SlideShare a Scribd company logo
Technical Seminar
on
BIOMETRIC IDENTIFICATION IN ATM’S
Under the Guidance of
P.V.R.K.MURTHY, M.Tech
Assistant Professor
Presented By
•Biometric ATM are used for wide range of applications like for
Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type
interface along with at-least one Biometrics capture device like
Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face
recognition camera. They are often called Multi-Biometrics ATM, Wall
mount Biometrics ATM, Biometrics Devices / Machine.
•Most of the ATM in the past have been using ID cards to identify users
but with the wide acceptance of Biometrics , a new generation of
Biometrics ATM are being deployed for wide range of applications
worldwide.
INTRODUCTION
What is Biometrics ?
• The meaning of Biometrics comes from the Greeks.
Biometry = bio(life) + metry(to measure).
• Biometrics is the science and technology of measuring and
analyzing biological data.
• The first known example of biometrics in practice was a form of
finger printing being used in China in the 14th century.
• Biometrics refers to technologies that measure and analyze human
body characteristics such as DNA, fingerprints, eye retinas and
irises, voice patterns,facial patterns and hand measurments for
authentication purposes.
HOW BIOMETRICS WORKS ?
• Biometrics systems work by recording and comparing biometric
characteristics.
• When an individual first uses a biometric system, their identifying
features are enrolled as a reference for future comparison. This
reference may be stored in a central database or on a card (or both)
depending on the needs of the application.

Recommended for you

3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT

The 3-D password is a multifactor authentication scheme that combines these various authentication schemes into a single 3-D virtual environment. The virtual environment can contain any existing authentication scheme or even any upcoming authentication schemes by adding it as a response to actions performed on an object. Therefore, the resulted password space becomes very large compared to any existing authentication schemes.

3-d password3 d password ppt3d password ppt
Biometrics
BiometricsBiometrics
Biometrics

The document discusses biometrics, which is the automated measurement and analysis of biological data to identify individuals. It provides an introduction to biometrics and its history, importance, characteristics including physical (e.g., fingerprints, iris) and behavioral (e.g., voice, signature) traits. The biometrics process and applications in security, time/attendance, and access control are described. Advantages include uniqueness and accuracy, while disadvantages include costs and potential for false matches. The future of biometrics is promising with emerging technologies like ear and odor identification.

ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing

This document discusses biometric authentication using facial recognition technology in automated teller machines (ATMs). It provides an introduction to biometrics and how facial recognition works by measuring distinct facial features to create a unique numerical code or "faceprint". The document also outlines the process of biometric systems from data collection and transmission to decision making. It discusses some applications of biometrics like access control and benefits like increased reliability but also challenges like costs. In conclusion, it proposes using facial recognition in ATMs to provide more secure authentication while reducing fraudulent activities compared to traditional authentication methods.

• When biometric recognition is
required, the individual 's
biometric characteristics are
recorded again. This time
however, the identifying features
are compared by the system with
the stored reference to determine
if there is a close match
TYPES OF BIOMETRICS
HAND
• The three dimensional shape of a
person’s hand has several
advantages as an identification
device.
• Scanning a hand and producing a
result takes 1.2seconds.It requires
little space for data storage about 9
bytes which can fit easily magnetic
strip credit cards.
BIOMETRIC IDENTIFICATION IN ATM’S  PPT

Recommended for you

Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics

1. The document lists over 100 potential seminar topics in computer science and information technology, ranging from embedded systems and extreme programming to biometrics, quantum computing, and more. 2. Some examples include elastic quotas, electronic ink, gesture recognition, graphics processing units, grid computing, and honeypots. 3. The broad range of topics provide many options for students or professionals to explore emerging technologies and issues in computing.

electronicsproject ideasseminar topics
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere

This document summarizes a seminar presentation on ISPHERE technology for intuitive 3D modeling. ISPHERE is a spatial input device designed to reduce cognitive load. It is a foldable dodecahedron with capacitive sensors on each face that can detect hand movements and positions. The hardware sensors are connected to a microcontroller and software maps the input to manipulate 3D objects in modeling programs. The system allows more natural interactions like squeezing and stretching parts of a virtual object to transform it.

ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition

Gestures are an important form of non-verbal communication between humans and can also be used to create interfaces between humans and machines. There are several types of gestures including emblems, sign languages, gesticulation and pantomimes. Gesture recognition allows humans to interact with computers through motions of the body, especially hand movements. Some methods of gesture recognition include device-based techniques using sensors on gloves, vision-based techniques using cameras, and controller-based techniques using motion controllers. Gesture recognition has applications in areas such as virtual controllers, sign language translation, game interaction and robotic assistance.

FINGER PRINT
A fingerprint scanner system has two basic jobs :
• It needs to get an image of your finger.
• It needs to determine whether the pattern of ridges and valleys in
this image matches the pattern of ridges and valleys in pre-scanned
images.
• Only specific characteristics, which are unique to every
fingerprint, are filtered and saved as an encrypted biometric key or
mathematical representation.
No image of a fingerprint is ever saved, only a series of numbers
(a binary code), which is used for verification. The algorithm
cannot be reconverted to an image, so no one can duplicate your
fingerprints.
BIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC SYSTEM
Identification:
• A one to many comparison of the captured biometric against a
biometric database in attempt to identify an unknown
individual.
Verification:
• A one to one comparison of a captured biometric with a stored
template to verify that the individual is who he claims to be.
• Verification is faster and performs better.

Recommended for you

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM

This document discusses using biometric authentication in ATMs to address security issues. It outlines environmental and security concerns with conventional ATM systems that rely on PINs. It then describes how biometric authentication could use fingerprints, iris scans, or other biometrics to uniquely identify card holders instead of PINs. The document proposes a system that would collect biometric data, transmit it via GSM for authentication, and provide a more secure alternative to traditional ATMs.

Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition

Fingerprint recognition is a biometric technique that uses fingerprint patterns to identify or verify individuals. It works by extracting minutiae points like ridge endings and bifurcations from scanned fingerprints and matching them against a database. The process involves fingerprint acquisition using optical or semiconductor sensors, minutiae extraction after preprocessing and thinning the image, and minutiae matching for verification or identification. Fingerprint recognition has applications in security systems and has advantages of high accuracy and small storage requirements, though it can be affected by dirty or wounded fingers.

eye phone technology
eye phone technologyeye phone technology
eye phone technology

The document discusses EyePhone, a proposed technology that would allow users to control a mobile phone using only their eyes. EyePhone tracks eye movement and blinks using the front-facing camera to navigate menus, select applications, and emulate mouse clicks. It works through four phases - eye detection, open eye template creation, eye tracking through template matching, and blink detection. Potential applications include an "EyeMenu" interface and monitoring driver safety in cars. The document concludes that EyePhone shows promise as a hands-free way to control mobile devices.

• In a verification, the user must first enter his or her identity to
the biometric system. User ID's can be forgotten and cards can
be lost, making access impossible.
BIOMETRIC IDENTIFICATION IN ATM’S  PPT
MULTIBIOMETRICS
INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL
IDENTIFICATION
An automatic personal identification system based on fingerprints or
faces is often not able to meet the system performance requirements.
A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT,
FACE AND SPEECH
This system takes the advantage of the capabilities of each individual
biometric. It can be used to overcome some of the limitations of a single
biometrics.

Recommended for you

Drowsiness detection ppt
Drowsiness detection pptDrowsiness detection ppt
Drowsiness detection ppt

The Internet of Things (IoT) is the network of physical objects devices, vehicles, buildings and other items embedded with electronics, software, sensors, and network connectivity that enables these objects to collect and exchange data. Starting from small houses to huge industries, surveillance plays very vital role to fulfill our safety aspects as Burglary and theft have always been a problem. In big industries personal security means monitoring the people’s changing information like activities, behavior for the purpose of protecting, managing and influencing confidential details. Surveillance means watching over from a distance by means of electronic equipment such as CCTV cameras but it is costly for normal residents to set up such kind of system and also it does not inform the user immediately when the burglary happens.

iot
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation

This document discusses touchless technology that allows users to interact with screens without physically touching them. It describes a touchless monitor developed by TouchKo, White Electronics Designs, and Groupe 3D that uses sensors around the screen to detect 3D motions and interpret them as on-screen interactions. The document also mentions several other touchless technologies like the Touchless SDK, Touch Wall, eye tracking devices, gesture recognition tools, and motion sensors that enable touchless control of devices.

Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet

The document summarizes a seminar report on Money-Pad, a proposed future wallet that holds digital cash and financial information rather than paper cash. Money-Pad uses biometric fingerprint recognition for secure authentication of transactions. It allows for instant clearing of funds without transaction fees or credit limits. In the future, as internet access expands globally, financial transactions may be conducted via small fingerprint recognition devices without need for physical cards or pads.

