SlideShare a Scribd company logo
1 of 14
Prepared By:-
Suraksha Sanghavi
TE Computer
Roll No :- 40
Guided By :-
Prof.S.B.Ambhore
1
I. Introduction
II. ATM
III. Literature Survey
IV. Iris Recognition
V. WORKING
VI. ADVANTAGES
VII. DISADVANTAGES
VIII. CONCLUSION
IX. REFERENCES
ATM Security WITH IRIS RECOGNITION 2
ATM Security WITH IRIS RECOGNITION 3
 An automated teller machine
(ATM) is :
 Made money transactions easy for
customers to bank.
 Device that provides the customers of
a financial transactions in a public
space without the need for a bank .
 Security requiring combination
Physical access card + Password(PIN)
ATM Security WITH IRIS RECOGNITION 4
Pin
 People write PINs and disclose to others increasing the
risk of fraud and PINs can be stolen by observation
 PIN is a confidential code issued to the
cardholder to permit access to that account
 The PIN does not prove the identification of the
cardholder
ATM Security WITH IRIS RECOGNITION 5
 Finger Printing
 Facial Recognition
 Iris Recognition
ATM Security WITH IRIS RECOGNITION 6
SR.NO TECHNIQUE LIMITATION
1 Finger print It can make mistakes with the dryness
or dirty of the finger’s skin
2 Facial recognition Affected by changes in lighting
ATM Security WITH IRIS RECOGNITION 7
 Iris technology, which uses the iris pattern of
an individual as an identity proof
 In 1953 – Algorithm developed , First used by
John Daugman
 As the initiative 1st the bank had installed iris
based ATM’s inside Kroger Supermarket stores
in Houston, Dallas and Fort Worth.
ATM Security WITH IRIS RECOGNITION 8
ATM Security WITH IRIS RECOGNITION 9
 Easy to access
 Highly protected, internal organ of the eye
 Limited genetic penetrance of iris patterns
 Patterns apparently stable throughout life
 High Accuracy
ATM Security WITH IRIS RECOGNITION 10
 Costly
 The person should be present at the spot.
 Small target
 Sometimes False acceptances and rejections.
 Flash of camera should not become so bright.
ATM Security WITH IRIS RECOGNITION 11
 More reliable in providing security by using iris recognition
software.
 For scanning it required vey negligible amount of time .
 Permeant security password till end of life.
ATM Security WITH IRIS RECOGNITION 12
1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And
Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of
E&Tc , ytiet, Bhivpuri Road, Karjat
2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris
Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN,
India.
3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)”
Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and
Communication MIET, Jammu, India
4. www.biometric.com / Biometric Iris Recognition and Its Application
5. www.google.com/MyBlog:ATM with an Eye.
6. www.wikipedia.org/iris recognition
ATM Security WITH IRIS RECOGNITION 13
ATM Security WITH IRIS RECOGNITION 14

More Related Content

What's hot (20)

Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
14 581
14 58114 581
14 581
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
Moneypad- the future wallet
Moneypad- the future walletMoneypad- the future wallet
Moneypad- the future wallet
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
palm vein technology
palm vein technologypalm vein technology
palm vein technology
 
GSM Based Bank Security Control
GSM Based Bank Security ControlGSM Based Bank Security Control
GSM Based Bank Security Control
 
Counterfeit Currency Detection
Counterfeit Currency DetectionCounterfeit Currency Detection
Counterfeit Currency Detection
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
I twin technology
I twin technologyI twin technology
I twin technology
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 

Similar to An eye with an atm

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmalAkmal Hussain
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm securityeSAT Journals
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger printManoranjan Roy
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein TechnologyManav Mittal
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptxLameesAnees
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest pptvishesh2969
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bmbranjith
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authenticationSufiyan Arab
 

Similar to An eye with an atm (20)

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
H029044050
H029044050H029044050
H029044050
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
D0351022026
D0351022026D0351022026
D0351022026
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
project_report
project_reportproject_report
project_report
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 

More from Suraksha Sanghavi

More from Suraksha Sanghavi (7)

Case study
Case studyCase study
Case study
 
Sampling and its type
Sampling and its typeSampling and its type
Sampling and its type
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring system
 
Smart water tank
Smart water tankSmart water tank
Smart water tank
 
K tree
K  treeK  tree
K tree
 
Case study of goggle map
Case study of goggle mapCase study of goggle map
Case study of goggle map
 
Case Study Of Webgraph
Case Study Of WebgraphCase Study Of Webgraph
Case Study Of Webgraph
 

Recently uploaded

Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

An eye with an atm

  • 1. Prepared By:- Suraksha Sanghavi TE Computer Roll No :- 40 Guided By :- Prof.S.B.Ambhore 1
  • 2. I. Introduction II. ATM III. Literature Survey IV. Iris Recognition V. WORKING VI. ADVANTAGES VII. DISADVANTAGES VIII. CONCLUSION IX. REFERENCES ATM Security WITH IRIS RECOGNITION 2
  • 3. ATM Security WITH IRIS RECOGNITION 3
  • 4.  An automated teller machine (ATM) is :  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a bank .  Security requiring combination Physical access card + Password(PIN) ATM Security WITH IRIS RECOGNITION 4
  • 5. Pin  People write PINs and disclose to others increasing the risk of fraud and PINs can be stolen by observation  PIN is a confidential code issued to the cardholder to permit access to that account  The PIN does not prove the identification of the cardholder ATM Security WITH IRIS RECOGNITION 5
  • 6.  Finger Printing  Facial Recognition  Iris Recognition ATM Security WITH IRIS RECOGNITION 6
  • 7. SR.NO TECHNIQUE LIMITATION 1 Finger print It can make mistakes with the dryness or dirty of the finger’s skin 2 Facial recognition Affected by changes in lighting ATM Security WITH IRIS RECOGNITION 7
  • 8.  Iris technology, which uses the iris pattern of an individual as an identity proof  In 1953 – Algorithm developed , First used by John Daugman  As the initiative 1st the bank had installed iris based ATM’s inside Kroger Supermarket stores in Houston, Dallas and Fort Worth. ATM Security WITH IRIS RECOGNITION 8
  • 9. ATM Security WITH IRIS RECOGNITION 9
  • 10.  Easy to access  Highly protected, internal organ of the eye  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life  High Accuracy ATM Security WITH IRIS RECOGNITION 10
  • 11.  Costly  The person should be present at the spot.  Small target  Sometimes False acceptances and rejections.  Flash of camera should not become so bright. ATM Security WITH IRIS RECOGNITION 11
  • 12.  More reliable in providing security by using iris recognition software.  For scanning it required vey negligible amount of time .  Permeant security password till end of life. ATM Security WITH IRIS RECOGNITION 12
  • 13. 1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of E&Tc , ytiet, Bhivpuri Road, Karjat 2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN, India. 3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)” Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and Communication MIET, Jammu, India 4. www.biometric.com / Biometric Iris Recognition and Its Application 5. www.google.com/MyBlog:ATM with an Eye. 6. www.wikipedia.org/iris recognition ATM Security WITH IRIS RECOGNITION 13
  • 14. ATM Security WITH IRIS RECOGNITION 14