SlideShare a Scribd company logo
1 of 3
Download to read offline
R. Swaminathan Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

Elimination of Unauthorized and Fraudulent Transactions of
ATM Using Image Processing Techniques
R. Swaminathan
Dept of Computer Science, Urumu Dhanalakshmi College, Trichy –19, Tamil Nadu.

Abstract
Chip and Magnetic stripe are the types of technologies embedded on debit, credit and ATM cards in order to
store the payment information.
This paper mainly deals with the magnetic stripe technology and proposes
techniques that can be used to eliminate unauthorized and fraudulent transactions of ATM, Automated Teller
Machine. The techniques that this paper proposes such as Attaching a ThumbReader on an ATM to get an
impression of the left-thumb from the person who has inserted his card into the slot to access the ATM, Adding
the details of the impression of the left-thumb of an ATM card holder to the magnetic strip embedded on the
card, and making the ATM capable of comparing the impression of the left-thumb scanned by ThumbReader
attached on the ATM, with an impression embedded on the ATM-card using image processing techniques.
Keywords: CardReader,Fraudulent transaction, Magneticstripe, ThumbReader,Unauthorized transaction,

I.

Introduction

The smart card [card with a chip] and its
usage came into practice in the year 1968. But most
banking organizations still rely on magnetic stripe
card because of its low-cost production. That is why,
this paper deals only with magnetic stripe
technology.
Even though the scientific technology has
reached a significant development, there is no
sufficient tool in order to protect the money placed on
the ATM from unauthorized and fraudulent
transactions. There is a considerable difference
between unauthorized and fraudulent transaction of
ATM. Unauthorized access of ATM means that an
ATM-card holder may give the card to the third party
to withdraw the amount from the cardholder account
through ATM. Even though this transaction is done
with knowledge of the ATM-card holder, it is treated
as an unauthorized transaction. Fraudulent
transaction means that the transaction that is carried
out without a proper ATM card and a proper
permission from the ATM card holder, which means
that a person withdraws amount from other’s bank
account with a duplicate card and without their
knowledge. These two types of transaction can be
fully removed if the banking organization follows the
following proposals suggested by this paper.
 A ThumbReader needs to be attached on an
ATM to get an impression of the left-thumb from
the person who has inserted his card into the slot
to access the ATM.
 The details of the impression of the left-thumb of
an ATM card holder need to be added to the
magnetic stripe embedded on the card.

www.ijera.com



The ATM needs to be made capable of
comparing the impression of the left-thumb
scanned by the ThumbReader attached on the
ATM, with an impression embedded on the
ATM-card using image processing techniques.

II.

Parts of an existing ATM-card [Debit
card and Credit Card]

2.1 Magnetic stripe
The information printed on the front side of
the card [Debit, Credit and ATM Cards] is humanreadable.

Fig 1: Back portion of the card
a) Magnetic Stripe b) Card Verification Value c)
Signature Bar
On the other hand, the back side of the card
contains both human-readable and machine-readable
information. The information that is non-readable by
human stored on a magnetic stripe. The magnetic
stripe comprises three tracks in it. The storage limit
of the first, second and the third track is 210 BPI
density [Bytes per Inch], 75 BPI density and 210 BPI
24 | P a g e
R. Swaminathan Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26
density respectively. The general structure of a
magnetic stripe is as follow
|----------------------------|
Track 1
210 BPI density
|----------------------------|
Track 2
75 BPI density
|----------------------------|
Track 3
10 BPI density
|----------------------------|
Only Track 1 and Track 2 are used by the
payment industry. Track data is defined by
international standards and is the same for all
types of card
Track 1
|-------------------------------------------------------|
1
2
3
4
< = 19Digits ^ 2-26 characters ^ YYMM ^ 3 Digits
|-------------------------------------------------------|


The first column represents the primary account
number, known as the card number, which plays
an important element in identifying a customer.
 The second column represents the name of the
card holder. Like the card number, it is also
embedded on the front as well as on the back
side of the card.
 The third column represents the expiration date
of the card and it is stored in the form of
YYMM.
 The fourth column represents the service code.
Track 2
|-----------------------------------------------------|
1
2
3
< = 19Digits ^
YYMM ^
3Digits
|------------------------------------------------------|
It may be for the purpose of avoiding the
creation of counterfeit card and fraudulent
transactions, the information stored on column 1,
column 3 and column 4 of track 1 are repeated in the
column 1 and column 2 and column 3 of track 2.
Track 3
|--------------------------------------------------|
|--------------------------------------------------|


The track 3 of the existing magnetic stripe does
not have any data within it.

