SlideShare a Scribd company logo
1 of 20
ATM Security Using Eye and Facial
Recognition System
ARUN KRISHNA K
20042425
CONTENTS
• Introduction
• Face recognition systems
• How do they work
• Methodology
• Techniques and Methods
• 2d Techniques
• 3d Techniques
• Surface-Texture-Analysis
• Iris Recognition
• HOW THE SYSTEM WORKS
• Conclusion
INTRODUCTION
The rise of technology into India has brought into force many type of equipment that
aim at more customer satisfaction. ATM is one such machine which made money
transaction easy for customers to the bank. But it has both advantages and
disadvantages. Current ATMs make use of naught more than an access card and PIN
for uniqueness confirmation. This has ATM Using Face Recognition System
demonstrate the way to a lot of fake attempt and mistreatment through card theft, PIN
theft, stealing and hacking of customers account details and other parts of security. This
process would effectively become details and other part of security. This process would
effectively become an exercise in pattern matching, which would not require a great
deal of time.
FACE RECOGNITION SYSTEMS
FRS is an application that mechanically identifies a person from a
digital image or a video outline from a video source. One of the behaviors
to do this method is by matching chosen facial features from a facial
database and the image. In this system, with appropriate lightning and
robust learning. Further a positive visual match would cause the live
image to be stored in the database so that future transactions would have
broader base from which to compare if the original account image fails to
provide a match –thereby decreasing false negatives.
FACE RECOGNITION SYSTEMS
HOW DO THEY WORK
A database of peoples face is maintained by the system that handles face
detection. There are typically 3 parts related to a face recognition:
• Face-detector
• Eye-localizer
• Face-recognizer
1. Face-detector:The face detector spot the face, eliminating any other
detail, not related to the face (like the backdrop). It identifies the facial
region and leaves the non-facial region in the photo of the person to be
identified.
2. Eye-localizer: It finds the spot of the eyes; so that the position of the
face can be identify better
3. Recognizer: It will check the database to find a match.
METHODOLOGY
The first and foremost important step of this system will be to locate a
powerful open source facial recognition program that uses local feature
analysis and that is targeted at facial verification. Various facial recognition
algorithms be familiar with faces by extracting features, from a snap of the
subject's face. For ex, an algorithm may examine the size, relative position,
in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial
appearances are then used to search for other imagery across matching
features. Other algorithm manages a balcony of face images and then
compresses the images face information and it saves only the data in the
image that is used for face detection.
TECHNIQUES AND METHODS
They are of three types:
 2-D
 3-D
 Surface Texture Analysis
2-D-Technique
The 2-D recognition method was individual of the original techniques
employed. It maintained details of people‟s faces as seen two dimensionally.
Details like width of the nose, width of the eyes, distance between the eyes,
jaw line, cheek bone figure were used for contrast. This type of face
recognition was not too precise. Change in facial expression or difference in
ambient lighting on an appearance that is not directly looking into the
camera did not produce expected results.
3-D-Technique
Progression in face recognition gave origin to the 3-D recognition system.
This stepped up technique, used facial appearance like contours of the eye
sockets, chin, nose, peaks and valley on the visage for identification. The
database will store details of faces also. The advantage of 3- D technique
over 2-D method is that 3-D face identification works fine even if the face is
turned at 90 degree to the camera. It is self-governing of lighting
environment and facial expressions.3-D-Technique
Surface-Texture-Analysis
The most superior method is Surface Texture Analysis (STA). STA does
not examine the entire face but a patch of membrane on it. This patch is
divided into separate blocks. The skin surface, the pore on the skin and
other face characteristics are converted to a code. This code is used for
comparisonSurface-Texture-Analysis
IRIS RECOGNITION
In spite of all these security features; a new technology has been
developed. Bank United of Texas became the first in the United States to
offer iris recognition technology at automatic teller machines, providing the
customers a card less, password-free way to get their money out of an ATM.
there‟s no card to show, there's no fingers to ink, no customer
inconvenience or discomfort. It's just a photograph of a Bank United
customer's eyes. Iris recognition is an automated method of biometric
identification that uses mathematical pattern-recognition techniques on
video images of one or both the issues of an individual‟s eyes whose
complex patterns are unique, stable, and can be seen from some distance.
A key advantage of Iris recognition besides its speed of matching and its
extreme resistance to false matches, is the stability of the Iris as an internal
and protected, yet externally visible organ of an eye. Figure below shows an
schematic diagram of Iris recognition.
Just step up to the camera while your eye is scanned. The iris -- the colored
part of the eye the camera will be checking -- is unique to every person,
more so than fingerprints. And, for the customers who can't remember their
personal identification number or password and scratch it on the back of
their cards or somewhere that a potential thief can find, no more fear of
having an account cleaned out if the card is lost or stolen.
HOW THE SYSTEM WORKS
When a customer puts in a bankcard, a stereo camera locates the face,
find the eye and take a digital image of iris at a distance of up to two to three
feet. The result computerized „iris code‟s compared with one of the
customer will initially provide the bank. ATM won‟t work if the two codes
don‟t match. The camera also does not use any kind of beam. Instead, a
special lens has been developed that will not only blow up the image of the
iris, but provide more detail when it does. Iris scans are more accurate than
other high-tech id system available that scan voices and fingerprints.
Conclusion
We thus develop an ATM model which provides security by using Facial
verification software Adding up facial recognition systems to the identity
confirmation process used in ATMs can reduce forced transactions to a
great extent. Using a 2d and 3d technology for identification is strong and it
is further fortified when another is used at auntheticiation level.
THANK YOU

