SlideShare a Scribd company logo
1 of 18
BIOMETRIC
ATM.
AGENDA
Introduction​.
Current Authentication Systems.
​Issues in current ATM networks.
Biometric ATMs solve these issues.
Biometric System.
Various Biometric Systems.
INTRODUCTION
3
Biometrics refers to the automatic identification of a
person based on his physiological/behavioral
characteristics.
Various types of biometric systems are being used
for real time identification most popular are based on
face recognition and finger print matching.
Most of the ATM in the past have been using ID
cards to identify users but with the wide acceptance
of Biometrics a new generation of Biometrics ATM
are being deployed for wide range of applications
worldwide.
Biometrics based authentication is a potential
candidate to replace password-based authentication.
CURRENT AUTHENTICATION
SYSTEM
ISSUE IN CURRENT ATM
NETWORK
Presentation title 5
ATM Card frauds .
Use of ATM card duplicators.
Card sharing by family and friends .
Inability to trace the wrongful users .
ATM PINs can be shared on phone or recorded using secret cameras
WHY TO USE BIOMETRIC ATM ?
Provides strong authentication.
Can be used instead of a PIN .
Hidden costs of ATM card management like card
personalization, delivery, management, re-issuance, PIN
generation, help-desk, and re- issuance can be avoided .
Ideal for Indian rural masses.
It is accurate .
Flexible account access allows clients to access their
accounts at their convenience.
Low operational cost of the ATMs will ultimately reduce
Total cost of ownership (TCO).
6
7
BIOMETRIC SYSTEM 8
9
Presentation title
BIOMETRIC SYSTEM 10
Presentation title
VARIOUS BIOMETRIC SYSTEM.
HAND
The three dimensional shape of a person’s hand has
several advantages as an identification device.
Scanning a hand and producing a result takes
1.2seconds.It requires little space for data storage about
9 bytes which can fit easily magnetic strip credit cards.
11
Presentation title
12
Presentation title
FINGERPRINT.
A fingerprint scanner system has two basic jobs :
It needs to get an image of your finger.
It needs to determine whether the pattern of ridges and valleys in this
image matches the pattern of ridges and valleys in pre-scanned
images.
Only specific characteristics, which are unique to every fingerprint, are
filtered and saved as an encrypted biometric key or mathematical
representation.
No image of a fingerprint is ever saved, only a series of numbers (a
binary code), which is used for verification. The algorithm cannot be
reconverted to an image, so no one can duplicate your fingerprints.
13
Presentation title
14
Presentation title
ATM’S OF THE FUTURE
Today’s biometric scanners go far beyond basic fingerprint
recognition.
In Poland and Japan, consumers are already using Hitachi's
infrared scanners that capture the unique pattern of
capillaries in the finger and hand.
The most secure biometric technology uses a device
designed to perform an iris scan based on more than 2,000
unique measurement points.
According to developers, people and pets all over the world
will be connected to a system that uses iris scan identification
within the next decade.
15
Presentation title
16
Presentation title
Biometric Reading at ATM
Machines Already in use in
Brazil.
Poland's cooperative BPS bank It's the
first in Europe to install a biometric ATM
allowing customers to withdraw cash
simply with the touch of a fingertip.
CONCLUSION
Biometric tokens are the safest means of preventing
ATM frauds.
The main reason for introducing biometric systems is to
increase overall security.
Biometrics offers greater security and convenience than
traditional methods of personal recognition.
In some applications, biometrics can replace or
supplement the existing technology. In others, it is the
only viable approach.
The biometric system is only one part of an overall
identification or authentication process, and the other
parts of that process will play an equal role in
determining its effectiveness.
17
Presentation title
THANK YOU

More Related Content

Similar to 2001229094(1).pptx biometrics authentication

project_report
project_reportproject_report
project_report
Ejaz Navas
 

Similar to 2001229094(1).pptx biometrics authentication (20)

Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
kiran's slide info
kiran's slide infokiran's slide info
kiran's slide info
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Biometric turnstile - Mairsturnstile.com
Biometric turnstile - Mairsturnstile.comBiometric turnstile - Mairsturnstile.com
Biometric turnstile - Mairsturnstile.com
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
project_report
project_reportproject_report
project_report
 
N044057478
N044057478N044057478
N044057478
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Biometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdfBiometrics in digital banking: Crucial Things to Know.pdf
Biometrics in digital banking: Crucial Things to Know.pdf
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 

2001229094(1).pptx biometrics authentication

  • 2. AGENDA Introduction​. Current Authentication Systems. ​Issues in current ATM networks. Biometric ATMs solve these issues. Biometric System. Various Biometric Systems.
  • 3. INTRODUCTION 3 Biometrics refers to the automatic identification of a person based on his physiological/behavioral characteristics. Various types of biometric systems are being used for real time identification most popular are based on face recognition and finger print matching. Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. Biometrics based authentication is a potential candidate to replace password-based authentication.
  • 5. ISSUE IN CURRENT ATM NETWORK Presentation title 5 ATM Card frauds . Use of ATM card duplicators. Card sharing by family and friends . Inability to trace the wrongful users . ATM PINs can be shared on phone or recorded using secret cameras
  • 6. WHY TO USE BIOMETRIC ATM ? Provides strong authentication. Can be used instead of a PIN . Hidden costs of ATM card management like card personalization, delivery, management, re-issuance, PIN generation, help-desk, and re- issuance can be avoided . Ideal for Indian rural masses. It is accurate . Flexible account access allows clients to access their accounts at their convenience. Low operational cost of the ATMs will ultimately reduce Total cost of ownership (TCO). 6
  • 7. 7
  • 11. VARIOUS BIOMETRIC SYSTEM. HAND The three dimensional shape of a person’s hand has several advantages as an identification device. Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards. 11 Presentation title
  • 13. FINGERPRINT. A fingerprint scanner system has two basic jobs : It needs to get an image of your finger. It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints. 13 Presentation title
  • 15. ATM’S OF THE FUTURE Today’s biometric scanners go far beyond basic fingerprint recognition. In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade. 15 Presentation title
  • 16. 16 Presentation title Biometric Reading at ATM Machines Already in use in Brazil. Poland's cooperative BPS bank It's the first in Europe to install a biometric ATM allowing customers to withdraw cash simply with the touch of a fingertip.
  • 17. CONCLUSION Biometric tokens are the safest means of preventing ATM frauds. The main reason for introducing biometric systems is to increase overall security. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness. 17 Presentation title