2.2 Card verification value
This is a unique number, which is to be used
whenever the card needs to be used to make
purchases over the Internet.

www.ijera.com

www.ijera.com

2.3 Signature bar
A customer has to sign on the bar as soon as
the card is received to protect it against fraud.

III.

Magnetic stripe of the proposed card

In addition to the information of the existing
magnetic stripe, the proposed magnetic stripe
contains the impression of the left thumb of the cardholder, which means that the proposed card contains
three tracks of which the first two tracks follow the
methodology used by the existing card and the third
track follows the structure given below.
Track 3
|-----------------------------------------------------|
1
2
3
|------------------------------------------------------|
The track 3 of magnetic stripe of the
proposed card contains three columns all of which
comprise the details of the left thumb of the card
holder. In order to avoid fraudulent transactions
these three columns contain the same details.

IV.

Parts of the proposed ATM

Fig : ATM with a ThumbReader
4.1 CardReader
The following steps to be followed by the
CardReader
 Read the information stored on the magnetic
stripe embedded on the ATM card.
 Pass the details stored on the track 3 to the
ThumbReader to compare the thumb impression.
 Get the information from the ThumbReader.
 Disallow the user to do the further transaction if
the information passed by the ThumbReader
contains ‘invalid’.
 Allow the user to do the further transaction if the
information passed by the ThumbReader
contains ‘valid’.
4.2 ThumbReader
The Thumb Reader performs
operations which include the following

three

25 | P a g e
R. Swaminathan Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26







Gets an impression of the left-thumb of the ATM
user.
Determines whether the pattern of ridges and
valleys of the impression obtained by itself
matches the pattern of ridges and valley in the
image captured by the CardReader.
Passes ‘valid’ to the CardReader if there is no
contradiction between the image
captured by CardReader and the image captured
by ThumbReader.
Passes ‘invalid’ to the CardReader if there is any
contradiction between the image captured by
CardReader and the image captured by
ThumbReader.

Every fingerprint has some unique characteristics,
which need to be filtered and converted into an
encrypted biometric or a
mathematical representation.

VI.

V.

References
[1]

[3]

Operations of the proposed ATM

Pseudo-code
Input
Card and left-thumb finger
Process
If Expiration date of the card<= current date
and
left-thumb finger = Details of left-thumb
finger stored on the
magnetic stripe then
Allow to enter ‘pin-number’
if pin-number = ‘valid’ then
Allow ‘transactions’
Else
Not allow ‘ transactions’
End if
Else
Not accept ‘pin-number’
End if

www.ijera.com

Conclusion

Banking Organizations follow magnetic stripe
technology rather than Chip based card.
Nowadays a lot of fraudulent ATM transactions take
place because it is easy to duplicate a magnetic stripe
card. There are two ways to eliminate such type of
transactions. The one way is to switch over to smart
card. The other way is to make some advancement on
the existing magnetic stripe card. The paper describes
an advancement that can be implemented on the
existing magnetic stripe card. This advancement
would be very useful not only in reducing but also in
eliminating the unauthorized and fraudulent
transactions of ATM.

[2]

Fig: Mathematical representation of a thumb
finger

www.ijera.com

[4]

[5]

Identifying the quality of tomatoes in images
processing using matlab, R.Kalaivani, Dr.S.
Muruganand,
Dr.Azha.Periasamy,
International Journal of Advanced Research
in
Electrical,
Electronics
and
Instrumentation Engineering, Vol. 2, Issue
8, August 2013.
Image mining of textual images using lowlevel image features, prof. Mrs. Sushma
andgaonkar, Mr. Rahul Jagtap, Mr. Pramod
Anarase, Mr. Balaji Khadake, Mr. Akshay
Betale, IEEE,2010.
Efficient Image Mining using feature
content based image retrieval system,
Rajshree Dubey, Rajnish Choubey, Sanjeev
Dubey, International journal of Advanced
computer engineering and architecture, vol
1, no1, june 2011.
Image clustering and retrieval using image
mining
techniques,
A.
Kannan,
Dr.V.Mohan,
Dr.
N.
Anbazhagan,
IEEE,2010.
An efficient technique using text & content
base image mining technique for image
retrieval, Mahip M. Bartere, Dr. Prashant,
R.Deshmukh, IJERA, 2012.

