SlideShare a Scribd company logo
Prepared By:-
Suraksha Sanghavi
TE Computer
Roll No :- 40
Guided By :-
Prof.S.B.Ambhore
1
I. Introduction
II. ATM
III. Literature Survey
IV. Iris Recognition
V. WORKING
VI. ADVANTAGES
VII. DISADVANTAGES
VIII. CONCLUSION
IX. REFERENCES
ATM Security WITH IRIS RECOGNITION 2
ATM Security WITH IRIS RECOGNITION 3
 An automated teller machine
(ATM) is :
 Made money transactions easy for
customers to bank.
 Device that provides the customers of
a financial transactions in a public
space without the need for a bank .
 Security requiring combination
Physical access card + Password(PIN)
ATM Security WITH IRIS RECOGNITION 4
Pin
 People write PINs and disclose to others increasing the
risk of fraud and PINs can be stolen by observation
 PIN is a confidential code issued to the
cardholder to permit access to that account
 The PIN does not prove the identification of the
cardholder
ATM Security WITH IRIS RECOGNITION 5
 Finger Printing
 Facial Recognition
 Iris Recognition
ATM Security WITH IRIS RECOGNITION 6
SR.NO TECHNIQUE LIMITATION
1 Finger print It can make mistakes with the dryness
or dirty of the finger’s skin
2 Facial recognition Affected by changes in lighting
ATM Security WITH IRIS RECOGNITION 7
 Iris technology, which uses the iris pattern of
an individual as an identity proof
 In 1953 – Algorithm developed , First used by
John Daugman
 As the initiative 1st the bank had installed iris
based ATM’s inside Kroger Supermarket stores
in Houston, Dallas and Fort Worth.
ATM Security WITH IRIS RECOGNITION 8
ATM Security WITH IRIS RECOGNITION 9
 Easy to access
 Highly protected, internal organ of the eye
 Limited genetic penetrance of iris patterns
 Patterns apparently stable throughout life
 High Accuracy
ATM Security WITH IRIS RECOGNITION 10
 Costly
 The person should be present at the spot.
 Small target
 Sometimes False acceptances and rejections.
 Flash of camera should not become so bright.
ATM Security WITH IRIS RECOGNITION 11
 More reliable in providing security by using iris recognition
software.
 For scanning it required vey negligible amount of time .
 Permeant security password till end of life.
ATM Security WITH IRIS RECOGNITION 12
1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And
Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of
E&Tc , ytiet, Bhivpuri Road, Karjat
2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris
Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN,
India.
3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)”
Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and
Communication MIET, Jammu, India
4. www.biometric.com / Biometric Iris Recognition and Its Application
5. www.google.com/MyBlog:ATM with an Eye.
6. www.wikipedia.org/iris recognition
ATM Security WITH IRIS RECOGNITION 13
ATM Security WITH IRIS RECOGNITION 14

More Related Content

What's hot

an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
john juvvanapudi
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
mahesh123slideshre
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
kondalarao7
 
5 pen pc technology by divya
5 pen pc technology by divya5 pen pc technology by divya
5 pen pc technology by divya
Divya Baghel
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
jolly9293
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Money pad
Money padMoney pad
Money pad
umesh547
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Money pad report
Money pad reportMoney pad report
Money pad report
Mokshada Birari
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
Smart cards
Smart cardsSmart cards
Smart cards
jaswinderkaur144
 
Moneypad
MoneypadMoneypad
Moneypad
ankur bhalla
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
Reben Dalshad
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
Akshay Govekar
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
Mokshada Birari
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
Ketan Sawakare
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
Rituraj Singh Panwar
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
AnIsh Kumar
 
Smart note taker
Smart note taker Smart note taker
Smart note taker
Mansi Chauhan
 

What's hot (20)

an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
5 pen pc technology by divya
5 pen pc technology by divya5 pen pc technology by divya
5 pen pc technology by divya
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Money pad
Money padMoney pad
Money pad
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Money pad report
Money pad reportMoney pad report
Money pad report
 
High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
Smart cards
Smart cardsSmart cards
Smart cards
 
Moneypad
MoneypadMoneypad
Moneypad
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
Finger print based door access system
Finger print based door access systemFinger print based door access system
Finger print based door access system
 
Moneypad- The future wallet
Moneypad- The future walletMoneypad- The future wallet
Moneypad- The future wallet
 
Biometrics technology
Biometrics technology Biometrics technology
Biometrics technology
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 
Smart note taker
Smart note taker Smart note taker
Smart note taker
 

Similar to An eye with an atm

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
IJECEIAES
 
H029044050
H029044050H029044050
H029044050
researchinventy
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
Akmal Hussain
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
Eldad Lieberman
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
eSAT Journals
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
Manoranjan Roy
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Chitrachedu Dada Kalandar
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
LameesAnees
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
vishesh2969
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 
Maneesh p
Maneesh pManeesh p
project_report
project_reportproject_report
project_report
Ejaz Navas
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
Chitrachedu Dada Kalandar
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
Sufiyan Arab
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 

Similar to An eye with an atm (20)

Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
H029044050
H029044050H029044050
H029044050
 
