0% found this document useful (0 votes)
110 views

Fingerprint Authentication For ATM

The document describes a fingerprint authentication system for ATMs. It proposes using fingerprint recognition instead of PIN codes alone. A team of 4 students will build the system using a fingerprint sensor and scanner, SQL Server database, and Visual Studio. The system aims to verify users by matching their stored fingerprint template to the scanned print, addressing security issues with the traditional PIN-only method.

Uploaded by

Rohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views

Fingerprint Authentication For ATM

The document describes a fingerprint authentication system for ATMs. It proposes using fingerprint recognition instead of PIN codes alone. A team of 4 students will build the system using a fingerprint sensor and scanner, SQL Server database, and Visual Studio. The system aims to verify users by matching their stored fingerprint template to the scanned print, addressing security issues with the traditional PIN-only method.

Uploaded by

Rohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

FINGERPRINT

AUTHENTICATION FOR
ATM
TEAM MEMBERS
SRINIVASAN
RAGUL
RISHIVARTHAN
SUDHARSAN
INTRODUCTION

 The fingerprint is a person's most unique physical characteristic...


 This software can pick only authentic fingerprint out of crowd,
extract that fingerprint is compared from rest of which those are
stored in database.
 Fingerprint recognition software is based on the ability to first
recognize fingerprint, in this technological fingerprint measure
the various features of each fingerprint.
PROBLEM STATEMENT

In present scenario, traditional ATM system accepts only


on the PIN CODE security system, enabling the other
person rather than the owner to access the account very
easily.. This ensures that the traditional ATM system is not
fully secured.
OBJECTIVE

 The objective of our project is to provide biometric security


through fingerprint authentication in ATM application.
 The underlying principle is the phenomenon of biometrics
"AUTHENTICATION", in this project we propose a method for
fingerprint matching based on matching algorithms.
What Fingerprint Is?

 • A fingerprint is the feature pattern of fingers , and each


fingerprint is unique, and every person has unique fingerprints.
So fingerprints have being used for identification.
 A fingerprint is composed of many ridges and furrows,
fingerprints are not distinguished by their ridges And furrows, but
by Minutiae, which are some abnormal points on the ridges.
 Two types of minutiae are called termination, which is the
immediate ending of a ridge and the other called bifurcation,
which is the point on the ridge from which two branches derive.
What is Fingerprint Authentication?

 The fingerprint authentication problem can be grouped


into two sub domains i.e. fingerprint verification and
fingerprint identification.
 Fingerprintverification is to verify the authenticity of
one person by his fingerprint and PIN Code and
 Fingerprint identification is by matching the information
of user such as PIN Code and Fingerprint matching.
TOOLS AND TECHNOLOGY
 DATABASE DESCRIPTION
Tools UsedDatabase:MS SQL Server 2008 R2
 HARDWARE REQUIREMENT
Processor-Pentium 4
Hard Disk-5 GBRAM-256 MB
Sensor-Fingerprint Recognizer
 SOFTWARE REQUIREMENT
Operating System- Windows 10
Database System-MS SQL Server 2008 R2
Front End-Visual Studio 2010
Framework-NET Framework 4.0
CONCLUSION
A smartcard based ATM fingerprint authentication scheme has been
proposed. The possession together with the claimed user's
Biometrics is required in a transaction. The smartcard is used for
the first layer of mutual authentication when a user requests
transaction. Biometric authentication is the second layer. The
fingerprint image is encrypted via 3D map as soon as it is captured,
and then is transmitted to the central server via symmetric
algorithm. The encryption keys are extracted from the random pixels
distribution in a raw image of fingerprint.The stable features of the
fingerprint image need not to be transmitted, it can be extracted
from the templates at the central server directly.. After this, the
minutiae matching is performed at the central server. The successful
minutiae matching at last verifies the claimed user. Future work will
focus on the study of stable features of fingerprint image, which
may help to set up a fingerprint matching dictionary so that to
narrow down the workload of fingerprint matching in a large

You might also like