26 | P a g e

More Related Content

What's hot

ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
IRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET Journal
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET Journal
 
An approach of Machine Learning with the Help of Data Stream to Control the ...
An approach of Machine Learning with the Help of  Data Stream to Control the ...An approach of Machine Learning with the Help of  Data Stream to Control the ...
An approach of Machine Learning with the Help of Data Stream to Control the ...IRJET Journal
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET Journal
 
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET Journal
 
Digital Payments
Digital PaymentsDigital Payments
Digital Paymentsrohancool
 
Magnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardMagnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardVaishnavi
 
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...Digital Marketing
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
2909460 U M L D I A G R A M S B A N K M A N A G E M E N T
2909460  U M L  D I A G R A M S B A N K  M A N A G E M E N T2909460  U M L  D I A G R A M S B A N K  M A N A G E M E N T
2909460 U M L D I A G R A M S B A N K M A N A G E M E N Tankit05gupta
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card PaymentEditor IJCATR
 
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...Eswar Publications
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Donald E. Hester
 

What's hot (20)

ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
IRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation SystemIRJET- RFID based Bus Ticket Generation System
IRJET- RFID based Bus Ticket Generation System
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
N044057478
N044057478N044057478
N044057478
 
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR CodeIRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
IRJET- Online Facility of Ticket Booking and Generating Buspass using QR Code
 
An approach of Machine Learning with the Help of Data Stream to Control the ...
An approach of Machine Learning with the Help of  Data Stream to Control the ...An approach of Machine Learning with the Help of  Data Stream to Control the ...
An approach of Machine Learning with the Help of Data Stream to Control the ...
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment System
 
H010216267
H010216267H010216267
H010216267
 
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport BusIRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
IRJET - An E-Ticket Application with Location Tracking for Public Transport Bus
 
Digital Payments
Digital PaymentsDigital Payments
Digital Payments
 
Magnetic stripe on the back of credit card
Magnetic stripe on the back of credit cardMagnetic stripe on the back of credit card
Magnetic stripe on the back of credit card
 
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...
Vietnam E-commerce report 2013 VECITA - Báo cáo Thương mại điện tử 2013 (Tiến...
 
project_report
project_reportproject_report
project_report
 
2909460 U M L D I A G R A M S B A N K M A N A G E M E N T
2909460  U M L  D I A G R A M S B A N K  M A N A G E M E N T2909460  U M L  D I A G R A M S B A N K  M A N A G E M E N T
2909460 U M L D I A G R A M S B A N K M A N A G E M E N T
 
Novel Approach for Card Payment
Novel Approach for Card PaymentNovel Approach for Card Payment
Novel Approach for Card Payment
 
Cm35495498
Cm35495498Cm35495498
Cm35495498
 
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
Analysis of Applicability of ISO 9564 PIN based Authentication to Closed-Loop...
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKERANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
ANDROID SUB-URBAN RAILWAY TICKETING USING GPS AS TICKET CHECKER
 
AN APPROACH FOR RFID TICKETING USED FOR PERSONAL NAVIGATOR FOR A PUBLIC TRANS...
AN APPROACH FOR RFID TICKETING USED FOR PERSONAL NAVIGATOR FOR A PUBLIC TRANS...AN APPROACH FOR RFID TICKETING USED FOR PERSONAL NAVIGATOR FOR A PUBLIC TRANS...
AN APPROACH FOR RFID TICKETING USED FOR PERSONAL NAVIGATOR FOR A PUBLIC TRANS...
 

