SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3616
Artificial Intelligence and Aadhaar Based Smart ATM
M. Ravi Prasad M.Sc, M.Tech,
Assistant Professor, Department of CSE, S V College of Engineering, Kadapa.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Generally ATM transaction will be perform by
customer by entering 4 digit PIN, but it may be traceable by
unauthorized user and sometimes an unauthorized user can
perform the transactions using dummy card. To handle
these type of scenarios and to provide high security for
Customer Bank Account from Miscellaneous ATM
transactions suggesting a new technique in this paper. The
suggested technique is combining features of Artificial
Intelligence and Aadhaar ID. Everyone knows AI has huge
prominence in the current trends in technology. By using AI
Customer Face will be recognized and by using Aadhaar ID
will verify Finger Image of the customer, by using these two
will have high security to perform the ATM transactions by
the Customer.
Key Words: Artificial Intelligence, Smart ATM, Aadhaar ID
based, Biometric Based, Secured ATM Transactions.
1. INTRODUCTION
The automated teller machine (ATM) is an automatic
banking machine (ABM) that allows the customer to
complete basic transactions without any help from bank
representatives. There are two types of automated teller
machines (ATMs). The basic one allows the customer to
only draw cash and receive a report of the account
balance. Another one is a more complex machine that
accepts the deposit, provides credit card payment facilities
and reports account information.
It is an electronic device that is used by only bank
customers to process account transactions. The users
access their accounts through a special type of plastic card
that is encoded with user information on a magnetic strip.
The strip contains an identification code that is
transmitted to the bank’s central computer by modem.
The users insert the card into ATMs to access the account
and process their account transactions. The automated
teller machine was invented by john Shepherd-Barron in
the year of 1960.
So, with ATM lot of benefits are having for the customer
and also having many security problems. As technology
place a very important role in this Application I have to
provide better solution to overcome the problem. In the
existing papers few are suggested the only Artificial
Intelligence or Aadhaar based solutions. To provide high
security in this paper I am grouping the two techniques of
AI and Aadhaar.
As the customer Account linked with Aadhaar ID the same
data is going to furnish in the ATM card and as well the
Customer Facial image with AI. When a Customer insert an
ATM card first Account data will be fetched along with that
it also fetch facial image and finger print based on AI and
Aadhaar ID. Customer will be authorized by reading the
current facial image with Cam and Fingerprint by device
and will go for validation. After successful validation only
Customer can perform the transaction. So, this will be
leads to high level security in ATM transactions
2. LITERATURE SURVEY
2.1 Artificial Intelligence based Security
If a Customer want to perform any Transaction through
ATM he should be validate first with Face recognition by
AI. At the time of Customer registration in Bank itself will
go for Face capture by Digital camera. The same will be
stored in Bank Customer Account database. Every time
when a Customer visits ATM to perform transaction Face
recognition will be done by AI.
Customer inserts an ATM card into the machine while
reading Account details it also fetch stored Facial image
and Aadhaar ID. While retrieving the details the current
facial image will be capture from the Camera which was
fixed on the machine. Mean while it retrieves stored finger
image based on the Aadhaar ID. Once the stored Facial
Image and Current Captured image is retrieved will go for
AI validation. If success will go for next Aadhhar based
finger print validation.
2.2 Aadhaar based Security
Once the AI validation is success then application will go
for Aadhaar based finger image validation. Based on
retrieved Aadhaar ID linked with Account it will fetch the
stored Finger images from UIDAI database. Mean while
current Customer finger image will capture from the
Biometric device which was connected to ATM machine.
Once the store Finger images and Current captured Finger
is image is retrieved will go for another Validation. If this
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3617
also success then it continues to the next level in
Transaction system.
3. EXISTING METHOD
When ATM card is inserted into card slot the information
present on the magnetic strip is read by two card readers
present in the card slot. One card reader looks for special
code which confirms that card is real. Second card reader
grabs account number and password to check against
what you entered. If authentication is successful then ATM
connects with bank server through telephone network.
Now user can perform bank transactions and when
transaction is completed card comes out through ATM slot
and user automatically logs out. Counting machine is
present to count number of notes and receipt comes