•ATM Card frauds
•Use of ATM card duplicators
•Card sharing by family and friends
•Inability to trace the wrongful users
•ATM PINs can be shared on phone or recorded
using secret cameras
ISSUES IN CURRENT ATM
NETWORKS
BIOMETRIC ATMS SOLVE
THESE ISSUES & OFF
•Single/Multi factor Biometric Authentication:
Fingerprint, Iris, Face, Pal vein
•Multifactor Authentication: Card + PIN +
Biometrics
•Online or offline Authentication using smart cards
•Card less Authentication
•Biometrics is combination of card or PIN
APPLICATIONS OF BIOMETRIC
ATM
• Banking & Finance
• Food coupons / Tickets / Canteen ATM
• Membership Verification ATM
• Transaction / Check Deposit ATM
• Self Service ATM
• Retail ATM
•while a criminal might be able to obtain a password illegally,
getting a user's fingerprints would be much more
complicated.
•In addition, contrary to traditional ID cards or badges, you
can't actually lose physical features, making maintenance
more cost efficient for the business or organization, and the
technology more convenient for users.
ADVANTAGES

Recommended for you

Smart note taker
Smart note takerSmart note taker
Smart note taker

The document discusses a smart note taker product that allows users to write notes in the air that are then digitally stored. It works by using a digital pen connected to a processor that senses hand motions and shapes using a database to recognize words. Notes can then be viewed on a display, shared digitally, or printed. Current products mentioned include mobile note takers that work with smartphones and PC note takers that capture and display writing in real time on a computer. Advantages include assistance for blind users and note-taking during phone calls or presentations.

Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT

Screenless display is the present evolving technology in the field of the computer-enhanced technologies.

Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT

This document provides an overview of gesture recognition technology. It begins with introducing gestures as a form of non-verbal communication and defines gesture recognition as interpreting human gestures through mathematical algorithms. It then discusses the motivation for gesture recognition, including its naturalness and applications in overcoming interaction problems with traditional input devices. The document outlines different types of gestures, input devices like gloves and cameras, challenges like developing standardized gesture languages, and uses like sign language recognition, virtual controllers, and assisting disabled individuals. It concludes with references for further reading.

recognitiontechnologyseminar
•Biometric identification machines are traditionally more
expensive to buy than traditional ones.
•Biometric identification machines are not always entirely
accurate. For example, an individual with a cold may not be able
to identify himself using a voice identification device, and
people who gain or lose weight may suddenly lose access to a
place protected by a system analyzing facial features.
DISADVANTAGES
CONCLUSION
Biometric tokens are the safest means of preventing ATM frauds.
• The main reason for introducing biometric systems is to increase
overall security.
• Biometrics offers greater security and convenience than traditional
methods of personal recognition.
• In some applications, biometrics can replace or supplement the
existing technology. In others, it is the only viable approach.
• The biometric system is only one part of an overall identification or
authentication process, and the other parts of that process will play an
equal role in determining its effectiveness
ATMS OF THE FUTURE
Today’s biometric scanners go far beyond basic fingerprint recognition.
• In Poland and Japan, consumers are already using Hitachi's infrared
scanners that capture the unique pattern of capillaries in the finger and
hand.
• The most secure biometric technology uses a device designed to
perform an iris scan based on more than 2,000 unique measurement
points.
• According to developers, people and pets all over the world will be
connected to a system that uses iris scan identification within the next
decade.
REFERENCES
•Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in
Information Technology, Excel Publication, New Delhi (2009)
• James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio,
Biometric Systems: Technology, Design and Performance
Evaluation, Springer .
• Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar,
Handbook of Fingerprint Recognition, Springer .
• John Chirillo, Scott Blaul, Implementing Biometric Security,
Wiley Red Books

Recommended for you

SMART DUST
SMART DUSTSMART DUST
SMART DUST

Smart dust is a network of tiny sensor-enabled devices called motes that can monitor environmental conditions. Each mote contains sensors, computing power, wireless communication, and an autonomous power supply within a volume of a few millimeters. They communicate with each other and a base station using radio frequency or optical transmission. Major challenges in developing smart dust include fitting all components into a small size while minimizing energy usage. Potential applications include environmental monitoring, healthcare, security, and traffic monitoring.