More Related Content

What's hot

Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt AwalAwal
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognitionMazin Alwaaly
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technologyVivek Soni
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognitionMazin Alwaaly
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShravan Halankar
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technologyusha2016
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDYanand reddy
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningAnkit Gupta
 
biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition TechnologyShashidhar Reddy
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxkhushiGond2
 

What's hot (20)

Biometrics Technology by Capt Awal
Biometrics Technology by Capt AwalBiometrics Technology by Capt Awal
Biometrics Technology by Capt Awal
 
Pattern recognition facial recognition
Pattern recognition facial recognitionPattern recognition facial recognition
Pattern recognition facial recognition
 
Palm vein Technology
Palm vein TechnologyPalm vein Technology
Palm vein Technology
 
Seminar Report face recognition_technology
Seminar Report face recognition_technologySeminar Report face recognition_technology
Seminar Report face recognition_technology
 
Biometric ppt
Biometric pptBiometric ppt
Biometric ppt
 
Pattern recognition IRIS recognition
Pattern recognition IRIS recognitionPattern recognition IRIS recognition
Pattern recognition IRIS recognition
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Finger Print Sensor
Finger Print SensorFinger Print Sensor
Finger Print Sensor
 
Iris recognition
Iris recognitionIris recognition
Iris recognition
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDY
 
Biometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learningBiometricstechnology in iot and machine learning
Biometricstechnology in iot and machine learning
 
Security
SecuritySecurity
Security
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Face Recognition Technology
Face Recognition TechnologyFace Recognition Technology
Face Recognition Technology
 
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptxFACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
FACE RECOGNITION ATTENDANCE SYSTEM (1) (1).pptx
 

Similar to ATM Security Us-WPS Office.pptx

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhavVaibhav P
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdarraihansikdar
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial RecognitionIRJET Journal
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognitionsunjaysahu
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition systemThe_Archer
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition SystemArun ACE
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPTSiddharth Modi
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdfPoooi2
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technologyVengadesh Raja
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by RohitRohit Shrivastava
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By RohitRohit Shrivastava
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxTanayChakraborty11
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET Journal
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition pptSantosh Kumar
 
Facial recognition
Facial recognitionFacial recognition
Facial recognitionDhimankomal
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendacesbk50000
 

Similar to ATM Security Us-WPS Office.pptx (20)