Viewers also liked

O Egipto A Grande CivilizaçãO Do Nilo
O Egipto A Grande CivilizaçãO Do NiloO Egipto A Grande CivilizaçãO Do Nilo
O Egipto A Grande CivilizaçãO Do Niloguestfe54e6
 
Ana aula r. formação 01-7-eatic- lousã-apresentação trabalho individual final
Ana aula r.    formação 01-7-eatic- lousã-apresentação trabalho individual finalAna aula r.    formação 01-7-eatic- lousã-apresentação trabalho individual final
Ana aula r. formação 01-7-eatic- lousã-apresentação trabalho individual finalapoajams
 
Moda Praia para Mulheres Maduras
Moda Praia para Mulheres MadurasModa Praia para Mulheres Maduras
Moda Praia para Mulheres MadurasKarina Molin
 
Fotos Grupo CCM_2009
Fotos Grupo CCM_2009Fotos Grupo CCM_2009
Fotos Grupo CCM_2009Falec
 

Viewers also liked (20)

Cn4201601604
Cn4201601604Cn4201601604
Cn4201601604
 
Dg4201725728
Dg4201725728Dg4201725728
Dg4201725728
 
Dh4201729733
Dh4201729733Dh4201729733
Dh4201729733
 
Is3515091514
Is3515091514Is3515091514
Is3515091514
 
Ix3515341540
Ix3515341540Ix3515341540
Ix3515341540
 
Ja3515591563
Ja3515591563Ja3515591563
Ja3515591563
 
Iw3515281533
Iw3515281533Iw3515281533
Iw3515281533
 
Iv3515241527
Iv3515241527Iv3515241527
Iv3515241527
 
Jg3515961599
Jg3515961599Jg3515961599
Jg3515961599
 
C41032125
C41032125C41032125
C41032125
 
Ab4103161168
Ab4103161168Ab4103161168
Ab4103161168
 
R4102144151
R4102144151R4102144151
R4102144151
 
L41028287
L41028287L41028287
L41028287
 
Ib3614041408
Ib3614041408Ib3614041408
Ib3614041408
 
Hz3613951397
Hz3613951397Hz3613951397
Hz3613951397
 
O Egipto A Grande CivilizaçãO Do Nilo
O Egipto A Grande CivilizaçãO Do NiloO Egipto A Grande CivilizaçãO Do Nilo
O Egipto A Grande CivilizaçãO Do Nilo
 
Ana aula r. formação 01-7-eatic- lousã-apresentação trabalho individual final
Ana aula r.    formação 01-7-eatic- lousã-apresentação trabalho individual finalAna aula r.    formação 01-7-eatic- lousã-apresentação trabalho individual final
Ana aula r. formação 01-7-eatic- lousã-apresentação trabalho individual final
 
Moda Praia para Mulheres Maduras
Moda Praia para Mulheres MadurasModa Praia para Mulheres Maduras
Moda Praia para Mulheres Maduras
 
Fotos Grupo CCM_2009
Fotos Grupo CCM_2009Fotos Grupo CCM_2009
Fotos Grupo CCM_2009
 
Ecr forum 2010
Ecr forum 2010Ecr forum 2010
Ecr forum 2010
 

Similar to D42032426

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machineijsrd.com
 
Train ticketing system using smartcard
Train ticketing system using smartcardTrain ticketing system using smartcard
Train ticketing system using smartcardeSAT Publishing House
 
E03406032034
E03406032034E03406032034
E03406032034theijes
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operationsAnil Chaurasiya
 
SRS for banking system requirement engineer.ppt
SRS for banking system requirement engineer.pptSRS for banking system requirement engineer.ppt
SRS for banking system requirement engineer.pptubaidullah75790
 
SRS for banking system requirement s.ppt
SRS for banking system requirement s.pptSRS for banking system requirement s.ppt
SRS for banking system requirement s.pptubaidullah75790
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 

Similar to D42032426 (20)

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Design.pptx
Design.pptxDesign.pptx
Design.pptx
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
E010313141
E010313141E010313141
E010313141
 
40120140501002
4012014050100240120140501002
40120140501002
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
IRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing SytemIRJET - Smartcard based Grocerydispensing Sytem
IRJET - Smartcard based Grocerydispensing Sytem
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
Train ticketing system using smartcard
Train ticketing system using smartcardTrain ticketing system using smartcard
Train ticketing system using smartcard
 
E03406032034
E03406032034E03406032034
E03406032034
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
Atm technology and operations
Atm technology and operationsAtm technology and operations
Atm technology and operations
 
SRS for banking system requirement engineer.ppt
SRS for banking system requirement engineer.pptSRS for banking system requirement engineer.ppt
SRS for banking system requirement engineer.ppt
 