through printer which gives you information about
transaction completed.
User needs to perform one of the following transactions:
1 Cash transfer
2 Cash Withdraw
3 Balance Enquiry
4 Password change
This is just general method of what happens.
4. PROBLEM STATEMENT
There are several methods through person can hack into
the customer’s account can steal the money from the
customer’s account. This is as follows:
1. Skimming: A device is been installed into the card slot
and all the information is read from onto the card. A
small pinhole camera is fixed above the keypad
which takes up all this information. By the help of
this information a duplicate card is made by the
criminal and can access the customer’s account.
2. Lebanese Loop: In this type of fraud, the criminal
installs the device due to which card gets locked into
the slot the time when transaction completes that
time the machine pushes out the card now since the
card is locked. The customer moves away from him
place for complaining and by the time criminals
comes out and will unlock the card and will draw all
the money from users account.
3. Lost or stolen card: If the card is lost or stolen that
time too there is possibility that users account can
be access by criminal. By many such techniques
criminals can access your account. If biometric with
some additional security is used then these frauds
can be minimized.
5. PROPOSED METHOD
In our proposed Iadding the features of AI and Aadhaar
ID for validation of the Customer. The process will be
shown below.
Sta
t
Insert ATM Card into machine
Reading Card data
With Card data Retrieving of
stored Facial Image and
Capturing the current by Cam
(AI)
Bank
DB
Validatin
g the
Images
True
False
Retrieving the Finger image
from UIDAI and capturing
the Current Finger (Aadhaar
DB)
UIDAI
Validating
the Finger
Images
True
False
Transactions Menu
Sto
p
Fig: Process of AI and Aadhaar Based Smart ATM
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3618
Requirements to Implement AIASA
To implement the proposed system there is need of few
Hardware and Software requirements.
1. Web Camera
2. Biometric Device
3. Module to Link AI algorithm for Capturing and
validating the Facial Image.
4. Module to link the UIDAI for retrieval of stored
finger images and validating with captured
images.
5. Module to Read Account data and Aadhaar ID.
Some algorithms and Methods to implement AI validation
and Aadhaar validation.
 Eigenfaces/Principal Component Analysis
 Local Binary Patterns Histograms (LBPH)
 Fisherfaces
 Scale Invariant Feature Transformation (SIFT)
 Speed Up Robust Features (SURF)
Machine Learning Algorithms
 Neural Networks
 Support Vector Machines
 Nearest Neighbor
 Decision Trees
By using of the above Algorithms will compare the Face
Comparison. And also will perform Biometric finger
validation.
6. FUTURE SCOPE
▪ Here proposed system is applicable for only ATM
based transactions. It is identifying the Customer
Physically authorized or not.
▪ If the Customer want to perform the same
Transaction through Online either with mobile app
or internet banking there the Customer is identifying
only with Password or PIN number to perform
transaction. Therefore Cybercrimes are growing
rapidly.
▪ In future I am going propose this technique i.e AI and
Aadhaar based algorithm to validate customer. Here
no need of the Additional devices required because
now a days every mobile is having a feature of
Camera and Fingerprint scanner so, to implement
this technique in the Mobile or Internet banking
application becomes low cost effective.
7. CONCLUSION
Here I am proposing the solution of the existing
problem of low Security. In the existing system Security
level is very low because of no particular technique to
decide whether Customer is authorized or Unauthorized.
In this paper I am proposing the technique of AI and
Aadhaar ID algorithms where AI will identify the
Customer by validating the Facial image and also
Aadhaar based Finger Image Verification to decide the
Customer is authorize or not. From this paper it is going
to provide High Security for Customer Bank ATM
transactions.
REFERENCES
[ 1] Ankitha Mahajan, Radhika Mande, Avinash Mhaske,
Parth Shete & Dr S.B. Dhooth, Dept. of ETE, Govt
Polytechnic Aurangabad,Maharastra. “Artificial
Intelligence based Smart ATM”.
[2] Manoj V, Moulishankar R, Sasipriya S, Usha Devi E,
Devika t.UG student knowledge institute of technology,
Salem “Multi authentication ATM theft prevention using
Ibeacon”.
[3]”Biometric authentications to control ATM theft”
Ahmad Tasnim Siddiqui, College of computers and IT Taif
University, Kingdom of Saudi Arabia.
[4] “Design of highly secured automatic teller machine
system by using Aadhar card and Fingerprint” Mr. Abhijeet
S.Kale Prof. Sunpreet kaur nanda ISSN: 2319-6734,
ISSN(print) : 2319-6726 www.ijesi.org volume 3 Issue
5||May 2014||pp.22.
[5] “A-ATM: Aadhar based security in Atm” Abdul
rahmana shaik Vemuri Kusuma priya b, ISSN: 2395 - 0056,
p – ISSN : 2395 – 0072 volume : 03 ISSUE:12/dec-2016.
[6 ] “Card less cash access using Biometric Atm security
System” by Nine preetam Harsh gupta ISSN:2319-
7463,vol.3 ISSUE 11,November-2014,pp:(13-7),
Impactfactory:1.252, Avilable online
at:www.erpublications.com.