An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye

This document proposes an ATM system that uses facial recognition instead of cards and PINs for verification. It would work by having a camera installed on the ATM that takes a photo of the customer's face and compares it to an image stored in the bank's database associated with the account. This would provide increased security by matching a live photo to the stored image without needing a card or PIN. The document outlines the components, techniques, process and potential benefits of such a biometric-based ATM system for more reliable authentication.

Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx

This document discusses biometric ATMs as an authentication method that uses physiological characteristics like fingerprints instead of passwords or cards. It notes that biometric ATMs can help solve issues with ATM fraud by providing stronger authentication through factors like fingerprint, iris, or facial recognition alone or combined with cards and PINs. The document outlines the components of a biometric system and various biometric methods like fingerprints, facial recognition, iris scans that are being used in biometric ATMs. It suggests biometric ATMs can reduce costs compared to traditional card-based ATMs while providing convenient and secure access for users.

about atm
BIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPT

More Related Content

What's hot

Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
Tarun tyagi
 
Iris scanning
Iris scanningIris scanning
Iris scanning
himansupaichha
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
Seminar Links
 
Biometrics
BiometricsBiometrics
Biometrics
umertariq12345
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
shahab islam
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
123seminarsonly
 
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere
Kedar Damkondwar
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
Aayush Agrawal
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
Alpesh Kurhade
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
ranjit banshpal
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
Naga Dinesh
 
Drowsiness detection ppt
Drowsiness detection pptDrowsiness detection ppt
Drowsiness detection ppt
safepassage
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
Aparna Nk
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
PRADEEP Cheekatla
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
Vikas Kumar
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
Suraj Rai
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
Khyravdhy Tannaya
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
John Williams
 

What's hot (20)

Mind reading computer ppt
Mind reading computer pptMind reading computer ppt
Mind reading computer ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Biometrics
BiometricsBiometrics
Biometrics
 
ATM System by image processing
ATM System by image processingATM System by image processing
ATM System by image processing
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Seminar on isphere
Seminar on isphereSeminar on isphere
Seminar on isphere
 
ppt of gesture recognition
ppt of gesture recognitionppt of gesture recognition
ppt of gesture recognition
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Drowsiness detection ppt
Drowsiness detection pptDrowsiness detection ppt
Drowsiness detection ppt
 
Touchless technology Seminar Presentation
Touchless technology Seminar PresentationTouchless technology Seminar Presentation
Touchless technology Seminar Presentation
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Screenless Display PPT
Screenless Display PPTScreenless Display PPT
Screenless Display PPT
 
Gesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPTGesture Recognition Technology-Seminar PPT
Gesture Recognition Technology-Seminar PPT
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 

Similar to BIOMETRIC IDENTIFICATION IN ATM’S PPT

Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
Pavani839789
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
kantharajubn600
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
Ankan Biswas
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
MdAminulkhan1
 
Biometrics
Biometrics Biometrics
Biometrics
Rana Bilal
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
Avanitrambadiya
 
Security
SecuritySecurity
Security
AyushiGupta3123
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
Sagar Verma
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
1A255Gauravwankar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
shyampariyar
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
TusharKataria22
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
branjith
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
SundusKhan42
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
ijtsrd
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
mounika117
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
Sudip Sadhukhan
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
MaidaShahbaz3
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
Girish Kengar
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
Augustine Micahel
 

Similar to BIOMETRIC IDENTIFICATION IN ATM’S PPT (20)

Biometric ATM (1).pptx
Biometric ATM (1).pptxBiometric ATM (1).pptx
Biometric ATM (1).pptx
 
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffffSeminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
Seminar ppt BIOMETRIC.pptxhgjcjyffffffffffffffffffffffffffff
 
Finger print ATM
Finger print ATMFinger print ATM
Finger print ATM
 
2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication2001229094(1).pptx biometrics authentication
2001229094(1).pptx biometrics authentication
 
Biometrics
Biometrics Biometrics
Biometrics
 
Bio-metrics Technology
Bio-metrics TechnologyBio-metrics Technology
Bio-metrics Technology
 
Security
SecuritySecurity
Security
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptxSEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
SEMINAR ON BIOMETRIC TECHNOLOGY.1pptx.pptx
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
Bio-Metric Technology
Bio-Metric TechnologyBio-Metric Technology
Bio-Metric Technology
 
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptxBIOMETRICS BY TUSHAR AND HARSHIT.pptx
BIOMETRICS BY TUSHAR AND HARSHIT.pptx
 
