SlideShare a Scribd company logo
Fingerprint
Authentication
for ATM
BY:-
Parul Varshney - 0919213069
Paras Garg - 0919213067
Upendra N. Giri - 0919213121G. L. Bajaj Institute of Technology, Gr
Noida
1. PROBLEM STATEMENT
2. OBJECTIVE
3. INTRODUCTION
4. APPROACHES / PROCEDURE
5. SOFTWARE REQUIREMENT AND SPECIFICATION
6. FLOW CHART
7. USE CASE DIAGRAM
8. E-R DIAGRAM
9. SEQUENCE DIAGRAM
10. ACTIVITY DIAGRAM
11. CLASS DIAGRAM
12. DFD
13. SNAPSHOTS
14. ADVANTAGES / DISADVANTAGES
15. CONCLUSION
CONTENT
PROBLEM STATEMENT
 In present scenario, traditional ATM system accepts only on the
PIN CODE security system, enabling the other person rather
than the owner to access the account very easily.
 This ensures that the traditional ATM system is not fully secured.
 The objective of our project is to provide biometric security
through fingerprint authentication in ATM application.
 The underlying principle is the phenomenon of biometrics
“AUTHENTICATION”, in this project we propose a method for
fingerprint matching based on matching algorithms.
OBJECTIVE
 The fingerprint is a person’s most unique physical characteristic.
 This software can pick only authentic
fingerprint out of crowd, extract that
fingerprint is compared from rest of
which those are stored in database.
 Fingerprint recognition software is based
on the ability to first recognize fingerprint,
in this technological fingerprint measure the
various features of each fingerprint.
INTRODUCTION
What Fingerprint Is?
 A fingerprint is the feature pattern of fingers (Figure 1), and each
fingerprint is unique, and every person has unique fingerprints. So
fingerprints have being used for identification.
 A fingerprint is composed of many ridges and furrows, fingerprints are
not distinguished by their ridges And furrows, but by Minutiae, which
are some abnormal points on the ridges (Figure 2).
 Two types of minutiae are called termination, which is the immediate
ending of a ridge and the other called bifurcation, which is the point
on the ridge from which two branches derive.
Figure 1 Figure 2
What is Fingerprint Authentication?
 The fingerprint authentication problem can be grouped into two sub-
domains i.e. fingerprint verification and fingerprint identification.
 Fingerprint verification is to verify the authenticity of one person by his
fingerprint and PIN Code and Fingerprint identification is by matching
the information of user such as PIN Code and Fingerprint matching.
Figure 2.2. Verification vs. Identification
Approaches For Fingerprint Recognition
 The first approach, which is minutiae-based, represents the fingerprint
by its local features, like terminations and bifurcations. This approach
has been intensively studied, also is the backbone of the current
available fingerprint recognition products.
 The second approach, which uses image-based methods, tries to do
matching based on the global features of a whole fingerprint image. It is
an advanced approach. And it is useful to solve some intractable
problems of the first approach.
Procedure
SOFTWARE REQUIREMENT
SPECIFICATION (SRS)
INTRODUCTION
 Purpose
This Software Requirements Specification provides a complete description
of all the functions and specifications of the ATM system of bank. The
purpose is to provide extra security to the ATM systems
 Scope
The ATM system is designed to run for 24 hours and to allow bank clients
to carry out transactions in a secured way. The data will be held in a bank
database. The system is connected to the bank database using a modem.
 Document Overview
The remainder of this document is two chapters, the first providing a full
description of the project for the bank’s ATM with fingerprint security. This
SRS gives the details about the various requirements & about the various
hardware & software interfaces.
OVERALL DESCRIPTION
The ATM system encompasses various GUI menus including the SENSOR,
to provide high security. It provides secure access to the account of a
customer. The ATM must be able to provide the following services to the
customer:
Enter Pin: A customer is allowed to enter the PIN Code for his/her Account.
Change Pin: A customer must be able to change the pin linked to the card.
Enroll Finger: A customer is allowed to enroll the fingerprint impression
which has been used to provide security to the Account
Change Fingerprint: A customer is allowed to change the fingerprint
impression.
Functional Requirements Definition
The software to be designed will control a simulated automated teller
machine (ATM) having :
 A sensor to enroll and detect fingerprint.
 A customer console (keyboard and display) for interaction with the
customer.(for entering PIN Code)
 Facility of Aborting transaction
A customer must be able to abort a transaction in progress by pressing the
Cancel key instead of responding to a request from the machine.
 PIN Code format
Pin should be of exactly 4 digit.
 Facility of PIN Re-entering
If the customer's PIN is invalid, the customer will be required to re-enter
the PIN before a transaction can proceed.
 Denial of service, if PIN goes wrong.
If the customer is unable to successfully enter the PIN after three tries, the
service would be denied for particular card.
 Enroll finger
Enroll your finger from first joint to the tip.
 Facility of Re-enrolling the finger
If the customer's Fingerprint is invalid, the customer will be required to re-
enroll the Fingerprint before a transaction can proceed.
 Denial of service, if fingerprint goes wrong
If the customer is unable to successfully enroll fingerprint after three tries,