Facial recognition technology by vaibhav
Facial recognition technology by vaibhavFacial recognition technology by vaibhav
Facial recognition technology by vaibhav
 
Attendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan SikdarAttendance system based on face recognition using python by Raihan Sikdar
Attendance system based on face recognition using python by Raihan Sikdar
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 
Face recognition
Face recognitionFace recognition
Face recognition
 
IRJET- Credit Card Authentication using Facial Recognition
IRJET-  	  Credit Card Authentication using Facial RecognitionIRJET-  	  Credit Card Authentication using Facial Recognition
IRJET- Credit Card Authentication using Facial Recognition
 
Facial_recognition_systtem.pptx
Facial_recognition_systtem.pptxFacial_recognition_systtem.pptx
Facial_recognition_systtem.pptx
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
Facial recognition system
Facial recognition systemFacial recognition system
Facial recognition system
 
Facial Recognition System
Facial Recognition SystemFacial Recognition System
Facial Recognition System
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
facerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdffacerecognitiontechnology-131025121934-phpapp01.pdf
facerecognitiontechnology-131025121934-phpapp01.pdf
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 
Face Recognition Technology by Rohit
Face Recognition Technology by RohitFace Recognition Technology by Rohit
Face Recognition Technology by Rohit
 
Face recognition Technology By Rohit
Face recognition Technology By RohitFace recognition Technology By Rohit
Face recognition Technology By Rohit
 
face-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptxface-recognition-technology-ppt[1].pptx
face-recognition-technology-ppt[1].pptx
 
IRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured TransactionIRJET - Face Detection based ATM Safety System for Secured Transaction
IRJET - Face Detection based ATM Safety System for Secured Transaction
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Facial recognition
Facial recognitionFacial recognition
Facial recognition
 
Movie on face recognition in e attendace
Movie on face recognition in e attendaceMovie on face recognition in e attendace
Movie on face recognition in e attendace
 

Recently uploaded

代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...ThinkInnovation
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceSapana Sha
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一F sss
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一F La
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998YohFuh
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAbdelrhman abooda
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...soniya singh
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
 

Recently uploaded (20)

代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
Predictive Analysis - Using Insight-informed Data to Determine Factors Drivin...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Call Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts ServiceCall Girls In Dwarka 9654467111 Escorts Service
Call Girls In Dwarka 9654467111 Escorts Service
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
办理学位证中佛罗里达大学毕业证,UCF成绩单原版一比一
 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
 
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
办理(Vancouver毕业证书)加拿大温哥华岛大学毕业证成绩单原版一比一
 
RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998RA-11058_IRR-COMPRESS Do 198 series of 1998
RA-11058_IRR-COMPRESS Do 198 series of 1998
 
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
꧁❤ Aerocity Call Girls Service Aerocity Delhi ❤꧂ 9999965857 ☎️ Hard And Sexy ...
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
 
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptxAmazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
Amazon TQM (2) Amazon TQM (2)Amazon TQM (2).pptx
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi 🔝8264348440🔝 Independent Escort...
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
 

