SlideShare a Scribd company logo
PRESENTED BY
MANORANJAN ROY
UIT, BU
 PROBLEM STATEMENT
 OBJECTIVE
 INTRODUCTION
 ADVANTAGES
 DISADVANTAGES
 CONCLUSION
 In present scenario, traditional ATM system
accepts only on the PIN CODE security system,
enabling the other person rather than the owner to
access the account very easily.
 This ensures that the traditional ATM system is
not fully secured.
 This system is easily to hack.
 The objective of our project is to provide
biometric security through fingerprint
authentication in ATM application.
 The underlying principle is the
phenomenon of biometrics
“AUTHENTICATION”, in this project we
propose a method for fingerprint matching
based on matching algorithms.
 The fingerprint is a person’s most unique
physical characteristic.
 Fingerprint recognition software is
based on the ability to first recognize
fingerprint, in this technological
fingerprint measure the various features of each
fingerprint.
SYSTEM FLOW DIAGRAM
 CHIP- S3C2440
 HARWARE AND
SOFTWARE
1. Very high accuracy and security
Identification
Verification
2. It is one of the most developed Biometric
Security. So,
It’s Easy to use.
Doesn't Forgetting it.
It’s not stolen by any one.
3. It’s standardized security other than traditional
methods (PIN, Passwords).
4. There is no need to carry the cards.
1. Misidentification
False Acceptance
False Rejection
2. Image captured at 500 dpi. Resolution: 8 bits per
pixel. A 500 dpi fingerprint image at 8 bits per
pixel demands a large memory space, 240 KB
approximately.
3. In this system the ATM with fingerprint scanning
machine is heavy costly.
4. Withdrawal cases problem, when card holder in
some injury or accident cases his/her family
member can’t withdrawal money for fingerprint.
5. During online transaction by card does not held for
this system.
6. For some people it is very difficult, because . Dry or
wet hands and any kind of skin disease.
It will be very easy to start this type of system
Advantages of the stability & reliability of the
fingerprint
System is safe, reliable & easy to use
Role of DCB bank in India
Atm using finger print

More Related Content

What's hot

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
Paras Garg
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
sagar solanky
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
Chand Pasha
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
IRJET Journal
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
Alphonse Bisangabagabo
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
Mohammad Azhar
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
JOLLUSUDARSHANREDDY
 
14 581
14 58114 581
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
Jorge Sebastiao
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
Eldad Lieberman
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
john juvvanapudi
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
Palak Pandoh
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
Jignesh Prajapati
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET Journal
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
Nishmitha B
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
Vengadesh Raja
 

What's hot (20)

Project Synopsis
Project SynopsisProject Synopsis
Project Synopsis
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Security
SecuritySecurity
Security
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
14 581
14 58114 581
14 581
 
Ecrime Practical Biometric
Ecrime Practical BiometricEcrime Practical Biometric
Ecrime Practical Biometric
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)Touch less-fingerprint-recognition-system (1)
Touch less-fingerprint-recognition-system (1)
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
N044057478
N044057478N044057478
N044057478
 
BIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEMBIOMETRIC SECURITY SYSTEM
BIOMETRIC SECURITY SYSTEM
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol A secure Crypto-biometric verification protocol
A secure Crypto-biometric verification protocol
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Face recognition technology
Face recognition technologyFace recognition technology
Face recognition technology
 

Similar to Atm using finger print

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
Dhara k
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric Devices
IRJET Journal
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
Papun Papun
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
H029044050
H029044050H029044050
H029044050
researchinventy
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
IJRTEMJOURNAL
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET Journal
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
Naga Dinesh
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
IOSR Journals
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
brijesh kumar
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
sravya raju
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
Pavani839789
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
vishesh2969
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
Manav Mittal
 

Similar to Atm using finger print (20)

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
IRJET - A Review of Cyber Security using Biometric Devices
IRJET -  	  A Review of Cyber Security using Biometric DevicesIRJET -  	  A Review of Cyber Security using Biometric Devices
IRJET - A Review of Cyber Security using Biometric Devices
 
Palm-Vein Technology
Palm-Vein TechnologyPalm-Vein Technology
Palm-Vein Technology
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
H029044050
H029044050H029044050
H029044050
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
D0351022026
D0351022026D0351022026
D0351022026
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET-  	  Secure Vault System using Iris Biometrics and PIC MicrocontrollerIRJET-  	  Secure Vault System using Iris Biometrics and PIC Microcontroller
IRJET- Secure Vault System using Iris Biometrics and PIC Microcontroller
 
palmveintechnologyppt
palmveintechnologypptpalmveintechnologyppt
palmveintechnologyppt
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Computer science ppt
Computer science pptComputer science ppt
Computer science ppt
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Palm vein technology latest ppt
Palm vein technology latest pptPalm vein technology latest ppt
Palm vein technology latest ppt
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 

Recently uploaded

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
DanBrown980551
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
Fwdays
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 

Recently uploaded (20)

GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...
 
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
"Scaling RAG Applications to serve millions of users",  Kevin Goedecke"Scaling RAG Applications to serve millions of users",  Kevin Goedecke
"Scaling RAG Applications to serve millions of users", Kevin Goedecke
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 

Atm using finger print

  • 2.  PROBLEM STATEMENT  OBJECTIVE  INTRODUCTION  ADVANTAGES  DISADVANTAGES  CONCLUSION
  • 3.  In present scenario, traditional ATM system accepts only on the PIN CODE security system, enabling the other person rather than the owner to access the account very easily.  This ensures that the traditional ATM system is not fully secured.  This system is easily to hack.
  • 4.  The objective of our project is to provide biometric security through fingerprint authentication in ATM application.  The underlying principle is the phenomenon of biometrics “AUTHENTICATION”, in this project we propose a method for fingerprint matching based on matching algorithms.
  • 5.  The fingerprint is a person’s most unique physical characteristic.  Fingerprint recognition software is based on the ability to first recognize fingerprint, in this technological fingerprint measure the various features of each fingerprint.
  • 6. SYSTEM FLOW DIAGRAM  CHIP- S3C2440  HARWARE AND SOFTWARE
  • 7. 1. Very high accuracy and security Identification Verification 2. It is one of the most developed Biometric Security. So, It’s Easy to use. Doesn't Forgetting it. It’s not stolen by any one. 3. It’s standardized security other than traditional methods (PIN, Passwords). 4. There is no need to carry the cards.
  • 8. 1. Misidentification False Acceptance False Rejection 2. Image captured at 500 dpi. Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 KB approximately. 3. In this system the ATM with fingerprint scanning machine is heavy costly.
  • 9. 4. Withdrawal cases problem, when card holder in some injury or accident cases his/her family member can’t withdrawal money for fingerprint. 5. During online transaction by card does not held for this system. 6. For some people it is very difficult, because . Dry or wet hands and any kind of skin disease.
  • 10. It will be very easy to start this type of system Advantages of the stability & reliability of the fingerprint System is safe, reliable & easy to use Role of DCB bank in India