the service would be denied for that particular card.
 Explanation of problem
If a transaction fails for any reason other than an invalid PIN and
fingerprint, the ATM will display an explanation of the problem.
NON FUNCTIONAL REQUIREMENT
There are requirements that are not functional in nature. Specifically,
these are the constraints the system must follow. They are often called
qualities of a system. Other terms for non-functional requirements are
“constraints”,” quality attributes”,” quality goals”,” quality of service
requirements” and “non-behavioral requirements”.
 Scope: The scope of this project is to allow the user to get access to
their account through the ATM using fingerprinting functionality.
 Functionality: One customer at a time can process their account in the
ATM machine.
 Usability: The desktop user interface shall be Windows 95/98/2000/XP/7
complaint.
 Reliability: The ATM machine must be able to scan or read the card and
the fingerprint properly and identify the customer account.
 Performance: The ATM machine support only one customer at a time.
The speed and accurate transaction decides the performance factor.
The screen must be clearly visible to the user.
 Security: The pin number and the fingerprint in the card guarantee the
security of a customer’s account. The ATM system must not store any
of this data in its database. The customer with a pin number and a valid
card with valid fingerprint impression is allowed to do all transactions.
For developing the front – end interface, we have decided to use
ASP.NET platform, with C# as the programming language, due to the
following reasons:-
 Easy to use and flexible interface.
 A number of options for customizability.
 Proven to provide good performance and high reliability.
 Attractive and visually pleasing interface.
For developing the database (back – end), we have decided to use
MS-SQL Server 2008 database, due to the following reasons:-
 Native support and full compatibility with ASP.NET platform .
 Flexible, scalable and robust database architecture.
 Used by market-leading companies worldwide.
 Strong data protection and ease of management.
FRONT END DESCRIPTION
BACK END DESCRIPTION
Tools Used:
 Database - MS SQL Server 2008 R2
 Processor - Pentium 4
 Hard Disk - 5 GB
 RAM - 256 MB
 Sensor - Fingerprint Recognizer
 Operating System - Windows 7
 Database System - MS SQL Server 2008 R2
 Front End - Visual Studio 2010
 Framework - .NET Framework 4.0
DATABASE DESCRIPTION
HARDWARE REQUIREMENT
SOFTWARE REQUIREMENT
FLOW CHART
Fingerprint Authentication for ATM
USE CASE DIAGRAM
Fingerprint Authentication for ATM
E-R DIAGRAM
Fingerprint Authentication for ATM
SEQUENCE DIAGRAM
Fingerprint Authentication for ATM
ACTIVITY DIAGRAM
Fingerprint Authentication for ATM
DATA FLOW DIAGRAM LEVEL-0
Fingerprint Authentication for ATM
DATA FLOW DIAGRAM LEVEL-1
Fingerprint Authentication for ATM
DATA FLOW DIAGRAM LEVEL-2
Fingerprint Authentication for ATM
SNAPSHOTS
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
Fingerprint Authentication for ATM
1. Very high accuracy and security
• Identification (Do I know who you are?)
• Verification (Are you who you claim to be?)
2. Is the most economical biometric PC user authentication
technique.
3. It is one of the most developed biometrics.
4. Easy to use.
5. Small storage space required for the biometric template, reducing
the size of the database memory required.
6. It is standardized.
7. Enhance traditional methods (PINs, Passwords).
ADVANTAGES
 General Limitations
1. Misidentification
 False Acceptance
 False Rejection
2. Privacy
3. Image captured at 500 dots per inch(dpi). Resolution: 8 bits per pixel.
A 500 dpi fingerprint image at 8 bits per pixel demands a large
memory space, 240 KB approximately  Compression required ( a
factor of 10 approximately).
 Limitations for individual
1. Dry, wet or dirty hands.
2. For some people it is very intrusive, because it is still related to
criminal identification.
DISADVANTAGES
 A smartcard based ATM fingerprint authentication scheme has been
proposed. The possession (smartcard) together with the claimed user’s
Biometrics (fingerprint) is required in a transaction. The smartcard is used for
the first layer of mutual authentication when a user requests transaction.
Biometric authentication is the second layer. The fingerprint image is
encrypted via 3D map as soon as it is captured, and then is transmitted to
the central server via symmetric algorithm. The encryption keys are extracted
from the random pixels distribution in a raw image of fingerprint.
 The stable features of the fingerprint image need not to be transmitted, it can
be extracted from the templates at the central server directly.
 After this, the minutiae matching is performed at the central server. The
successful minutiae matching at last verifies the claimed user. Future work
will focus on the study of stable features (as part of encryption key) of
fingerprint image, which may help to set up a fingerprint matching dictionary
so that to narrow down the workload of fingerprint matching in a large
database.
CONCLUSION
REFERENCES
 Bhanu Bir, Tan Xuejun, Computational Algorithms for
Fingerprint Recognition
 Kluwer Academic Publishers, 20 Das, K. Design and
Implementation of an Efficient Thinning Algorithm
 Bachelor of Technology thesis, Department of
Computer Science and Engineering, Indian Institute of
Technology, Kanpur
 Hong, L., Wan, Y. and Jain, A. Fingerprint Image
Enhancement: Algorithm and Performance Evaluation.
 IEEE Transactions on Pattern Analysis and Machine
Intelligence,1998
THANK YOU

