E136-converted Essay

SMART ATM SECURITY SYSTEM USING IRIS RECOGNITION

S.N.Lalitha Parameswari M.E., 1 E.Arul priya2, R.Chellam3, A.Manoranjitham4, P.Sowmiya5 1_Senior Assistant Professor, 2-5 _ UG Scholar

Electronics & Communication Engineering, Chettinad College of Engineering & Technology, Karur.

[email protected], [email protected], [email protected], [email protected], [email protected]

Ph.: 9486128997, 8940431472, 8973832003, 8489892980, 8220032570

Abstract— In order to provide reliable security solution to the people, the concept of smart ATM security system based on Embedded System is suggested in this paper.

The study is focused on Design and Implementation of Iris Recognition based ATM Security System using Embedded System. The system is implemented on the Arduino UNO board. High level security mechanism is provided by the consecutive actions such as initially system captures the human Eye (Iris) and check whether the human Eye is detected properly or not. The Iris is matched with account detail then the user can withdrawal the money. If the Iris is not detected properly, it warns the user to adjust him/her properly to detect the Iris.

Still the Iris is not detected properly the system will lock the monitor of the ATM for security purpose. As soon as the ATM monitor is lock, the system will automatic generates 3 digit OTP code. The OTP code will be sent to the user’s registered mobile number through SMS using GSM module which is connected with the Arduino UNO. User will enter the generated OTP through keypad which is interfaced with the Arduino UNO. The OTP will be verified and if it is correct then ATM monitor will be unlock otherwise it will remain lock and finally, the location of ATM card accessed is tracked by GPS which is connected to the Arduino UNO.

Index Terms—ATM (Automatic Teller Machine), OTP, Iris Recognition.

I INTRODUCTION

An Automatic Teller Machine (ATM) is a computerized machine that uses to withdraw the cash from customer’s respective bank account. As

financial user prefer ATM for cash withdrawals, cash deposits & many other transaction, the banks are focusing a lot over the security of ATMs. ATM should be protected properly from the criminal activities or from any unwanted things. Some of the current existing ATM securities are discussed as follows:

In the Alert -Based Monitoring System, when anyone enters the ATM room, it triggers the sensor which sends an alert to the monitoring station. In case of any unwanted activities, sensor send alarm alert signal to monitoring station. After this the monitoring center will have the immediate access of voice and video of the ATM room. Video verification is done and if any unwanted activity is confirmed a strong signal is send to the ATM and security is send to the ATM room to bust the thieves.

In Motion Based Monitoring System, special watch is kept during the night hours as chances of any burglary attempt is more at that time. When anyone enters the room during this time an alert signal is send to the monitoring station and the control system will have the access to the video and audio of the room. They will check for the activities in the ATM. If it is a customer the alert will be closed and in case of unwanted activities two way communication channels are created to warn the person in the room to stop them from stealing.

In Live Site Monitoring System, The ATM room is kept under surveillance as whole time. In case of any unwanted activities, sirens are deployed and two way audio is used to warn the user. The security is send to the place immediately. The current existing system cannot be deployed as:

It is very time consuming.

Lots of people need to be deployed for constant monitoring purpose.

The cost for setting up this system is high.

In case the internet is down and then the whole system will be dead, which will be a total waste.

II EXISTING SYSTEM VS PROPOSED SYSTEM

This project gives the description of the new approach towards the security of ATM (Automatic Teller Machine) systems which is developed using the embedded system and advanced technologies. Now-a-days hackers are easily hacking the account holder pin number, details and easily taking over the money which has been overcome in this project. In previous model of ATM Security System Face Detection used to captures the human face and if the face is not detected properly the system will lock the door of the ATM cabin for security purpose , if face is detected the person can easily access the ATM card, but here we are overcoming these problems. The Projected System is focusing on to detect the Iris face of the user properly before accessing the ATM machine.

III SYSTEM DESCRIPTIONS

Figure 1 shows the complete system description. The whole system is implemented on the embedded System using Arduino UNO board. In this system initially camera can capture the human eye, if any person accesses the ATM card in the machine that is connected to the Arduino UNO board. The user Iris is not detected properly the person will not be allowed to access the ATM. If the face of the person is not detected, the warning will be given to the user, still if Iris detected is not matched to the authorize user of bank will be locked the ATM machine.