ATM Security Us-WPS Office.pptx

  • 1. ATM Security Using Eye and Facial Recognition System ARUN KRISHNA K 20042425
  • 2. CONTENTS • Introduction • Face recognition systems • How do they work • Methodology • Techniques and Methods • 2d Techniques • 3d Techniques • Surface-Texture-Analysis • Iris Recognition
  • 3. • HOW THE SYSTEM WORKS • Conclusion
  • 4. INTRODUCTION The rise of technology into India has brought into force many type of equipment that aim at more customer satisfaction. ATM is one such machine which made money transaction easy for customers to the bank. But it has both advantages and disadvantages. Current ATMs make use of naught more than an access card and PIN for uniqueness confirmation. This has ATM Using Face Recognition System demonstrate the way to a lot of fake attempt and mistreatment through card theft, PIN theft, stealing and hacking of customers account details and other parts of security. This process would effectively become details and other part of security. This process would effectively become an exercise in pattern matching, which would not require a great deal of time.
  • 5. FACE RECOGNITION SYSTEMS FRS is an application that mechanically identifies a person from a digital image or a video outline from a video source. One of the behaviors to do this method is by matching chosen facial features from a facial database and the image. In this system, with appropriate lightning and robust learning. Further a positive visual match would cause the live image to be stored in the database so that future transactions would have broader base from which to compare if the original account image fails to provide a match –thereby decreasing false negatives.
  • 7. HOW DO THEY WORK A database of peoples face is maintained by the system that handles face detection. There are typically 3 parts related to a face recognition: • Face-detector • Eye-localizer • Face-recognizer
  • 8. 1. Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be identified. 2. Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identify better 3. Recognizer: It will check the database to find a match.
  • 9. METHODOLOGY The first and foremost important step of this system will be to locate a powerful open source facial recognition program that uses local feature analysis and that is targeted at facial verification. Various facial recognition algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial appearances are then used to search for other imagery across matching features. Other algorithm manages a balcony of face images and then compresses the images face information and it saves only the data in the image that is used for face detection.
  • 10. TECHNIQUES AND METHODS They are of three types:  2-D  3-D  Surface Texture Analysis
  • 11. 2-D-Technique The 2-D recognition method was individual of the original techniques employed. It maintained details of people‟s faces as seen two dimensionally. Details like width of the nose, width of the eyes, distance between the eyes, jaw line, cheek bone figure were used for contrast. This type of face recognition was not too precise. Change in facial expression or difference in ambient lighting on an appearance that is not directly looking into the camera did not produce expected results.
  • 12. 3-D-Technique Progression in face recognition gave origin to the 3-D recognition system. This stepped up technique, used facial appearance like contours of the eye sockets, chin, nose, peaks and valley on the visage for identification. The database will store details of faces also. The advantage of 3- D technique over 2-D method is that 3-D face identification works fine even if the face is turned at 90 degree to the camera. It is self-governing of lighting environment and facial expressions.3-D-Technique
  • 13.
  • 14. Surface-Texture-Analysis The most superior method is Surface Texture Analysis (STA). STA does not examine the entire face but a patch of membrane on it. This patch is divided into separate blocks. The skin surface, the pore on the skin and other face characteristics are converted to a code. This code is used for comparisonSurface-Texture-Analysis
  • 15. IRIS RECOGNITION In spite of all these security features; a new technology has been developed. Bank United of Texas became the first in the United States to offer iris recognition technology at automatic teller machines, providing the customers a card less, password-free way to get their money out of an ATM. there‟s no card to show, there's no fingers to ink, no customer inconvenience or discomfort. It's just a photograph of a Bank United customer's eyes. Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both the issues of an individual‟s eyes whose complex patterns are unique, stable, and can be seen from some distance. A key advantage of Iris recognition besides its speed of matching and its extreme resistance to false matches, is the stability of the Iris as an internal and protected, yet externally visible organ of an eye. Figure below shows an schematic diagram of Iris recognition.
  • 16. Just step up to the camera while your eye is scanned. The iris -- the colored part of the eye the camera will be checking -- is unique to every person, more so than fingerprints. And, for the customers who can't remember their personal identification number or password and scratch it on the back of their cards or somewhere that a potential thief can find, no more fear of having an account cleaned out if the card is lost or stolen.
  • 17.
  • 18. HOW THE SYSTEM WORKS When a customer puts in a bankcard, a stereo camera locates the face, find the eye and take a digital image of iris at a distance of up to two to three feet. The result computerized „iris code‟s compared with one of the customer will initially provide the bank. ATM won‟t work if the two codes don‟t match. The camera also does not use any kind of beam. Instead, a special lens has been developed that will not only blow up the image of the iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available that scan voices and fingerprints.
  • 19. Conclusion We thus develop an ATM model which provides security by using Facial verification software Adding up facial recognition systems to the identity confirmation process used in ATMs can reduce forced transactions to a great extent. Using a 2d and 3d technology for identification is strong and it is further fortified when another is used at auntheticiation level.