More Related Content

PPTX
Finger print ATM
PPTX
Cryptocurrency
PDF
Tourism management system_REPORT.pdf
PPT
Expert System Full Details
PPTX
Atm using fingerprint
PPTX
Reference models in Networks: OSI & TCP/IP
PPTX
FINGERPRINT BASED ATM SYSTEM...............
Finger print ATM
Cryptocurrency
Tourism management system_REPORT.pdf
Expert System Full Details
Atm using fingerprint
Reference models in Networks: OSI & TCP/IP
FINGERPRINT BASED ATM SYSTEM...............

What's hot (20)

PPTX
High protection ATM system with fingerprint identification technology
PDF
FINGERPRINT BASED ATM SYSTEM
DOCX
Fingerprint based transaction system
PDF
Project Synopsis
PPTX
BIOMETRIC IDENTIFICATION IN ATM’S PPT
PPTX
Graphical password authentication
PPTX
Sign language recognizer
PDF
Placement management system
PPTX
Gesture Recognition Technology-Seminar PPT
DOCX
Project synopsis on face recognition in e attendance
PDF
Fingerprint Based Biometric ATM Authentication System
PPT
Fingerprint voting system
PPT
ATM Security by using Fingerprint Recognition And GSM
PDF
Hand gesture recognition system(FYP REPORT)
PDF
3D Password PPT
DOCX
Face Recognition Attendance System
PPTX
Hand gesture recognition
PPTX
Face recognition attendance system
PPTX
human computer interface
PPTX
Presentation on security feature of atm (2)
High protection ATM system with fingerprint identification technology
FINGERPRINT BASED ATM SYSTEM
Fingerprint based transaction system
Project Synopsis
BIOMETRIC IDENTIFICATION IN ATM’S PPT
Graphical password authentication
Sign language recognizer
Placement management system
Gesture Recognition Technology-Seminar PPT
Project synopsis on face recognition in e attendance
Fingerprint Based Biometric ATM Authentication System
Fingerprint voting system
ATM Security by using Fingerprint Recognition And GSM
Hand gesture recognition system(FYP REPORT)
3D Password PPT
Face Recognition Attendance System
Hand gesture recognition
Face recognition attendance system
human computer interface
Presentation on security feature of atm (2)
Ad

Viewers also liked (18)