In this system initially camera can capture the human eye, if any person accesses the ATM card in the machine that is connected to the Arduino UNO board.

Fig. 1 Proposed Block Diagram

The user Iris is not detected properly the person will not be allowed to access the ATM. If the face of the person is not detected, the warning will be given to the user, still if Iris detected is not matched to the authorize user of bank will be locked the ATM machine.

The system will generate a 3 digit OTP by GSM Module that is connected to the Arduino board which will be sent to the authorized bank personnel who are the only one who can unlock the ATM machine and then release the money.

The generated 3 digit OTP will not enter in the ATM machine then alert message is send to the authorized bank personnel for automatically lock the card.

If anybody tries to break the ATM machine, vibrator sensor used here which sense vibration from the ATM machine. Once the vibration is sensed the beep sound will occurs from Buzzer. DC Motor is used for close the door of ATM cabin. As soon as the door is lock, the system will automatic generates 3 digit OTP code. The OTP code will be sent to the watchman’s registered mobile number through SMS using GSM module which is

connected with the Arduino UNO board. Watchman will enter the generated OTP through keypad which is interfaced with the Keyboard. The OTP will be verified and if it is correct then will remain lock. The projected system is easy to implement and the cost for setting up the system is not so high.

IV METHODOLOGY

The flow of this block diagram is given below.

First we will initialize all the components start the procedure by scanning the RFID, Camera scans the iris of user and we will ask to enter the amount and machine release the amount if it is authenticated.

We need to enter OTP, if scanning the biometric unauthenticated sends to user mobile number through that OTP unauthenticated person can gets the money.

V SOFTWARE DESCRIPTION

MATLAB 2014 or above versions

MATLAB (matrix laboratory) is a multi- paradigm numericalcomputing environment and proprietary programming language developed by Math Works. MATLAB allows matrix manipulation, plotting of functions and data, implementation of algorithms, creation of user interfaces and interfacing with program written in other language, including C, C++, C#, Java, Fortran and Python.

4394834170347

Iris recognition has been paid more attentions due to its high reliability in personal identification recently. In this paper, an iris recognition system has been proposed. The steps of the proposed method include iris recognition, feature extraction and matching of the iris pattern. To describe the iris data DWT based features are used and for analyze purpose feature matching is employed. Experiments are performed using iris images obtained from database. The method gives correct classification rate.

Iris Recognition Method

Figure 2 shows the complete system description about the iris recognition process.

Image Capture:

The first step consists of capturing the image of the iris of the person whose identity needs to be verified. The image capture itself can be manual or automated but it needs to be ensured that the needs to be verified. The image capture itself can be manual or automated but it needs to be ensured that the Iris is in proper focus and that the image is captured with clarity.

Image Acquisition:

Image acquisition is considered the most critical step in the project since all subsequent stages

depend highly on the image quality. In order to accomplish this, we use a CCD camera. We set the resolution to 640×480, the type of the image to jpeg, and the mode to white and black for greater details. The camera is situated normally between half a meters to one meter from the subject.

658912227162

Fig. 2 IRIS Recognition Process

Segmentation Technique:

The principal of the segmentation technique is to locate the iris region in the eye image. This involves locating the internal borderline between the pupil, the small aperture, and the iris region and the exterior borderline between the iris and the sclera, the white colored part of the eye. In most models, these boundaries, which might not be perfectly circular, are modeled as two un-concentric circles.

Iris, the pigmented region of the eye, can be separated from the sclera, the white area of the eye, but is lighter than the pupil. Segmentation techniques are based on this assumption simplifying the process to a large extent. This variation in intensity is employed to threshold the iris image using upper and lower intensity limits. This thresholded image can be further studied by a circular edge detector determining the edges of sclera with iris and iris with a pupil. As a result, iris region is segmented from the rest of eye image. Although this approach simplifies the edge detection step, but in the way introduces the problem of finding safe threshold levels.