24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal24708885 palm-vein-technology-abstract akmal
24708885 palm-vein-technology-abstract akmal
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
D0351022026
D0351022026D0351022026
D0351022026
 
Maneesh p
Maneesh pManeesh p
Maneesh p
 
project_report
project_reportproject_report
project_report
 
Palm view technology
Palm view technologyPalm view technology
Palm view technology
 
Palmvein authentication
Palmvein authenticationPalmvein authentication
Palmvein authentication
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 

More from Suraksha Sanghavi

Case study
Case studyCase study
Case study
Suraksha Sanghavi
 
Sampling and its type
Sampling and its typeSampling and its type
Sampling and its type
Suraksha Sanghavi
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring system
Suraksha Sanghavi
 
Smart water tank
Smart water tankSmart water tank
Smart water tank
Suraksha Sanghavi
 
K tree
K  treeK  tree
Case study of goggle map
Case study of goggle mapCase study of goggle map
Case study of goggle map
Suraksha Sanghavi
 
Case Study Of Webgraph
Case Study Of WebgraphCase Study Of Webgraph
Case Study Of Webgraph
Suraksha Sanghavi
 

More from Suraksha Sanghavi (7)

Case study
Case studyCase study
Case study
 
Sampling and its type
Sampling and its typeSampling and its type
Sampling and its type
 
Air pollution monitoring system
Air pollution monitoring systemAir pollution monitoring system
Air pollution monitoring system
 
Smart water tank
Smart water tankSmart water tank
Smart water tank
 
K tree
K  treeK  tree
K tree
 
Case study of goggle map
Case study of goggle mapCase study of goggle map
Case study of goggle map
 
Case Study Of Webgraph
Case Study Of WebgraphCase Study Of Webgraph
Case Study Of Webgraph
 

Recently uploaded

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Jeffrey Haguewood
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
Letter and Document Automation for Bonterra Impact Management (fka Social Sol...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

An eye with an atm

  • 1. Prepared By:- Suraksha Sanghavi TE Computer Roll No :- 40 Guided By :- Prof.S.B.Ambhore 1
  • 2. I. Introduction II. ATM III. Literature Survey IV. Iris Recognition V. WORKING VI. ADVANTAGES VII. DISADVANTAGES VIII. CONCLUSION IX. REFERENCES ATM Security WITH IRIS RECOGNITION 2
  • 3. ATM Security WITH IRIS RECOGNITION 3
  • 4.  An automated teller machine (ATM) is :  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a bank .  Security requiring combination Physical access card + Password(PIN) ATM Security WITH IRIS RECOGNITION 4
  • 5. Pin  People write PINs and disclose to others increasing the risk of fraud and PINs can be stolen by observation  PIN is a confidential code issued to the cardholder to permit access to that account  The PIN does not prove the identification of the cardholder ATM Security WITH IRIS RECOGNITION 5
  • 6.  Finger Printing  Facial Recognition  Iris Recognition ATM Security WITH IRIS RECOGNITION 6
  • 7. SR.NO TECHNIQUE LIMITATION 1 Finger print It can make mistakes with the dryness or dirty of the finger’s skin 2 Facial recognition Affected by changes in lighting ATM Security WITH IRIS RECOGNITION 7
  • 8.  Iris technology, which uses the iris pattern of an individual as an identity proof  In 1953 – Algorithm developed , First used by John Daugman  As the initiative 1st the bank had installed iris based ATM’s inside Kroger Supermarket stores in Houston, Dallas and Fort Worth. ATM Security WITH IRIS RECOGNITION 8
  • 9. ATM Security WITH IRIS RECOGNITION 9
  • 10.  Easy to access  Highly protected, internal organ of the eye  Limited genetic penetrance of iris patterns  Patterns apparently stable throughout life  High Accuracy ATM Security WITH IRIS RECOGNITION 10
  • 11.  Costly  The person should be present at the spot.  Small target  Sometimes False acceptances and rejections.  Flash of camera should not become so bright. ATM Security WITH IRIS RECOGNITION 11
  • 12.  More reliable in providing security by using iris recognition software.  For scanning it required vey negligible amount of time .  Permeant security password till end of life. ATM Security WITH IRIS RECOGNITION 12
  • 13. 1. IJREST paper –”Security System In ATM Using Multimodal Biometric System And Steganographic Technique” Prerana Kamble1, Sangita Nikumbh P.G. Student, Department Of E&Tc , ytiet, Bhivpuri Road, Karjat 2. IJREST paper – “A Third Generation ATM Using Universal Subscriber Module with Iris Recognition “B.Sundar Raj Assistant professor, Dept of CSE, Bharath University, Chennai, TN, India. 3. IJESC paper – “ATM Security using Iris Recognition Technology and RFID (2017)” Sonakshi Bhagat, Vasudha Singh, Niteeka Khajuria BE Student Department of Electronics and Communication MIET, Jammu, India 4. www.biometric.com / Biometric Iris Recognition and Its Application 5. www.google.com/MyBlog:ATM with an Eye. 6. www.wikipedia.org/iris recognition ATM Security WITH IRIS RECOGNITION 13
  • 14. ATM Security WITH IRIS RECOGNITION 14