Ranjith_Bm
Ranjith_BmRanjith_Bm
Ranjith_Bm
 
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptxBIOMETRICS AND SMART EYE TECHNOLOGY.pptx
BIOMETRICS AND SMART EYE TECHNOLOGY.pptx
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)BIOMETRIC (TO PRERVE OUR IDENTY)
BIOMETRIC (TO PRERVE OUR IDENTY)
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Fingerprinting technology
Fingerprinting technologyFingerprinting technology
Fingerprinting technology
 
Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion Biomertis By Girish KenGar (WeenZy ProDucTion
Biomertis By Girish KenGar (WeenZy ProDucTion
 
Palm vein technology
Palm vein technologyPalm vein technology
Palm vein technology
 

More from sravya raju

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
sravya raju
 
Hawk Eye Technology ppt
Hawk Eye Technology pptHawk Eye Technology ppt
Hawk Eye Technology ppt
sravya raju
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
sravya raju
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
sravya raju
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
sravya raju
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
sravya raju
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
sravya raju
 

More from sravya raju (7)

Secure shell ppt
Secure shell pptSecure shell ppt
Secure shell ppt
 
Hawk Eye Technology ppt
Hawk Eye Technology pptHawk Eye Technology ppt
Hawk Eye Technology ppt
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
HADOOP TECHNOLOGY ppt
HADOOP  TECHNOLOGY pptHADOOP  TECHNOLOGY ppt
HADOOP TECHNOLOGY ppt
 
PERSON DE-IDENTIFICATION IN VIDEOS ppt
PERSON DE-IDENTIFICATION IN VIDEOS  pptPERSON DE-IDENTIFICATION IN VIDEOS  ppt
PERSON DE-IDENTIFICATION IN VIDEOS ppt
 

Recently uploaded

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
Kief Morris
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
Toru Tamaki
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
Matthew Sinclair
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Mydbops
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
Stephanie Beckett
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
HackersList
 

Recently uploaded (20)

Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
[Talk] Moving Beyond Spaghetti Infrastructure [AOTB] 2024-07-04.pdf
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-InTrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
TrustArc Webinar - 2024 Data Privacy Trends: A Mid-Year Check-In
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...
 
20240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 202420240705 QFM024 Irresponsible AI Reading List June 2024
20240705 QFM024 Irresponsible AI Reading List June 2024
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - MydbopsScaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
Scaling Connections in PostgreSQL Postgres Bangalore(PGBLR) Meetup-2 - Mydbops
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024What’s New in Teams Calling, Meetings and Devices May 2024
What’s New in Teams Calling, Meetings and Devices May 2024
 
How Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdfHow Social Media Hackers Help You to See Your Wife's Message.pdf
How Social Media Hackers Help You to See Your Wife's Message.pdf
 