More Related Content

What's hot

IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile Banking
IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile BankingIRJET-Efficient Cash Withdrawal from ATM Machine using Mobile Banking
IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile BankingIRJET Journal
 
NEW RETAIL DIRECT INVESTOR SCHEME
NEW RETAIL DIRECT INVESTOR SCHEME NEW RETAIL DIRECT INVESTOR SCHEME
NEW RETAIL DIRECT INVESTOR SCHEME Ankitasahu60
 
8. ussd mobile banking - 99
8.   ussd   mobile banking - 998.   ussd   mobile banking - 99
8. ussd mobile banking - 99Devi Thirupathi
 
Atm Service in bangladesh
Atm Service in bangladeshAtm Service in bangladesh
Atm Service in bangladeshSultan Mahmood
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in indiaMohit Negi
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET Journal
 
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...IRJET Journal
 
Railway Concession Automation
Railway Concession AutomationRailway Concession Automation
Railway Concession AutomationIRJET Journal
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller MachineSowie Althea
 

What's hot (20)

IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile Banking
IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile BankingIRJET-Efficient Cash Withdrawal from ATM Machine using Mobile Banking
IRJET-Efficient Cash Withdrawal from ATM Machine using Mobile Banking
 
Banking with tech
Banking with techBanking with tech
Banking with tech
 
NEW RETAIL DIRECT INVESTOR SCHEME
NEW RETAIL DIRECT INVESTOR SCHEME NEW RETAIL DIRECT INVESTOR SCHEME
NEW RETAIL DIRECT INVESTOR SCHEME
 
8. ussd mobile banking - 99
8.   ussd   mobile banking - 998.   ussd   mobile banking - 99
8. ussd mobile banking - 99
 
Atm Service in bangladesh
Atm Service in bangladeshAtm Service in bangladesh
Atm Service in bangladesh
 
The internet banking journey in india
The internet banking journey in indiaThe internet banking journey in india
The internet banking journey in india
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment System
 
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...
All-in-One Intelligent Shopping Trolley with Automatic Billing and Payment Sy...
 
Digital Payment Terms Simplified
Digital Payment Terms SimplifiedDigital Payment Terms Simplified
Digital Payment Terms Simplified
 
Mea1
Mea1Mea1
Mea1
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
14 581
14 58114 581
14 581
 
1. digital payments
1.  digital payments1.  digital payments
1. digital payments
 
Hashtag Banking
Hashtag BankingHashtag Banking
Hashtag Banking
 
Railway Concession Automation
Railway Concession AutomationRailway Concession Automation
Railway Concession Automation
 
IJET-V3I2P5
IJET-V3I2P5IJET-V3I2P5
IJET-V3I2P5
 
Task2 sr
Task2 srTask2 sr
Task2 sr
 
Automated Teller Machine
Automated Teller MachineAutomated Teller Machine
Automated Teller Machine
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
E010313141
E010313141E010313141
E010313141
 

Similar to IRJET - Artificial Intelligence and Aadhaar Based Smart ATM

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET Journal
 
Technolog11 ies in banking complete edited
Technolog11 ies in banking  complete editedTechnolog11 ies in banking  complete edited
Technolog11 ies in banking complete editedDEBARTHA MANDAL
 
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET Journal
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning CodeIRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning CodeIRJET Journal
 

Similar to IRJET - Artificial Intelligence and Aadhaar Based Smart ATM (20)

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
D0351022026
D0351022026D0351022026
D0351022026
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
IRJET- Smartcard Less-Biometric Technique(SLBT) User Authentication Defending...
 