SRS for banking system requirement s.ppt
SRS for banking system requirement s.pptSRS for banking system requirement s.ppt
SRS for banking system requirement s.ppt
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

D42032426

  • 1. R. Swaminathan Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26 RESEARCH ARTICLE www.ijera.com OPEN ACCESS Elimination of Unauthorized and Fraudulent Transactions of ATM Using Image Processing Techniques R. Swaminathan Dept of Computer Science, Urumu Dhanalakshmi College, Trichy –19, Tamil Nadu. Abstract Chip and Magnetic stripe are the types of technologies embedded on debit, credit and ATM cards in order to store the payment information. This paper mainly deals with the magnetic stripe technology and proposes techniques that can be used to eliminate unauthorized and fraudulent transactions of ATM, Automated Teller Machine. The techniques that this paper proposes such as Attaching a ThumbReader on an ATM to get an impression of the left-thumb from the person who has inserted his card into the slot to access the ATM, Adding the details of the impression of the left-thumb of an ATM card holder to the magnetic strip embedded on the card, and making the ATM capable of comparing the impression of the left-thumb scanned by ThumbReader attached on the ATM, with an impression embedded on the ATM-card using image processing techniques. Keywords: CardReader,Fraudulent transaction, Magneticstripe, ThumbReader,Unauthorized transaction, I. Introduction The smart card [card with a chip] and its usage came into practice in the year 1968. But most banking organizations still rely on magnetic stripe card because of its low-cost production. That is why, this paper deals only with magnetic stripe technology. Even though the scientific technology has reached a significant development, there is no sufficient tool in order to protect the money placed on the ATM from unauthorized and fraudulent transactions. There is a considerable difference between unauthorized and fraudulent transaction of ATM. Unauthorized access of ATM means that an ATM-card holder may give the card to the third party to withdraw the amount from the cardholder account through ATM. Even though this transaction is done with knowledge of the ATM-card holder, it is treated as an unauthorized transaction. Fraudulent transaction means that the transaction that is carried out without a proper ATM card and a proper permission from the ATM card holder, which means that a person withdraws amount from other’s bank account with a duplicate card and without their knowledge. These two types of transaction can be fully removed if the banking organization follows the following proposals suggested by this paper.  A ThumbReader needs to be attached on an ATM to get an impression of the left-thumb from the person who has inserted his card into the slot to access the ATM.  The details of the impression of the left-thumb of an ATM card holder need to be added to the magnetic stripe embedded on the card. www.ijera.com  The ATM needs to be made capable of comparing the impression of the left-thumb scanned by the ThumbReader attached on the ATM, with an impression embedded on the ATM-card using image processing techniques. II. Parts of an existing ATM-card [Debit card and Credit Card] 2.1 Magnetic stripe The information printed on the front side of the card [Debit, Credit and ATM Cards] is humanreadable. Fig 1: Back portion of the card a) Magnetic Stripe b) Card Verification Value c) Signature Bar On the other hand, the back side of the card contains both human-readable and machine-readable information. The information that is non-readable by human stored on a magnetic stripe. The magnetic stripe comprises three tracks in it. The storage limit of the first, second and the third track is 210 BPI density [Bytes per Inch], 75 BPI density and 210 BPI 24 | P a g e
  • 2. R. Swaminathan Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26 density respectively. The general structure of a magnetic stripe is as follow |----------------------------| Track 1 210 BPI density |----------------------------| Track 2 75 BPI density |----------------------------| Track 3 10 BPI density |----------------------------| Only Track 1 and Track 2 are used by the payment industry. Track data is defined by international standards and is the same for all types of card Track 1 |-------------------------------------------------------| 1 2 3 4 < = 19Digits ^ 2-26 characters ^ YYMM ^ 3 Digits |-------------------------------------------------------|  The first column represents the primary account number, known as the card number, which plays an important element in identifying a customer.  The second column represents the name of the card holder. Like the card number, it is also embedded on the front as well as on the back side of the card.  The third column represents the expiration date of the card and it is stored in the form of YYMM.  