SlideShare a Scribd company logo
1 of 4
Download to read offline
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 672
Security for Building & ATM Machine
Anjali Jaiswal1, Nawaz Kapadia2, Adarsh Goyal3, Aman Wadia4, Poonam Vengurlekar5
1,2,3,4Dept. of Computer Engineering, Thakur Polytechnic Kandivali, Maharashtra, INDIA.
5Poonam Vengurlekar, Dept. of Computer Engineering, Thakur Polytechnic , Maharashtra, INDIA.
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract- Better and Protective security is the need in
today’s world at the places such as buildings and ATM
machines. There are many drawbacks of using the debit
card at ATM machine so to overcome this we are
implementing the Withdrawl & Deposits through Aadhar
Verification. Since every ATM room has a CCTV camera
installed so if the theft takes place we can get the details of
the person since he entered the room through aadhar
verification. To secure the entrance of the society so that
no outsider can enter the society without verifying himself
through aadhar verification.
Biometric system is a identification system that recognizes
an individual by determining that person. Fingerprint is
dependable biometric trait as it is dedicated. It is a
technology that is increasingly used in various fields like
forensics and for the security purpose. The main objective
of our system is to make ATM transaction more secure
using aadhar no and user friendly. This system replaces
traditional ATM cards with fingerprint. Therefore, ATM
cards will be replaced by the biometric verification
through aadhar.The money transaction can be made more
secure without worrying about the card to be lost. In our
system we are using embedded system with biometrics i.e
r305 sensor and Arduino uno microcontroller. The
Fingerprint and the name of all users are stored in the
database. Fingerprints are used to identify whether the
Person is genuine and to protect ATM frauds.
Keywords—Security for buildings, Security for ATM
machine’s, Secure way to protect buildings & ATM
machine.
1. INTRODUCTION
In building there is the provision of entering the details
which is also called as manual security but in manual
security there is lot of disadvantages such as lack of
security proof, unethical practices , lack of details &
Same in the ATM user have to enter all of his details to
transect money for ATM machine so sometimes there
may happen crimes so ,to overcome this problem we
have come up with the project which is the combination
of both software and hardware in this project we are
going to use some of the important hardware and
software devices like biometric scanner, Aadhar number
verification & mobile verification through otp and all this
information will be stored in the master database.
Which means whenever the outsider/guest is entering
the building for the first time he/she have to properly
follow all this steps. Once he has followed all the steps
then the guard will allow him/her to go in the building
this is for building. & same is for ATM machine also
he/she have to enter his/her details for verification
purposes. suppose if the person is disabled he/she can
only verify there mobile number through otp and they
can go inside the ATM machine and in the building.
Biometric system is a identification system that
recognizes an individual by determining that person.
Fingerprint is dependable biometric trait as it is
dedicated. It is a technology that is increasingly used in
various fields like forensics and for the security
purpose. The main objective of our system is to make
ATM transaction more secure using aadhar no and user
friendly. This system replaces traditional ATM cards
with fingerprint. Therefore, ATM cards will be replaced
by the biometric verification through aadhar. The money
transaction can be made more secure without worrying
about the card to be lost. In our system we are using
embedded system with biometrics i.e r305 sensor and
Arduino uno microcontroller. The Fingerprint and the
name of all users are stored in the database. Fingerprints
are used to identify whether the Person is genuine and to
protect ATM frauds.
A Fingerprint scanner is used to acquire the finger print
of the individual, after which the system requests for the
OTP (One Time Password). If the fingerprints do not
match further authentication will not be proceeded
further for the process, it will return back to reenter the
aadhar number. After the verification is completed the