Technolog11 ies in banking complete edited
Technolog11 ies in banking  complete editedTechnolog11 ies in banking  complete edited
Technolog11 ies in banking complete edited
 
IRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using MicrocontrollerIRJET- Smart Shopping Trolley System using Microcontroller
IRJET- Smart Shopping Trolley System using Microcontroller
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
IRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT SystemIRJET- Easykey - Multipurpose RFID Card based IoT System
IRJET- Easykey - Multipurpose RFID Card based IoT System
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
Atm
AtmAtm
Atm
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning CodeIRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
IRJET - An Effective Embedded Smart Shopping Cart using QR Scanning Code
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxkalpana413121
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...gragchanchal546
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...jabtakhaidam7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 

Recently uploaded (20)

UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad ₹7.5k Pick Up & Drop With Cash Payment 8...
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 

IRJET - Artificial Intelligence and Aadhaar Based Smart ATM

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3616 Artificial Intelligence and Aadhaar Based Smart ATM M. Ravi Prasad M.Sc, M.Tech, Assistant Professor, Department of CSE, S V College of Engineering, Kadapa. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Generally ATM transaction will be perform by customer by entering 4 digit PIN, but it may be traceable by unauthorized user and sometimes an unauthorized user can perform the transactions using dummy card. To handle these type of scenarios and to provide high security for Customer Bank Account from Miscellaneous ATM transactions suggesting a new technique in this paper. The suggested technique is combining features of Artificial Intelligence and Aadhaar ID. Everyone knows AI has huge prominence in the current trends in technology. By using AI Customer Face will be recognized and by using Aadhaar ID will verify Finger Image of the customer, by using these two will have high security to perform the ATM transactions by the Customer. Key Words: Artificial Intelligence, Smart ATM, Aadhaar ID based, Biometric Based, Secured ATM Transactions. 1. INTRODUCTION The automated teller machine (ATM) is an automatic banking machine (ABM) that allows the customer to complete basic transactions without any help from bank representatives. There are two types of automated teller machines (ATMs). The basic one allows the customer to only draw cash and receive a report of the account balance. Another one is a more complex machine that accepts the deposit, provides credit card payment facilities and reports account information. It is an electronic device that is used by only bank customers to process account transactions. The users access their accounts through a special type of plastic card that is encoded with user information on a magnetic strip. The strip contains an identification code that is transmitted to the bank’s central computer by modem. The users insert the card into ATMs to access the account and process their account transactions. The automated teller machine was invented by john Shepherd-Barron in the year of 1960. So, with ATM lot of benefits are having for the customer and also having many security problems. As technology place a very important role in this Application I have to provide better solution to overcome the problem. In the existing papers few are suggested the only Artificial Intelligence or Aadhaar based solutions. To provide high security in this paper I am grouping the two techniques of AI and Aadhaar. As the customer Account linked with Aadhaar ID the same data is going to furnish in the ATM card and as well the Customer Facial image with AI. When a Customer insert an ATM card first Account data will be fetched along with that it also fetch facial image and finger print based on AI and Aadhaar ID. Customer will be authorized by reading the current facial image with Cam and Fingerprint by device and will go for validation. After successful validation only Customer can perform the transaction. So, this will be leads to high level security in ATM transactions 2. LITERATURE SURVEY 2.1 Artificial Intelligence based Security If a Customer want to perform any Transaction through ATM he should be validate first with Face recognition by AI. At the time of Customer registration in Bank itself will go for Face capture by Digital camera. The same will be stored in Bank Customer Account database. Every time when a Customer visits ATM to perform transaction Face recognition will be done by AI. Customer inserts an ATM card into the machine while reading Account details it also fetch stored Facial image and Aadhaar ID. While retrieving the details the current facial image will be capture from the Camera which was fixed on the machine. Mean while it retrieves stored finger image based on the Aadhaar ID. Once the stored Facial Image and Current Captured image is retrieved will go for AI validation. If success will go for next Aadhhar based finger print validation. 2.2 Aadhaar based Security Once the AI validation is success then application will go for Aadhaar based finger image validation. Based on retrieved Aadhaar ID linked with Account it will fetch the stored Finger images from UIDAI database. Mean while current Customer finger image will capture from the Biometric device which was connected to ATM machine. Once the store Finger images and Current captured Finger is image is retrieved will go for another Validation. If this