The fourth column represents the service code. Track 2 |-----------------------------------------------------| 1 2 3 < = 19Digits ^ YYMM ^ 3Digits |------------------------------------------------------| It may be for the purpose of avoiding the creation of counterfeit card and fraudulent transactions, the information stored on column 1, column 3 and column 4 of track 1 are repeated in the column 1 and column 2 and column 3 of track 2. Track 3 |--------------------------------------------------| |--------------------------------------------------|  The track 3 of the existing magnetic stripe does not have any data within it. 2.2 Card verification value This is a unique number, which is to be used whenever the card needs to be used to make purchases over the Internet. www.ijera.com www.ijera.com 2.3 Signature bar A customer has to sign on the bar as soon as the card is received to protect it against fraud. III. Magnetic stripe of the proposed card In addition to the information of the existing magnetic stripe, the proposed magnetic stripe contains the impression of the left thumb of the cardholder, which means that the proposed card contains three tracks of which the first two tracks follow the methodology used by the existing card and the third track follows the structure given below. Track 3 |-----------------------------------------------------| 1 2 3 |------------------------------------------------------| The track 3 of magnetic stripe of the proposed card contains three columns all of which comprise the details of the left thumb of the card holder. In order to avoid fraudulent transactions these three columns contain the same details. IV. Parts of the proposed ATM Fig : ATM with a ThumbReader 4.1 CardReader The following steps to be followed by the CardReader  Read the information stored on the magnetic stripe embedded on the ATM card.  Pass the details stored on the track 3 to the ThumbReader to compare the thumb impression.  Get the information from the ThumbReader.  Disallow the user to do the further transaction if the information passed by the ThumbReader contains ‘invalid’.  Allow the user to do the further transaction if the information passed by the ThumbReader contains ‘valid’. 4.2 ThumbReader The Thumb Reader performs operations which include the following three 25 | P a g e
  • 3. R. Swaminathan Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 4, Issue 2( Version 3), February 2014, pp.24-26     Gets an impression of the left-thumb of the ATM user. Determines whether the pattern of ridges and valleys of the impression obtained by itself matches the pattern of ridges and valley in the image captured by the CardReader. Passes ‘valid’ to the CardReader if there is no contradiction between the image captured by CardReader and the image captured by ThumbReader. Passes ‘invalid’ to the CardReader if there is any contradiction between the image captured by CardReader and the image captured by ThumbReader. Every fingerprint has some unique characteristics, which need to be filtered and converted into an encrypted biometric or a mathematical representation. VI. V. References [1] [3] Operations of the proposed ATM Pseudo-code Input Card and left-thumb finger Process If Expiration date of the card<= current date and left-thumb finger = Details of left-thumb finger stored on the magnetic stripe then Allow to enter ‘pin-number’ if pin-number = ‘valid’ then Allow ‘transactions’ Else Not allow ‘ transactions’ End if Else Not accept ‘pin-number’ End if www.ijera.com Conclusion Banking Organizations follow magnetic stripe technology rather than Chip based card. Nowadays a lot of fraudulent ATM transactions take place because it is easy to duplicate a magnetic stripe card. There are two ways to eliminate such type of transactions. The one way is to switch over to smart card. The other way is to make some advancement on the existing magnetic stripe card. The paper describes an advancement that can be implemented on the existing magnetic stripe card. This advancement would be very useful not only in reducing but also in eliminating the unauthorized and fraudulent transactions of ATM. [2] Fig: Mathematical representation of a thumb finger www.ijera.com [4] [5] Identifying the quality of tomatoes in images processing using matlab, R.Kalaivani, Dr.S. Muruganand, Dr.Azha.Periasamy, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, Vol. 2, Issue 8, August 2013. Image mining of textual images using lowlevel image features, prof. Mrs. Sushma andgaonkar, Mr. Rahul Jagtap, Mr. Pramod Anarase, Mr. Balaji Khadake, Mr. Akshay Betale, IEEE,2010. Efficient Image Mining using feature content based image retrieval system, Rajshree Dubey, Rajnish Choubey, Sanjeev Dubey, International journal of Advanced computer engineering and architecture, vol 1, no1, june 2011. Image clustering and retrieval using image mining techniques, A. Kannan, Dr.V.Mohan, Dr. N. Anbazhagan, IEEE,2010. An efficient technique using text & content base image mining technique for image retrieval, Mahip M. Bartere, Dr. Prashant, R.Deshmukh, IJERA, 2012. 26 | P a g e