SlideShare a Scribd company logo
1 of 11
PRESENTED BY
MANORANJAN ROY
UIT, BU
 PROBLEM STATEMENT
 OBJECTIVE
 INTRODUCTION
 ADVANTAGES
 DISADVANTAGES
 CONCLUSION
 In present scenario, traditional ATM system
accepts only on the PIN CODE security system,
enabling the other person rather than the owner to
access the account very easily.
 This ensures that the traditional ATM system is
not fully secured.
 This system is easily to hack.
 The objective of our project is to provide
biometric security through fingerprint
authentication in ATM application.
 The underlying principle is the
phenomenon of biometrics
“AUTHENTICATION”, in this project we
propose a method for fingerprint matching
based on matching algorithms.
 The fingerprint is a person’s most unique
physical characteristic.
 Fingerprint recognition software is
based on the ability to first recognize
fingerprint, in this technological
fingerprint measure the various features of each
fingerprint.
SYSTEM FLOW DIAGRAM
 CHIP- S3C2440
 HARWARE AND
SOFTWARE
1. Very high accuracy and security
Identification
Verification
2. It is one of the most developed Biometric
Security. So,
It’s Easy to use.
Doesn't Forgetting it.
It’s not stolen by any one.
3. It’s standardized security other than traditional
methods (PIN, Passwords).
4. There is no need to carry the cards.
1. Misidentification
False Acceptance
False Rejection
2. Image captured at 500 dpi. Resolution: 8 bits per
pixel. A 500 dpi fingerprint image at 8 bits per
pixel demands a large memory space, 240 KB
approximately.
3. In this system the ATM with fingerprint scanning
machine is heavy costly.
4. Withdrawal cases problem, when card holder in
some injury or accident cases his/her family
member can’t withdrawal money for fingerprint.
5. During online transaction by card does not held for
this system.
6. For some people it is very difficult, because . Dry or
wet hands and any kind of skin disease.
It will be very easy to start this type of system
Advantages of the stability & reliability of the
fingerprint
System is safe, reliable & easy to use
Role of DCB bank in India
Atm using finger print

More Related Content

What's hot

Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eyeChand Pasha
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGYJOLLUSUDARSHANREDDY
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical BiometricJorge Sebastiao
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Palak Pandoh
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol Nishmitha B
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 

What's hot (20)

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Security
SecuritySecurity
Security
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
14 581
14 58114 581
14 581
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
N044057478
N044057478N044057478
N044057478
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Similar to Atm using finger print

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptographySampat Patnaik
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric DevicesIRJET Journal
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein TechnologyPapun Papun
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprintSagar Verma
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET Journal
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologypptNaga Dinesh
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Computer science ppt
Computer science pptComputer science ppt
Computer science pptbrijesh kumar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptxPavani839789
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
Iris information security recognatio.ppt
Iris information security recognatio.pptIris information security recognatio.ppt
Iris information security recognatio.pptnaghamallella
 

Similar to Atm using finger print (20)

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric Devices
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
H029044050
H029044050H029044050
H029044050
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
D0351022026
D0351022026D0351022026
D0351022026
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Iris information security recognatio.ppt
Iris information security recognatio.pptIris information security recognatio.ppt
Iris information security recognatio.ppt
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Atm using finger print

  • 2.  PROBLEM STATEMENT  OBJECTIVE  INTRODUCTION  ADVANTAGES  DISADVANTAGES  CONCLUSION
  • 3.  In present scenario, traditional ATM system accepts only on the PIN CODE security system, enabling the other person rather than the owner to access the account very easily.  This ensures that the traditional ATM system is not fully secured.  This system is easily to hack.
  • 4.  The objective of our project is to provide biometric security through fingerprint authentication in ATM application.  The underlying principle is the phenomenon of biometrics “AUTHENTICATION”, in this project we propose a method for fingerprint matching based on matching algorithms.
  • 5.  The fingerprint is a person’s most unique physical characteristic.  Fingerprint recognition software is based on the ability to first recognize fingerprint, in this technological fingerprint measure the various features of each fingerprint.
  • 6. SYSTEM FLOW DIAGRAM  CHIP- S3C2440  HARWARE AND SOFTWARE
  • 7. 1. Very high accuracy and security Identification Verification 2. It is one of the most developed Biometric Security. So, It’s Easy to use. Doesn't Forgetting it. It’s not stolen by any one. 3. It’s standardized security other than traditional methods (PIN, Passwords). 4. There is no need to carry the cards.
  • 8. 1. Misidentification False Acceptance False Rejection 2. Image captured at 500 dpi. Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 KB approximately. 3. In this system the ATM with fingerprint scanning machine is heavy costly.
  • 9. 4. Withdrawal cases problem, when card holder in some injury or accident cases his/her family member can’t withdrawal money for fingerprint. 5. During online transaction by card does not held for this system. 6. For some people it is very difficult, because . Dry or wet hands and any kind of skin disease.
  • 10. It will be very easy to start this type of system Advantages of the stability & reliability of the fingerprint System is safe, reliable & easy to use Role of DCB bank in India