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3617 also success then it continues to the next level in Transaction system. 3. EXISTING METHOD When ATM card is inserted into card slot the information present on the magnetic strip is read by two card readers present in the card slot. One card reader looks for special code which confirms that card is real. Second card reader grabs account number and password to check against what you entered. If authentication is successful then ATM connects with bank server through telephone network. Now user can perform bank transactions and when transaction is completed card comes out through ATM slot and user automatically logs out. Counting machine is present to count number of notes and receipt comes through printer which gives you information about transaction completed. User needs to perform one of the following transactions: 1 Cash transfer 2 Cash Withdraw 3 Balance Enquiry 4 Password change This is just general method of what happens. 4. PROBLEM STATEMENT There are several methods through person can hack into the customer’s account can steal the money from the customer’s account. This is as follows: 1. Skimming: A device is been installed into the card slot and all the information is read from onto the card. A small pinhole camera is fixed above the keypad which takes up all this information. By the help of this information a duplicate card is made by the criminal and can access the customer’s account. 2. Lebanese Loop: In this type of fraud, the criminal installs the device due to which card gets locked into the slot the time when transaction completes that time the machine pushes out the card now since the card is locked. The customer moves away from him place for complaining and by the time criminals comes out and will unlock the card and will draw all the money from users account. 3. Lost or stolen card: If the card is lost or stolen that time too there is possibility that users account can be access by criminal. By many such techniques criminals can access your account. If biometric with some additional security is used then these frauds can be minimized. 5. PROPOSED METHOD In our proposed Iadding the features of AI and Aadhaar ID for validation of the Customer. The process will be shown below. Sta t Insert ATM Card into machine Reading Card data With Card data Retrieving of stored Facial Image and Capturing the current by Cam (AI) Bank DB Validatin g the Images True False Retrieving the Finger image from UIDAI and capturing the Current Finger (Aadhaar DB) UIDAI Validating the Finger Images True False Transactions Menu Sto p Fig: Process of AI and Aadhaar Based Smart ATM
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 07 | July 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 3618 Requirements to Implement AIASA To implement the proposed system there is need of few Hardware and Software requirements. 1. Web Camera 2. Biometric Device 3. Module to Link AI algorithm for Capturing and validating the Facial Image. 4. Module to link the UIDAI for retrieval of stored finger images and validating with captured images. 5. Module to Read Account data and Aadhaar ID. Some algorithms and Methods to implement AI validation and Aadhaar validation.  Eigenfaces/Principal Component Analysis  Local Binary Patterns Histograms (LBPH)  Fisherfaces  Scale Invariant Feature Transformation (SIFT)  Speed Up Robust Features (SURF) Machine Learning Algorithms  Neural Networks  Support Vector Machines  Nearest Neighbor  Decision Trees By using of the above Algorithms will compare the Face Comparison. And also will perform Biometric finger validation. 6. FUTURE SCOPE ▪ Here proposed system is applicable for only ATM based transactions. It is identifying the Customer Physically authorized or not. ▪ If the Customer want to perform the same Transaction through Online either with mobile app or internet banking there the Customer is identifying only with Password or PIN number to perform transaction. Therefore Cybercrimes are growing rapidly. ▪ In future I am going propose this technique i.e AI and Aadhaar based algorithm to validate customer. Here no need of the Additional devices required because now a days every mobile is having a feature of Camera and Fingerprint scanner so, to implement this technique in the Mobile or Internet banking application becomes low cost effective. 7. CONCLUSION Here I am proposing the solution of the existing problem of low Security. In the existing system Security level is very low because of no particular technique to decide whether Customer is authorized or Unauthorized. In this paper I am proposing the technique of AI and Aadhaar ID algorithms where AI will identify the Customer by validating the Facial image and also Aadhaar based Finger Image Verification to decide the Customer is authorize or not. From this paper it is going to provide High Security for Customer Bank ATM transactions. REFERENCES [ 1] Ankitha Mahajan, Radhika Mande, Avinash Mhaske, Parth Shete & Dr S.B. Dhooth, Dept. of ETE, Govt Polytechnic Aurangabad,Maharastra. “Artificial Intelligence based Smart ATM”. [2] Manoj V, Moulishankar R, Sasipriya S, Usha Devi E, Devika t.UG student knowledge institute of technology, Salem “Multi authentication ATM theft prevention using Ibeacon”. [3]”Biometric authentications to control ATM theft” Ahmad Tasnim Siddiqui, College of computers and IT Taif University, Kingdom of Saudi Arabia. [4] “Design of highly secured automatic teller machine system by using Aadhar card and Fingerprint” Mr. Abhijeet S.Kale Prof. Sunpreet kaur nanda ISSN: 2319-6734, ISSN(print) : 2319-6726 www.ijesi.org volume 3 Issue 5||May 2014||pp.22. [5] “A-ATM: Aadhar based security in Atm” Abdul rahmana shaik Vemuri Kusuma priya b, ISSN: 2395 - 0056, p – ISSN : 2395 – 0072 volume : 03 ISSUE:12/dec-2016. [6 ] “Card less cash access using Biometric Atm security System” by Nine preetam Harsh gupta ISSN:2319- 7463,vol.3 ISSUE 11,November-2014,pp:(13-7), Impactfactory:1.252, Avilable online at:www.erpublications.com.