Normalization:

After the segmentation technique is executed, normalization is performed in all studied iris recognition systems to obtain:

invariance to iris size,

position and

different degrees of pupil dilation

When matching different iris patterns at a later stage.

Feature Extraction:

The encoding, or feature extraction, aims to segregate as many refined features as could be allowed from the iris template and results in an iris signature, or trademark indication, containing these segregated features. The principal aim of matching process between two templates is to enhance the contingency of an accurate match for authentic detection tries and minimize inaccurate and invalid matches for a charlatan. In other words, images of the same iris taken at different times should be identified as being the same person, and images from different irises should be marked as coming from different individuals.

RESULT

The Experimental Setup with all the interfaced components are shown in Fig. 3 and result of entire system is shown in Fig.4

4124451117307

Fig. 3 Experimental Setup

The overall result of the developed ATM system is shown on the LCD display. RFID card is used to start the normal ATM procedure. GSM is used to send the OTP to the registered mobile number. Camera is used to scan the biometric (IRIS). Where the LCD, GSM and RFIDS are connected to Arduino uno to perform the desired operation.

Fig. 4 Overall System Result

CONCLUSION

This project is developed on the basis of more need of security in ATM banking system. Now-a-day’s ATM is getting less secure with emerging ways to hack/crack ATM PIN or ATM card. The ATM user’s cash transaction is secured by adding the biometric and OTP to the existing system along with this ATM machine is secured by using the vibration sensor for theft. Here we use the IRIS recognition which is unique for each user that provides highly security for every transaction. This project entirely depend on IRIS recognition, RFID and GSM technologies where the RFID read the card information and also accessing and GSM is used to send the SMS to card user when the card is theft. GSM and RFID communicate using serial communication port. This project provides secure accessing of the smart card. If an unauthorized person accesses the card, a message will be generated automatically.

References

S.S, Das and J. Debbarma, “Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian e-banking System”, International Journal of Information and Communication Technology Research, vol.1, no. , pp.197-203, 2011.

Mr. John Mashurano1, Mr. Wang liqiang2, “ATM Systems Authentication Based On Fingerprint Using ARM Cortex-M3”

International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 3, March

– 2013 ISSN: 2278-0181

S.T. Bhosale and Dr. B.S.Sawant “SECURITY IN E-BANKING VIA CARD LESS BIOMETRIC ATMS”, International Journal of Advanced Technology & Engineering Research, Volume 2, Issue 4, July 2012

Prof. Selina Oko and Jane Oruh, “ENHANCED ATM SECURITY SYSTEM USING BIOMETRICS”, IJCSI International Journal of Computer Science Issues, Vol. 9,

Issue 5, No 3, September 2012

. Czajka, “Pupil dynamics for iris liveness detection,” IEEE Trans. Inf.Forensics Secure., vol. 10, no. 4, pp. 726–735, Feb. 2015. .

Rajesh V.Vishnupriya S. “IBIO Anew approach for ATM banking system” International conference on Electronic and communication System2014.

Joyce Soares, A.N.Gaikwad,”Fingerprint and iris Biometric controlled smart machine embedded with GSM Technology for OTP” International Conference on automatic control and dynamic optimization techniques2016.

Suman Sengupta and Tutu Sengupta, “IRIS Texture Analysis, Finger Printing and Signature Verification for Automatic Data Retrieval System using Biometric Pattern Recognition System”, International Conference on Advances in Computing and Management , 2012.

Poulami Das, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay and Tai-hoon Kim, “Person Identification through IRIS Recognition”, International Journal of Security and its Applications, Vol. 3, No. 1, January, 2009.

[10]] J. G. Daugman and C. J. Downing, “Epigenetic randomness, complexity, and singularity of human iris patterns”, Proc. Royal Soc. Lond. B, Biol. Sci., vol. 268, pp. 1737– 1740, 2001.

[11]] Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay and Tai-hoon Kim, “IRIS Texture Analysis and Feature Extraction for Biometric Pattern Recognition,” International Journal of Database Theory and Application, 2008.

Still stressed from student homework?
Get quality assistance from academic writers!