PPTX
Fingerprint
PPTX
Fingerprint presentation
PPT
Bio atm with-microsoft_finger_print_sdk
PPT
Fingerprint Recognition Technique(PPT)
PPTX
finger print based Atm software requirement story board
PPTX
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
PDF
Fingerprint recognition
DOC
Fingerprint based security system
PPT
Gsm.....ppt
PPTX
Top 10 fingerprint examiner interview questions and answers
PPTX
Research and implementation of smoke detection in video streams naveedakram@...
PPT
Antimicrobial agents in endodontics /prosthodontic courses
DOC
Umldiagrams ForOOAD Lab B.Tech 4-1
PPT
Boundary Extraction
PDF
UML daigrams for Bank ATM system
PPTX
PPT
ATM Frauds and Solutions
PPTX
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
Fingerprint
Fingerprint presentation
Bio atm with-microsoft_finger_print_sdk
Fingerprint Recognition Technique(PPT)
finger print based Atm software requirement story board
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
Fingerprint recognition
Fingerprint based security system
Gsm.....ppt
Top 10 fingerprint examiner interview questions and answers
Research and implementation of smoke detection in video streams naveedakram@...
Antimicrobial agents in endodontics /prosthodontic courses
Umldiagrams ForOOAD Lab B.Tech 4-1
Boundary Extraction
UML daigrams for Bank ATM system
ATM Frauds and Solutions
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
Ad

Similar to Fingerprint Authentication for ATM (20)

PDF
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
PDF
N044057478
PDF
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
PDF
Transactions Using Bio-Metric Authentication
PDF
ATM for visually challenged people
PDF
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
PDF
IRJET- Security for Building & ATM Machine
PDF
SMS hashing system (Real-Time) for the reliability of financial transactions
PPTX
eye.ppt[1].pptx whwueyyywueeyeryeurerrrrrrrrrrrrr
PDF
Advanced Security System for Bank Lockers using Biometric and GSM
PDF
IRJET- Face Recognition System with HOG in ATMS
PDF
D0351022026
PDF
IRJET- Biometric based Bank Locker System
PDF
IRJET - Anti-Fraud ATM Security System
PDF
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
PDF
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
PDF
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
PDF
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
PPTX
technical seminar-money pad.pptx
PPTX
Final PPT.pptx
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
N044057478
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
Transactions Using Bio-Metric Authentication
ATM for visually challenged people
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Security for Building & ATM Machine
SMS hashing system (Real-Time) for the reliability of financial transactions
eye.ppt[1].pptx whwueyyywueeyeryeurerrrrrrrrrrrrr
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET- Face Recognition System with HOG in ATMS
D0351022026
IRJET- Biometric based Bank Locker System
IRJET - Anti-Fraud ATM Security System
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
technical seminar-money pad.pptx
Final PPT.pptx

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
master seminar digital applications in india
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
Pharma ospi slides which help in ospi learning
PDF
Open folder Downloads.pdf yes yes ges yes
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
Business Ethics Teaching Materials for college
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Pre independence Education in Inndia.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
Basic Mud Logging Guide for educational purpose
Anesthesia in Laparoscopic Surgery in India
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
master seminar digital applications in india
Microbial diseases, their pathogenesis and prophylaxis
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Week 4 Term 3 Study Techniques revisited.pptx
Pharma ospi slides which help in ospi learning
Open folder Downloads.pdf yes yes ges yes
STATICS OF THE RIGID BODIES Hibbelers.pdf
Business Ethics Teaching Materials for college
PPH.pptx obstetrics and gynecology in nursing
O5-L3 Freight Transport Ops (International) V1.pdf
Pre independence Education in Inndia.pdf

