SlideShare a Scribd company logo
ATM WITH AN EYE
Presented By:
Vishnu Parsi
Guided By:
OUTLINE
 Introduction
 What is an ATM
 History
 Need of Facial Recognition at ATM
 Where technology is used
 Working
 Advantages & Disadvantages
 Conclusion
INTRODUCTION
 ATM made money transaction easy.
 Other side is enhancement of culprit’s action
to get unauthentic access.
 Improved Technology is used.
 Facial Recognition is recent technology used
at ATMs.
ATM with facial Recognition
Mechanism
History of an ATM
 Many inventors contribute to the invention.
 Don Wetzel invented first successful and modern
ATM.
 But Luther GEORGE started patenting earlier in
1939.
 A working prototype was ready in 1969 & was
installed in New York.
Don Wetzel's ATM
 He got the idea while waiting in line at Dallas Bank.
 It was not in a lobby.
 It was actually in the wall of the Bank.
 Had a canopy over IT for protection.
 ATM was cash dispenser only.
 First ATM’s were off-line machines.
What is an ATM
 A Banking Terminal that accepts deposits &
dispenses cash.
 It has two input devices viz ;
1. A card reader that reads
magnetic strip.
2. A keypad.
 It has four output devices viz ;
1. A speaker.
2. A display screen.
3. A printer.
4. A safe & cash dispensing
mechanism.
Atm machine
ATM
 Networking
ATMs are connected to interbank network
enabling people to withdraw and deposit money from
machines not belonging to the bank where they have
their account.
 Hardware
ATMs contain secure cryptoprocessors,
generally within an IBM PC compatible host
computer in a secure enclosure.
CONTINUE…
 Software
ATMs are moving away from custom
circuit boards and into full-fledged with
commodity operating systems such as
Windows 2000 and Linux .
 Reliability
ATMs are generally reliable, but if
they do go wrong customers will be left
without cash or giving out higher value notes.
CONTINUE…
 ATM Frauds
These had two common forms.
1. In the low-tech form, the user's PIN is observed by
someone watching as they use the machine.
2. By contrast, the most common high-tech modus operandi
involves the installation of a magnetic card reader over
the real ATM's card slot, and the use of a wireless
surveillance camera to observe the user's PIN.
ATM’s in Operation
Need of Facial
Recognition at ATM
 Traditionally, card & PIN is used to access
account.
 ATM frauds are increasing.
 By forcing ATM to match live image with an
image stored in a bank database, frauds can be
minimized.
 Only when PIN & image matches, user is
considered fully verified.
Where Facial Recognition
Technology is used
 Used mainly in Law Enforcement Agencies &
Security Surveillance.
 Also has several other uses :
1. Eliminating voter fraud.
2. Check-Cashing identity
verification.
3. Computer security.
 Also used to pinpoint the face in the crowd &
measure its features.
Computer Security
 Facial Recognition
software can be used to
lock your computer.
Used to pinpoint faces in
crowd
 Facial Recognition
mechanism is also
used to pinpoint a
face in the crowd &
measure its features.
Working
 Facial Recognition analyzes Characteristics of face
through digital camera.
 There are peaks & valleys on face called nodal
points.
 There are around 80 nodal points on face.
 Some of them are :
1. Distance between eyes.
2. Width of nose.
3. Depth of eye sockets.
4. Cheekbones.
5. Jaw line.
6. Chin.
 These nodal points are measured to create a
numerical code that represents face in database.
 This code is called face-print.
 These measurements are then used for
comparison when user stands before camera.
 Does not require physical contact with image
capturing device.
Identification Steps
 Take a photo of the individual & encode it.
 Match the encoding against database.
 Display the result (i.e. verified or not-
verified).
Verification
Advantages
 Frauds are minimized.
 It does not require any physical contact with
image capture device.
 Does not require any advance hardware.
 Convenient to use because additional security
information (smart cards, pwd. etc) can be
skipped.
 Usually helps in situation where certain biometric
feature is not optimal. e.g. hard workers may
have raw finger prints.
Disadvantages
 Face is not so unique, so its recognition
reliability is slightly lower.
 To match with the database image, it
requires lot of time.
Conclusion
 As ATM frauds are increasing, or the
culprit’s probability to get the ‘unauthentic
access’ is increasing, additional security
like Facial Recognition mechanism is
necessity.
REFERENCES
 http:///www.atmmachine.com/atmmachine.html
 www.bls.gov/oco/ocos186.html
 www.diebold.com/solutions/atms/default.htm
 www.encyclopedia.com/html/a1/autotel.asp
 www.legis.state.wi.us/lrb/pubs/ttp-10-2000.html
 www.answers.com/topic/automatic-teller-machine
 www.infoplease.com/ce6/sci/AO805407.html
 Questions ???
Atm with an eye