data will be stored in the system database, the user is
authenticated further to make transactions.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 673
Data collection unit: The most important requirement
for this stage is of an optical sensor i.e. r305optical
scanner. The fingerprints of the user will be stored in
this unit. This unit adds a fingerprint of the user to
database unit and further returns a byte every newly
added user/customer. The return values range from
0x00 to 0xFE. The return code is 0xFF i.e. error executing
function in case when there is an error, i.e. no finger is
placed on the sensor.
Image preprocessing unit: As the input is taken by the
scanner as image preprocessing is done on the image in
the scanner during the processing time, and the image is
tested in the form of analog that is converted into digital
form and if the quality of the preprocessed image is
sufficient then the image is converted into the template.
Data storage unit: Each preprocessed image is of
certain default template size i.e. approximately 512 bytes
per template and the template will be stored into the
database for further use. This unit allows the user to
store the fingerprint data in the module and further
configure it in next mode for storing an individual’s
fingerprint.
Search unit: As a finger is placed on the fingerprint
sensor the search function will be called. The existing
memory is then checked and returns a matching name of
the customer if found.
Decision unit: This system compares the input image
with the stored images of the database. The database
image is stored after several processes, so it would be
easier during the next transaction. Stored template and
test image is compared and the needed resolution of the
test image will be 500dpi (dot per inch) by default. When
the image comparison gets satisfied, then the user of the
input is an authorized user and will be allowed to make
further transactions.
Transaction unit: if the decision making unit authorizes
the user then the transaction is successfully carried out
further Truncate function: This function is used to clear
the database containing fingerprints and the other
information stored in it. After executing this function,
you will get following as message: 0xCC if operation was
successful.0xFF in case of error. There are various ways
to authenticate the biometric data feed. Combination of
biometric data along with the otp number is used to
increase the security. Since the biometric data cannot be
stolen or forget, the transaction would be safe
and secured. The transaction time of the proposed
system is about 15 seconds.
The concepts of Cryptography and Steganography are
known used in fingerprint based ATM system, they
intend to use the finger print image captured by the
fingerprint scanner as the BASE image and get the data
and will stored it in the database. Using the concept of
Steganography, they hide the AES256 encrypted code
(OTP) inside the fingerprint image.
2. REQUIREMENT ANALYSIS
There will be a several types of devices like in hardware
we will need 1) Biometric scanner for finger print
2)Arduino-UNO 3)DOT NET language for Front end
4)SQL server for Back end
Software requirement:- DOT NET Language, Arduino
UNO knowledge, SQL Database knowledge
A. Abbreviations and Acronyms
● IOT:- Internet of things
● ATM machine:- Automated Teller Machine
● SQL:-standardized query language
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 674
● DPI-Dot Per Inch
● OTP-One Time Password
B. Further Improvement
1. we can implement retinas scanner for proper
security purpose
2. To achieve full time automation, A real time
system should be employed and a Closed Circuit
Television (CCTV) system that should provide
for proper monitoring and security purpose in
the building and the ATM machines.
3. OBJECTIVE
The main objective of the system is that reducing the
theft that is taken place in the ATM room and in the
buildings.
● The members leaving in the society will be
secured.
● The ATM machines will be more secured.
● One cannot enter the room or in a building
before the verification process is completed and
the person is successfully verified to enter.
● As the transaction is completed one has to
logout the user interface before exiting the ATM
room.
● One can view the transactions made throughout
a month using the feature of Mini Statement.
● E-receipt of the transactions made throughout a