BIOMETRIC IDENTIFICATION IN ATM’S PPT

  • 1. Technical Seminar on BIOMETRIC IDENTIFICATION IN ATM’S Under the Guidance of P.V.R.K.MURTHY, M.Tech Assistant Professor Presented By
  • 2. •Biometric ATM are used for wide range of applications like for Banking, Coupons & Self service ATM. Biometrics ATM offer ATM type interface along with at-least one Biometrics capture device like Fingerprint Scanner, Iris camera, Palm/Finger Vein scanner , Face recognition camera. They are often called Multi-Biometrics ATM, Wall mount Biometrics ATM, Biometrics Devices / Machine. •Most of the ATM in the past have been using ID cards to identify users but with the wide acceptance of Biometrics , a new generation of Biometrics ATM are being deployed for wide range of applications worldwide. INTRODUCTION
  • 3. What is Biometrics ? • The meaning of Biometrics comes from the Greeks. Biometry = bio(life) + metry(to measure). • Biometrics is the science and technology of measuring and analyzing biological data. • The first known example of biometrics in practice was a form of finger printing being used in China in the 14th century. • Biometrics refers to technologies that measure and analyze human body characteristics such as DNA, fingerprints, eye retinas and irises, voice patterns,facial patterns and hand measurments for authentication purposes.
  • 4. HOW BIOMETRICS WORKS ? • Biometrics systems work by recording and comparing biometric characteristics. • When an individual first uses a biometric system, their identifying features are enrolled as a reference for future comparison. This reference may be stored in a central database or on a card (or both) depending on the needs of the application.
  • 5. • When biometric recognition is required, the individual 's biometric characteristics are recorded again. This time however, the identifying features are compared by the system with the stored reference to determine if there is a close match
  • 7. HAND • The three dimensional shape of a person’s hand has several advantages as an identification device. • Scanning a hand and producing a result takes 1.2seconds.It requires little space for data storage about 9 bytes which can fit easily magnetic strip credit cards.
  • 9. FINGER PRINT A fingerprint scanner system has two basic jobs : • It needs to get an image of your finger. • It needs to determine whether the pattern of ridges and valleys in this image matches the pattern of ridges and valleys in pre-scanned images. • Only specific characteristics, which are unique to every fingerprint, are filtered and saved as an encrypted biometric key or mathematical representation.
  • 10. No image of a fingerprint is ever saved, only a series of numbers (a binary code), which is used for verification. The algorithm cannot be reconverted to an image, so no one can duplicate your fingerprints.
  • 12. BIOMETRIC SYSTEM Identification: • A one to many comparison of the captured biometric against a biometric database in attempt to identify an unknown individual. Verification: • A one to one comparison of a captured biometric with a stored template to verify that the individual is who he claims to be. • Verification is faster and performs better.
  • 13. • In a verification, the user must first enter his or her identity to the biometric system. User ID's can be forgotten and cards can be lost, making access impossible.
  • 16. INTEGRATING FACES AND FINGER PRINTS FOR PERSONAL IDENTIFICATION An automatic personal identification system based on fingerprints or faces is often not able to meet the system performance requirements. A MULTIMODEL BIOMETRIC SYSTEM USING FINGERPRINT, FACE AND SPEECH This system takes the advantage of the capabilities of each individual biometric. It can be used to overcome some of the limitations of a single biometrics.
  • 17. •ATM Card frauds •Use of ATM card duplicators •Card sharing by family and friends •Inability to trace the wrongful users •ATM PINs can be shared on phone or recorded using secret cameras ISSUES IN CURRENT ATM NETWORKS
  • 18. BIOMETRIC ATMS SOLVE THESE ISSUES & OFF •Single/Multi factor Biometric Authentication: Fingerprint, Iris, Face, Pal vein •Multifactor Authentication: Card + PIN + Biometrics •Online or offline Authentication using smart cards •Card less Authentication •Biometrics is combination of card or PIN
  • 19. APPLICATIONS OF BIOMETRIC ATM • Banking & Finance • Food coupons / Tickets / Canteen ATM • Membership Verification ATM • Transaction / Check Deposit ATM • Self Service ATM • Retail ATM
  • 20. •while a criminal might be able to obtain a password illegally, getting a user's fingerprints would be much more complicated. •In addition, contrary to traditional ID cards or badges, you can't actually lose physical features, making maintenance more cost efficient for the business or organization, and the technology more convenient for users. ADVANTAGES
  • 21. •Biometric identification machines are traditionally more expensive to buy than traditional ones. •Biometric identification machines are not always entirely accurate. For example, an individual with a cold may not be able to identify himself using a voice identification device, and people who gain or lose weight may suddenly lose access to a place protected by a system analyzing facial features. DISADVANTAGES
  • 22. CONCLUSION Biometric tokens are the safest means of preventing ATM frauds. • The main reason for introducing biometric systems is to increase overall security. • Biometrics offers greater security and convenience than traditional methods of personal recognition. • In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. • The biometric system is only one part of an overall identification or authentication process, and the other parts of that process will play an equal role in determining its effectiveness
  • 23. ATMS OF THE FUTURE Today’s biometric scanners go far beyond basic fingerprint recognition. • In Poland and Japan, consumers are already using Hitachi's infrared scanners that capture the unique pattern of capillaries in the finger and hand. • The most secure biometric technology uses a device designed to perform an iris scan based on more than 2,000 unique measurement points. • According to developers, people and pets all over the world will be connected to a system that uses iris scan identification within the next decade.
  • 24. REFERENCES •Arpita Gopal, Chandrani Singh, e-World : Emerging Trends in Information Technology, Excel Publication, New Delhi (2009) • James L. Wayman, Anil K. Jain, Davide Maltoni, and Dario Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer . • Davide Maltoni, Dario Maio, Anil K. Jain, Salil Prabhakar, Handbook of Fingerprint Recognition, Springer . • John Chirillo, Scott Blaul, Implementing Biometric Security, Wiley Red Books