Fingerprint Authentication for ATM

  • 1. Fingerprint Authentication for ATM BY:- Parul Varshney - 0919213069 Paras Garg - 0919213067 Upendra N. Giri - 0919213121G. L. Bajaj Institute of Technology, Gr Noida
  • 2. 1. PROBLEM STATEMENT 2. OBJECTIVE 3. INTRODUCTION 4. APPROACHES / PROCEDURE 5. SOFTWARE REQUIREMENT AND SPECIFICATION 6. FLOW CHART 7. USE CASE DIAGRAM 8. E-R DIAGRAM 9. SEQUENCE DIAGRAM 10. ACTIVITY DIAGRAM 11. CLASS DIAGRAM 12. DFD 13. SNAPSHOTS 14. ADVANTAGES / DISADVANTAGES 15. CONCLUSION CONTENT
  • 3. PROBLEM STATEMENT  In present scenario, traditional ATM system accepts only on the PIN CODE security system, enabling the other person rather than the owner to access the account very easily.  This ensures that the traditional ATM system is not fully secured.
  • 4.  The objective of our project is to provide biometric security through fingerprint authentication in ATM application.  The underlying principle is the phenomenon of biometrics “AUTHENTICATION”, in this project we propose a method for fingerprint matching based on matching algorithms. OBJECTIVE
  • 5.  The fingerprint is a person’s most unique physical characteristic.  This software can pick only authentic fingerprint out of crowd, extract that fingerprint is compared from rest of which those are stored in database.  Fingerprint recognition software is based on the ability to first recognize fingerprint, in this technological fingerprint measure the various features of each fingerprint. INTRODUCTION
  • 6. What Fingerprint Is?  A fingerprint is the feature pattern of fingers (Figure 1), and each fingerprint is unique, and every person has unique fingerprints. So fingerprints have being used for identification.  A fingerprint is composed of many ridges and furrows, fingerprints are not distinguished by their ridges And furrows, but by Minutiae, which are some abnormal points on the ridges (Figure 2).  Two types of minutiae are called termination, which is the immediate ending of a ridge and the other called bifurcation, which is the point on the ridge from which two branches derive. Figure 1 Figure 2
  • 7. What is Fingerprint Authentication?  The fingerprint authentication problem can be grouped into two sub- domains i.e. fingerprint verification and fingerprint identification.  Fingerprint verification is to verify the authenticity of one person by his fingerprint and PIN Code and Fingerprint identification is by matching the information of user such as PIN Code and Fingerprint matching. Figure 2.2. Verification vs. Identification
  • 8. Approaches For Fingerprint Recognition  The first approach, which is minutiae-based, represents the fingerprint by its local features, like terminations and bifurcations. This approach has been intensively studied, also is the backbone of the current available fingerprint recognition products.  The second approach, which uses image-based methods, tries to do matching based on the global features of a whole fingerprint image. It is an advanced approach. And it is useful to solve some intractable problems of the first approach.
  • 11. INTRODUCTION  Purpose This Software Requirements Specification provides a complete description of all the functions and specifications of the ATM system of bank. The purpose is to provide extra security to the ATM systems  Scope The ATM system is designed to run for 24 hours and to allow bank clients to carry out transactions in a secured way. The data will be held in a bank database. The system is connected to the bank database using a modem.  Document Overview The remainder of this document is two chapters, the first providing a full description of the project for the bank’s ATM with fingerprint security. This SRS gives the details about the various requirements & about the various hardware & software interfaces.
  • 12. OVERALL DESCRIPTION The ATM system encompasses various GUI menus including the SENSOR, to provide high security. It provides secure access to the account of a customer. The ATM must be able to provide the following services to the customer: Enter Pin: A customer is allowed to enter the PIN Code for his/her Account. Change Pin: A customer must be able to change the pin linked to the card. Enroll Finger: A customer is allowed to enroll the fingerprint impression which has been used to provide security to the Account Change Fingerprint: A customer is allowed to change the fingerprint impression.
  • 13. Functional Requirements Definition The software to be designed will control a simulated automated teller machine (ATM) having :  A sensor to enroll and detect fingerprint.  A customer console (keyboard and display) for interaction with the customer.(for entering PIN Code)
  • 14.  Facility of Aborting transaction A customer must be able to abort a transaction in progress by pressing the Cancel key instead of responding to a request from the machine.  PIN Code format Pin should be of exactly 4 digit.  Facility of PIN Re-entering If the customer's PIN is invalid, the customer will be required to re-enter the PIN before a transaction can proceed.  Denial of service, if PIN goes wrong. If the customer is unable to successfully enter the PIN after three tries, the service would be denied for particular card.