More Related Content

What's hot

High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
Alfred Oboi
 
14 581
14 58114 581
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDY
anand reddy
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
eSAT Journals
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
Paras Garg
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Saikiran Panjala
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
Sowie Althea
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
john juvvanapudi
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
sagar solanky
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
khurda
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptHyballs the Rat
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
Pvrtechnologies Nellore
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
Joy Dutta
 

What's hot (20)

High protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technologyHigh protection ATM system with fingerprint identification technology
High protection ATM system with fingerprint identification technology
 
14 581
14 58114 581
14 581
 
Atm wtih an eye FROM ANAND REDDY
Atm wtih an eye  FROM ANAND REDDYAtm wtih an eye  FROM ANAND REDDY
Atm wtih an eye FROM ANAND REDDY
 
Security
SecuritySecurity
Security
 
3 layered advanced atm security
3 layered advanced atm security3 layered advanced atm security
3 layered advanced atm security
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Seminar on atm
Seminar on atmSeminar on atm
Seminar on atm
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
Skimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 PptSkimmer Presentation V1 230109 Ppt
Skimmer Presentation V1 230109 Ppt
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Atm security
Atm securityAtm security
Atm security
 
Finger print recognized atm system
Finger print recognized atm systemFinger print recognized atm system
Finger print recognized atm system
 
Fingerprint Technology
Fingerprint TechnologyFingerprint Technology
Fingerprint Technology
 

Similar to Atm with an eye

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
IRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guide
Jude Dsouza
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
Prabhat Singh
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
Syed Akhtar-Uz-Zaman
 
ATM Skimming Devices
ATM Skimming DevicesATM Skimming Devices
ATM Skimming Devices
savingsguide
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
Manoranjan Roy
 
Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awareness
Muhammad Basharat
 
ATM Security
ATM SecurityATM Security
ATM Security
Roushan Jha
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
MuhammedNihadP
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineDiotima Gupta
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET Journal
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
Shah Sheikh
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- Banking
AniketPujari
 

Similar to Atm with an eye (20)

IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
project_report
project_reportproject_report
project_report
 
N044057478
N044057478N044057478
N044057478
 
Atm awareness guide
Atm awareness guideAtm awareness guide
Atm awareness guide
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
ATM Skimming Devices
ATM Skimming DevicesATM Skimming Devices
ATM Skimming Devices
 
Atm using finger print
Atm using finger printAtm using finger print
Atm using finger print
 
Atm card skimming & pin capturing awareness
Atm card skimming  & pin capturing awarenessAtm card skimming  & pin capturing awareness
Atm card skimming & pin capturing awareness
 
ATM Security
ATM SecurityATM Security
ATM Security
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
ATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptxATM Security Us-WPS Office.pptx
ATM Security Us-WPS Office.pptx
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
DTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job WayDTS Solution - Hacking ATM Machines - The Italian Job Way
DTS Solution - Hacking ATM Machines - The Italian Job Way
 
ATM and E- Banking
ATM and E- BankingATM and E- Banking
ATM and E- Banking
 

Recently uploaded

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
nooriasukmaningtyas
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...A review on techniques and modelling methodologies used for checking electrom...
A review on techniques and modelling methodologies used for checking electrom...
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