month can be generated on the Mail at the end
of every month.
● One can invest in the investments using the
investment feature of the ATM interface.
● To propose authentication and verification
process on the existing, ATM machine to make a
successful and secure transaction. The main
objective of this project is to provide fingerprint
as authorized identity and to design a more
secure ATM system .In this, ATM machine work
as when the customer place finger on biometric
scanner of ATM and if the finger match is found
it will display the name of customer on ATM
machine. If Fingerprint match not found, it does
not allow any transaction. The objective of this
study is as follow:-
● 1. To propose the authentication system on the
existing ATM process for withdrawal after the
entry of a correct otp.
● 2. In second level authentication system in a
scenario where customer specified withdrawal
limit. 1. To propose the authentication system
on the existing ATM process for withdrawal
after the entry of a correct otp.
● 3. To propose second level authentication
system in a scenario where customer specified
withdrawal limit.
LIMITATION
 The limitations of IOT in extreme situation are
still not tested.
 Legal instruments.
 limited facilities for real-time information
exchange
 limited facilities for real-time information
exchange
4. CONCLUSIONS
As the person come at the ATM room he has to get
himself verified through aadhar to enter in the ATM
room to use the features of ATM interface such as
Withdrawls, Deposits, Topup, Investments, Opening a
new account, Mini Statements & etc. and for building also
the person have to enter all him/her details to enter in
the system because of security purpose to fully secure
the building for any unethical behaviour & robbery
guidelines to prepare the project Security for ATM &
building.
It is essential that to first understand the basic of a
biometric based security system. The implementation of
ATM security system by using biometric method it is
very important method. As well as very challenging and
difficult. But for security purpose or control the criminal
records it is very important to that produce this method.
I think for future work it will implement also various
technologies such that unique cards or any other
method.
ACKNOWLEDGEMENT
Thanks to Mrs. Vaishali Rane the HOD of Computer
Department of Thakur Polytechnic to give us the
opportunity to work on this project under the guidance
of Mrs. Poonam Vengurlekar.
REFERENCES
[1]https://www.ijser.org/onlineResearchPaperViewer.a
spx?Fingerprint-Authentication-Security-An-
Improved-2-Step-Authentication-Method-with-
Flexibility.pdf
[2]https://www.buildings.com/article-
details/articleid/20606/tie/9-keys-to-building-security
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 675
[3]https://en.wikipedia.org/wiki/Retinal_scan
[4] Dr. V. Vijayalakshmi, R.Divya and K. Jaganath, ”Finger
and Palm print based Multibiometric Authentication
System with GUI Interface” International conference on
Communication and Signal Processing, April 3-5, 2013,
India, 978-1- 4673-4866-9/13/$31.00 ©2013 IEEE.
[5] O.A.Esan and S.M.Ngwira “Bimodal Biometrics for
Financial Infrastructure Security” I.O.Osunmakinde
School of Computings, College of Science,
Engineeringand Technology, University of South Africa,
UNISA Pretoria, South Africa, 978-1-4799- 0808-
0/13/$31.00 ©2013 IEEE.
[6] Rishigesh Murugesh, “ADVANCED BIOMETRIC ATM
MACHINE WITH AES 256 AND
STEGANOGRAPHYIMPLEMENTATION”, IEEEFourth
International Conference on Advanced Computing,
ICoAC 2012 MIT, Anna University,Chennai. December
13-15, 2012, 978-1- 4673-5584- 1/12/$31.00©2012
IEEE.
[7] Rajesh. V and Vishnupriya. S, ”IBIO-A New
Approach/or ATM Banking System” 2014 International
Conference on Electronics and Communication Systems
(ICECS-2014), Feb.13-14, 2014, Coimbatore, INDIA.
[8] G. Renee Jebaline and S. Gomathi , “A Novel Method to
Enhance the Security of ATM using Biometrics” , 2015
International Conference on Circuit, Power and
Computing Technologies [ICCPCT], 978-1- 4799-7075-
9/15/$31.00 ©2015 IEEE
BIOGRAPHIES
ANJALI JAISWAL
Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.
NAWAZ KAPADIA
Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.
ADARSH GOYAL
Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.
AMAN WADIA
Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.
POONAM VENGURLEKAR
Faculty, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.

