual eyes whose complex patterns. b.Biometric technique:The biometric system is used to help registration officers to improve the accuracy of voter identification. Biometric systems are electronic systems specialized on identifying a user by means of processing unique psychological or behavioural characteristics of the user. C.Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be d.Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identified. e.Recognizer:It will check the database to find a match ACKNOWLEDGEMENT We thank the staff and our colleagues from the Rural Heath Unit of Jose Abad Santos, Davao Occidental, Philippines, headed by the Municipal Health Officer, Dr. Amparo A. Lachica, who provided insight and expertise that greatly assisted the research. We thank the Graduate School of Government and Management, University of Southeastern Philippines for assistance and for comments that greatly improved the manuscript. We are expressing our gratitude to our families for being an inspiration. Above all, to God. CONCLUSION The facial recognition has proven to be the most secure method of all biometric systems to a point it is widely used in high level security. If this system is used at this level it should show how much technology has changed in order to make this method effective in processes of identification and verification.The biometric ATM system is highly secure as it provides authentication with the information.
  • 3. Vol-4 Issues 09, September-2020 ISSN: 2456-9348 Impact Factor: 4.520 International Journal of Engineering Technology Research & Management IJETRM (http://ijetrm.com/) [3] REFERENCES [1] The New York Times., Apr. 2013, [online] Available: http://www.nytimes.com/2013/ 04/ 19/ us/ fbi-releases-video-of-boston-bombing-suspects.html. [2] FEI Face Database., [online] Available. [3] P. J. Phillips, H. Moon, P. Rauss, S. A. Rizvi, "The FERET evaluation methodology for face- recognition algorithms", Pro6. X. Tan, B. Triggs, "Enhanced local texture feature sets for face recognition under difficult lighting conditions", IEEE Trans. Image Process., vol. 19, no. 6, pp. 1635- 1650, Jun. 2010.c. IEEE Conf. Comput. Vis. Pattern Recognit. (CVPR), pp. 137-143, Jun. 1997. [4] T. Sim, S. Baker, M. Bsat, "The CMU pose illumination and expression (PIE) database", Proc. 5th IEEE Int. Conf. Autom. Face Gesture Recognit., pp. 46-51, May 2003. [5] P. Viola, M. J. Jones, "Robust real-time face detection", Int. J. Comput. Vis., vol. 57, no. 2, pp. 137-154, May 2004. [6] Facevacs Software Developer Kit Cognitec Systems GmbH., 2012, [online] Available [7] L. Wiskott, J.-M. Fellous, N. Kuiger, C. von der Malsburg, "Face recognition by elastic bunch graph matching", IEEE Trans. Pattern Anal. Mach. Intell., vol. 19, no. 7, pp. 775-779, Jul. 1997. [8] Faune Hughes Daniel Lighter Richard Oswald Michael Whitfield "Face Biometrics: A Longitudinal Study" <em>Seidenberg School of CSIS Pace University</em>. [9] Gary G. Yen Nethrie Nithianandan "Facial Feature Extraction Using Genetic Algorithm Intelligent Systems and Control Laboratory School of Electrical and Computer Engineering.