Atm with an eye

  • 1. ATM WITH AN EYE Presented By: Vishnu Parsi Guided By:
  • 2. OUTLINE  Introduction  What is an ATM  History  Need of Facial Recognition at ATM  Where technology is used  Working  Advantages & Disadvantages  Conclusion
  • 3. INTRODUCTION  ATM made money transaction easy.  Other side is enhancement of culprit’s action to get unauthentic access.  Improved Technology is used.  Facial Recognition is recent technology used at ATMs.
  • 4. ATM with facial Recognition Mechanism
  • 5. History of an ATM  Many inventors contribute to the invention.  Don Wetzel invented first successful and modern ATM.  But Luther GEORGE started patenting earlier in 1939.  A working prototype was ready in 1969 & was installed in New York.
  • 6. Don Wetzel's ATM  He got the idea while waiting in line at Dallas Bank.  It was not in a lobby.  It was actually in the wall of the Bank.  Had a canopy over IT for protection.  ATM was cash dispenser only.  First ATM’s were off-line machines.
  • 7. What is an ATM  A Banking Terminal that accepts deposits & dispenses cash.  It has two input devices viz ; 1. A card reader that reads magnetic strip. 2. A keypad.  It has four output devices viz ; 1. A speaker. 2. A display screen. 3. A printer. 4. A safe & cash dispensing mechanism.
  • 9. ATM  Networking ATMs are connected to interbank network enabling people to withdraw and deposit money from machines not belonging to the bank where they have their account.  Hardware ATMs contain secure cryptoprocessors, generally within an IBM PC compatible host computer in a secure enclosure.
  • 10. CONTINUE…  Software ATMs are moving away from custom circuit boards and into full-fledged with commodity operating systems such as Windows 2000 and Linux .  Reliability ATMs are generally reliable, but if they do go wrong customers will be left without cash or giving out higher value notes.
  • 11. CONTINUE…  ATM Frauds These had two common forms. 1. In the low-tech form, the user's PIN is observed by someone watching as they use the machine. 2. By contrast, the most common high-tech modus operandi involves the installation of a magnetic card reader over the real ATM's card slot, and the use of a wireless surveillance camera to observe the user's PIN.
  • 13. Need of Facial Recognition at ATM  Traditionally, card & PIN is used to access account.  ATM frauds are increasing.  By forcing ATM to match live image with an image stored in a bank database, frauds can be minimized.  Only when PIN & image matches, user is considered fully verified.
  • 14. Where Facial Recognition Technology is used  Used mainly in Law Enforcement Agencies & Security Surveillance.  Also has several other uses : 1. Eliminating voter fraud. 2. Check-Cashing identity verification. 3. Computer security.  Also used to pinpoint the face in the crowd & measure its features.
  • 15. Computer Security  Facial Recognition software can be used to lock your computer.
  • 16. Used to pinpoint faces in crowd  Facial Recognition mechanism is also used to pinpoint a face in the crowd & measure its features.
  • 17. Working  Facial Recognition analyzes Characteristics of face through digital camera.  There are peaks & valleys on face called nodal points.  There are around 80 nodal points on face.  Some of them are : 1. Distance between eyes. 2. Width of nose. 3. Depth of eye sockets. 4. Cheekbones. 5. Jaw line. 6. Chin.
  • 18.  These nodal points are measured to create a numerical code that represents face in database.  This code is called face-print.  These measurements are then used for comparison when user stands before camera.  Does not require physical contact with image capturing device.
  • 19. Identification Steps  Take a photo of the individual & encode it.  Match the encoding against database.  Display the result (i.e. verified or not- verified).
  • 21. Advantages  Frauds are minimized.  It does not require any physical contact with image capture device.  Does not require any advance hardware.  Convenient to use because additional security information (smart cards, pwd. etc) can be skipped.  Usually helps in situation where certain biometric feature is not optimal. e.g. hard workers may have raw finger prints.
  • 22. Disadvantages  Face is not so unique, so its recognition reliability is slightly lower.  To match with the database image, it requires lot of time.
  • 23. Conclusion  As ATM frauds are increasing, or the culprit’s probability to get the ‘unauthentic access’ is increasing, additional security like Facial Recognition mechanism is necessity.
  • 24. REFERENCES  http:///www.atmmachine.com/atmmachine.html  www.bls.gov/oco/ocos186.html  www.diebold.com/solutions/atms/default.htm  www.encyclopedia.com/html/a1/autotel.asp  www.legis.state.wi.us/lrb/pubs/ttp-10-2000.html  www.answers.com/topic/automatic-teller-machine  www.infoplease.com/ce6/sci/AO805407.html