More Related Content

What's hot

FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREMichael George
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
Project Synopsis
Project SynopsisProject Synopsis
Project SynopsisParas Garg
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET Journal
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET Journal
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET Journal
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET Journal
 
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET Journal
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting SystemIRJET Journal
 

What's hot (20)

C132733
C132733C132733
C132733
 
journal
journaljournal
journal
 
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTUREFINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
FINGERPRINT BASED LOCKER WITH IMAGE CAPTURE
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
IRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNOIRJET- Automatic Irrigation System using Arduino UNO
IRJET- Automatic Irrigation System using Arduino UNO
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
IRJET- Design and Implementation of Fingerprint based Bank Locker System usin...
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
project_report
project_reportproject_report
project_report
 
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized KeyIRJET-  	  Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
IRJET- Sixth Sense Hand-Mouse Interface using Gestures & Randomized Key
 
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print SensorIRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
IRJET- Electronic Voting Machine (EVM) using Finger-Print Sensor
 
F04502031039
F04502031039F04502031039
F04502031039
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Presentation iot
Presentation iotPresentation iot
Presentation iot
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Online Voting System
Online Voting SystemOnline Voting System
Online Voting System
 

Similar to IRJET- Security for Building & ATM Machine

CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security SolutionIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIJTET Journal
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMIRJET Journal
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 

Similar to IRJET- Security for Building & ATM Machine (20)

CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
IRJET- Advance ATM Security Solution
IRJET-  	  Advance ATM Security SolutionIRJET-  	  Advance ATM Security Solution
IRJET- Advance ATM Security Solution
 
N044057478
N044057478N044057478
N044057478
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Irjet v7 i3284
Irjet v7 i3284Irjet v7 i3284
Irjet v7 i3284
 
ADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEMADVANCE ATM SECURITY SYSTEM
ADVANCE ATM SECURITY SYSTEM
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