  • 15.  Enroll finger Enroll your finger from first joint to the tip.  Facility of Re-enrolling the finger If the customer's Fingerprint is invalid, the customer will be required to re- enroll the Fingerprint before a transaction can proceed.  Denial of service, if fingerprint goes wrong If the customer is unable to successfully enroll fingerprint after three tries, the service would be denied for that particular card.  Explanation of problem If a transaction fails for any reason other than an invalid PIN and fingerprint, the ATM will display an explanation of the problem.
  • 16. NON FUNCTIONAL REQUIREMENT There are requirements that are not functional in nature. Specifically, these are the constraints the system must follow. They are often called qualities of a system. Other terms for non-functional requirements are “constraints”,” quality attributes”,” quality goals”,” quality of service requirements” and “non-behavioral requirements”.  Scope: The scope of this project is to allow the user to get access to their account through the ATM using fingerprinting functionality.  Functionality: One customer at a time can process their account in the ATM machine.  Usability: The desktop user interface shall be Windows 95/98/2000/XP/7 complaint.  Reliability: The ATM machine must be able to scan or read the card and the fingerprint properly and identify the customer account.
  • 17.  Performance: The ATM machine support only one customer at a time. The speed and accurate transaction decides the performance factor. The screen must be clearly visible to the user.  Security: The pin number and the fingerprint in the card guarantee the security of a customer’s account. The ATM system must not store any of this data in its database. The customer with a pin number and a valid card with valid fingerprint impression is allowed to do all transactions.
  • 18. For developing the front – end interface, we have decided to use ASP.NET platform, with C# as the programming language, due to the following reasons:-  Easy to use and flexible interface.  A number of options for customizability.  Proven to provide good performance and high reliability.  Attractive and visually pleasing interface. For developing the database (back – end), we have decided to use MS-SQL Server 2008 database, due to the following reasons:-  Native support and full compatibility with ASP.NET platform .  Flexible, scalable and robust database architecture.  Used by market-leading companies worldwide.  Strong data protection and ease of management. FRONT END DESCRIPTION BACK END DESCRIPTION
  • 19. Tools Used:  Database - MS SQL Server 2008 R2  Processor - Pentium 4  Hard Disk - 5 GB  RAM - 256 MB  Sensor - Fingerprint Recognizer  Operating System - Windows 7  Database System - MS SQL Server 2008 R2  Front End - Visual Studio 2010  Framework - .NET Framework 4.0 DATABASE DESCRIPTION HARDWARE REQUIREMENT SOFTWARE REQUIREMENT
  • 30. DATA FLOW DIAGRAM LEVEL-0
  • 32. DATA FLOW DIAGRAM LEVEL-1
  • 34. DATA FLOW DIAGRAM LEVEL-2
  • 45. 1. Very high accuracy and security • Identification (Do I know who you are?) • Verification (Are you who you claim to be?) 2. Is the most economical biometric PC user authentication technique. 3. It is one of the most developed biometrics. 4. Easy to use. 5. Small storage space required for the biometric template, reducing the size of the database memory required. 6. It is standardized. 7. Enhance traditional methods (PINs, Passwords). ADVANTAGES
  • 46.  General Limitations 1. Misidentification  False Acceptance  False Rejection 2. Privacy 3. Image captured at 500 dots per inch(dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 KB approximately  Compression required ( a factor of 10 approximately).  Limitations for individual 1. Dry, wet or dirty hands. 2. For some people it is very intrusive, because it is still related to criminal identification. DISADVANTAGES
  • 47.  A smartcard based ATM fingerprint authentication scheme has been proposed. The possession (smartcard) together with the claimed user’s Biometrics (fingerprint) is required in a transaction. The smartcard is used for the first layer of mutual authentication when a user requests transaction. Biometric authentication is the second layer. The fingerprint image is encrypted via 3D map as soon as it is captured, and then is transmitted to the central server via symmetric algorithm. The encryption keys are extracted from the random pixels distribution in a raw image of fingerprint.  The stable features of the fingerprint image need not to be transmitted, it can be extracted from the templates at the central server directly.  After this, the minutiae matching is performed at the central server. The successful minutiae matching at last verifies the claimed user. Future work will focus on the study of stable features (as part of encryption key) of fingerprint image, which may help to set up a fingerprint matching dictionary so that to narrow down the workload of fingerprint matching in a large database. CONCLUSION
  • 48. REFERENCES  Bhanu Bir, Tan Xuejun, Computational Algorithms for Fingerprint Recognition  Kluwer Academic Publishers, 20 Das, K. Design and Implementation of an Efficient Thinning Algorithm  Bachelor of Technology thesis, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur  Hong, L., Wan, Y. and Jain, A. Fingerprint Image Enhancement: Algorithm and Performance Evaluation.  IEEE Transactions on Pattern Analysis and Machine Intelligence,1998