IRJET- Security for Building & ATM Machine

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 672 Security for Building & ATM Machine Anjali Jaiswal1, Nawaz Kapadia2, Adarsh Goyal3, Aman Wadia4, Poonam Vengurlekar5 1,2,3,4Dept. of Computer Engineering, Thakur Polytechnic Kandivali, Maharashtra, INDIA. 5Poonam Vengurlekar, Dept. of Computer Engineering, Thakur Polytechnic , Maharashtra, INDIA. ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract- Better and Protective security is the need in today’s world at the places such as buildings and ATM machines. There are many drawbacks of using the debit card at ATM machine so to overcome this we are implementing the Withdrawl & Deposits through Aadhar Verification. Since every ATM room has a CCTV camera installed so if the theft takes place we can get the details of the person since he entered the room through aadhar verification. To secure the entrance of the society so that no outsider can enter the society without verifying himself through aadhar verification. Biometric system is a identification system that recognizes an individual by determining that person. Fingerprint is dependable biometric trait as it is dedicated. It is a technology that is increasingly used in various fields like forensics and for the security purpose. The main objective of our system is to make ATM transaction more secure using aadhar no and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, ATM cards will be replaced by the biometric verification through aadhar.The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and Arduino uno microcontroller. The Fingerprint and the name of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine and to protect ATM frauds. Keywords—Security for buildings, Security for ATM machine’s, Secure way to protect buildings & ATM machine. 1. INTRODUCTION In building there is the provision of entering the details which is also called as manual security but in manual security there is lot of disadvantages such as lack of security proof, unethical practices , lack of details & Same in the ATM user have to enter all of his details to transect money for ATM machine so sometimes there may happen crimes so ,to overcome this problem we have come up with the project which is the combination of both software and hardware in this project we are going to use some of the important hardware and software devices like biometric scanner, Aadhar number verification & mobile verification through otp and all this information will be stored in the master database. Which means whenever the outsider/guest is entering the building for the first time he/she have to properly follow all this steps. Once he has followed all the steps then the guard will allow him/her to go in the building this is for building. & same is for ATM machine also he/she have to enter his/her details for verification purposes. suppose if the person is disabled he/she can only verify there mobile number through otp and they can go inside the ATM machine and in the building. Biometric system is a identification system that recognizes an individual by determining that person. Fingerprint is dependable biometric trait as it is dedicated. It is a technology that is increasingly used in various fields like forensics and for the security purpose. The main objective of our system is to make ATM transaction more secure using aadhar no and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, ATM cards will be replaced by the biometric verification through aadhar. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and Arduino uno microcontroller. The Fingerprint and the name of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine and to protect ATM frauds. A Fingerprint scanner is used to acquire the finger print of the individual, after which the system requests for the OTP (One Time Password). If the fingerprints do not match further authentication will not be proceeded further for the process, it will return back to reenter the aadhar number. After the verification is completed the data will be stored in the system database, the user is authenticated further to make transactions.
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 673 Data collection unit: The most important requirement for this stage is of an optical sensor i.e. r305optical scanner. The fingerprints of the user will be stored in this unit. This unit adds a fingerprint of the user to database unit and further returns a byte every newly added user/customer. The return values range from 0x00 to 0xFE. The return code is 0xFF i.e. error executing function in case when there is an error, i.e. no finger is placed on the sensor. Image preprocessing unit: As the input is taken by the scanner as image preprocessing is done on the image in the scanner during the processing time, and the image is tested in the form of analog that is converted into digital form and if the quality of the preprocessed image is sufficient then the image is converted into the template. Data storage unit: Each preprocessed image is of certain default template size i.e. approximately 512 bytes per template and the template will be stored into the database for further use. This unit allows the user to store the fingerprint data in the module and further configure it in next mode for storing an individual’s fingerprint. Search unit: As a finger is placed on the fingerprint sensor the search function will be called. The existing memory is then checked and returns a matching name of the customer if found. Decision unit: This system compares the input image with the stored images of the database. The database image is stored after several processes, so it would be easier during the next transaction. Stored template and test image is compared and the needed resolution of the test image will be 500dpi (dot per inch) by default. When the image comparison gets satisfied, then the user of the input is an authorized user and will be allowed to make further transactions. Transaction unit: if the decision making unit authorizes the user then the transaction is successfully carried out further Truncate function: This function is used to clear the database containing fingerprints and the other information stored in it. After executing this function, you will get following as message: 0xCC if operation was successful.0xFF in case of error. There are various ways to authenticate the biometric data feed. Combination of biometric data along with the otp number is used to increase the security. Since the biometric data cannot be stolen or forget, the transaction would be safe and secured. The transaction time of the proposed system is about 15 seconds. The concepts of Cryptography and Steganography are known used in fingerprint based ATM system, they intend to use the finger print image captured by the fingerprint scanner as the BASE image and get the data and will stored it in the database. Using the concept of Steganography, they hide the AES256 encrypted code (OTP) inside the fingerprint image. 2. REQUIREMENT ANALYSIS There will be a several types of devices like in hardware we will need 1) Biometric scanner for finger print 2)Arduino-UNO 3)DOT NET language for Front end 4)SQL server for Back end Software requirement:- DOT NET Language, Arduino UNO knowledge, SQL Database knowledge A. Abbreviations and Acronyms ● IOT:- Internet of things ● ATM machine:- Automated Teller Machine ● SQL:-standardized query language
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 674 ● DPI-Dot Per Inch ● OTP-One Time Password B. Further Improvement 1. we can implement retinas scanner for proper security purpose 2. To achieve full time automation, A real time system should be employed and a Closed Circuit Television (CCTV) system that should provide for proper monitoring and security purpose in the building and the ATM machines. 3. OBJECTIVE The main objective of the system is that reducing the theft that is taken place in the ATM room and in the buildings. ● The members leaving in the society will be secured. ● The ATM machines will be more secured. ● One cannot enter the room or in a building before the verification process is completed and the person is successfully verified to enter. ● As the transaction is completed one has to logout the user interface before exiting the ATM room. ● One can view the transactions made throughout a month using the feature of Mini Statement. ● E-receipt of the transactions made throughout a month can be generated on the Mail at the end of every month. ● One can invest in the investments using the investment feature of the ATM interface. ● To propose authentication and verification process on the existing, ATM machine to make a successful and secure transaction. The main objective of this project is to provide fingerprint as authorized identity and to design a more secure ATM system .In this, ATM machine work as when the customer place finger on biometric scanner of ATM and if the finger match is found it will display the name of customer on ATM machine. If Fingerprint match not found, it does not allow any transaction. The objective of this study is as follow:- ● 1. To propose the authentication system on the existing ATM process for withdrawal after the entry of a correct otp. ● 2. In second level authentication system in a scenario where customer specified withdrawal limit. 1. To propose the authentication system on the existing ATM process for withdrawal after the entry of a correct otp. ● 3. To propose second level authentication system in a scenario where customer specified withdrawal limit. LIMITATION  The limitations of IOT in extreme situation are still not tested.  Legal instruments.  limited facilities for real-time information exchange  limited facilities for real-time information exchange 4. CONCLUSIONS As the person come at the ATM room he has to get himself verified through aadhar to enter in the ATM room to use the features of ATM interface such as Withdrawls, Deposits, Topup, Investments, Opening a new account, Mini Statements & etc. and for building also the person have to enter all him/her details to enter in the system because of security purpose to fully secure the building for any unethical behaviour & robbery guidelines to prepare the project Security for ATM & building. It is essential that to first understand the basic of a biometric based security system. The implementation of ATM security system by using biometric method it is very important method. As well as very challenging and difficult. But for security purpose or control the criminal records it is very important to that produce this method. I think for future work it will implement also various technologies such that unique cards or any other method. ACKNOWLEDGEMENT Thanks to Mrs. Vaishali Rane the HOD of Computer Department of Thakur Polytechnic to give us the opportunity to work on this project under the guidance of Mrs. Poonam Vengurlekar. REFERENCES [1]https://www.ijser.org/onlineResearchPaperViewer.a spx?Fingerprint-Authentication-Security-An- Improved-2-Step-Authentication-Method-with- Flexibility.pdf [2]https://www.buildings.com/article- details/articleid/20606/tie/9-keys-to-building-security
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 07 ISSUE: 02 | FEB 2020 WWW.IRJET.NET P-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 675 [3]https://en.wikipedia.org/wiki/Retinal_scan [4] Dr. V. Vijayalakshmi, R.Divya and K. Jaganath, ”Finger and Palm print based Multibiometric Authentication System with GUI Interface” International conference on Communication and Signal Processing, April 3-5, 2013, India, 978-1- 4673-4866-9/13/$31.00 ©2013 IEEE. [5] O.A.Esan and S.M.Ngwira “Bimodal Biometrics for Financial Infrastructure Security” I.O.Osunmakinde School of Computings, College of Science, Engineeringand Technology, University of South Africa, UNISA Pretoria, South Africa, 978-1-4799- 0808- 0/13/$31.00 ©2013 IEEE. [6] Rishigesh Murugesh, “ADVANCED BIOMETRIC ATM MACHINE WITH AES 256 AND STEGANOGRAPHYIMPLEMENTATION”, IEEEFourth International Conference on Advanced Computing, ICoAC 2012 MIT, Anna University,Chennai. December 13-15, 2012, 978-1- 4673-5584- 1/12/$31.00©2012 IEEE. [7] Rajesh. V and Vishnupriya. S, ”IBIO-A New Approach/or ATM Banking System” 2014 International Conference on Electronics and Communication Systems (ICECS-2014), Feb.13-14, 2014, Coimbatore, INDIA. [8] G. Renee Jebaline and S. Gomathi , “A Novel Method to Enhance the Security of ATM using Biometrics” , 2015 International Conference on Circuit, Power and Computing Technologies [ICCPCT], 978-1- 4799-7075- 9/15/$31.00 ©2015 IEEE BIOGRAPHIES ANJALI JAISWAL Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA. NAWAZ KAPADIA Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA. ADARSH GOYAL Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA. AMAN WADIA Student, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA. POONAM VENGURLEKAR Faculty, Dept. of Computer Engineering, Thakur Polytechnic, Kandivali, Maharashtra, INDIA.