FINGERPRINT BASED SECURED FLEXIBLE SYSTEM FOR ATM TRANSACTIONS K.SATHIBABU1, B.SURESHRAM2 1 M.Tech, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India, Email:komurelli.sathi@gmail.com 2 Assoc.Prof, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India, Email:sram6383@gmail.com Abstract: I. INTRODUCTION The security of the financial transactions of the customers that use the ATM machines can be increased using this system. Once user’s bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. Using credit card and password cannot verify the client’s identity exactly. so to rectify these problems we are implementing this paper under fingerprint based. Now a day’s using the ATM (Automatic Teller Machine) which provides customers with the convenient banknote trading is very common. However, the financial crime case rises repeatedly in recent years; a lot of criminals tamper with the ATM terminal and steal user’s credit card and password by illegal means. How to carry on the valid identity to the customer becomes the focus in current financial circle This Authentication method combined with the biometric. And here we are giving access to multiple persons, who are known to authorized person. Those multiple persons fingerprint also will be saved into data server. System will treat them as authorized persons. From those multiple authorized persons anyone can access ATM terminal .For other people tries to access it will generate OTP to authorized person, if they enter correct OTP it allows them to access ATM terminal otherwise those persons fingerprints will be saved into data server, ATM ROOM DOOR will be locked, gives alarm to security and message alerts will be sent to authorized person. With the development of computer network technology and e-commerce, the self-service banking system has got extensive popularization with the characteristic offering high-quality 24 hours service for customer. Present days bankers using the ATM which provides customers with the convenient banknote. But the financial crime case rises repeatedly in recent years; a lot of criminals tamper with the ATM terminal and steal user's credit card and password by illegal means. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer. By using this hashing scheme, the money cannot be taken by strangers. KEYWORDS: Fingerprint module, GSM I.INTRODUCTION Module, DC motors, KEY Pad, Smart card reader, Smart card. For solving the bugs of traditional ones, the author designs new ATM terminal customer recognition system. The chip of LPC1768 is used for the core of microprocessor in ARM CORTEX-M3.furthermore, a improved enhancement algorithm of fingerprint image increase the security that customer use the ATM machine. START INITIALIZE SMART CARD READER, GSM, KEYPAD, FINGERPRINT MODULE II. SOFTWARE DESIGN ENROLL THE FINGERPRINTS The design of entire system consisted of two part which are hardware and software. The hardware is designed by the rules of embedded system, Steps of software Consisted of three parts. Software design The design was component of two parts included the design of main program flow chart, the initializing one. This system of software is implemented by the steps as follows: first of all, embedded program and the File system are loaded into the main chip. The next, the system is initialized to implement specific task, such as checking ATM system, GSM communication, DC motor and so on, and then each module reset for ready to run commands. Before using ATM terminal, the mobile number and fingerprint of the customer is required. First the system is required the owner's fingerprint. If all the recognition is right, it allows the person to access ATM terminal otherwise the system would send OTP to the Account holder and if he enter the same OTP in time for accessing the ATM Terminal.If OTP is valid system allows to accss otherwise the ATM room door will bw locked ,buzzer will be on and message alerts will be sent to authorized peron.Flow chart of software shown in figure1.The main parts of flow chart are a) b) c) d) Initilizing Enrolling Accessing Authentication (MULTIPLE FINERPRINTS) REGISTER THE MOBILE NUMBER INSERT THE SMART CARD READ THE FINGERPRINTS FAILURE AUTHENT ICATION? SUCCESS SEND OTP BY SERVER ENTER OTP IN TIME CHECK OTP? VALID DO THE TRANSACTION INVALID SAVE UNAUTHORIZED FINGER PRINTS ATM ROOM DOOR WILL BE CLOSED ALARM WILL BE ON TO SECURITY GUARDS MESSAGE ALERTS WILL BE SENT TO AUTHORIZED PERSON START Fig1 Overall flow chart of software In the process of inputting fingerprint, the KY-M6 which is a linear sensor that captures fingerprint images by sweeping the finger over the sensing area, will used for acquiring the image of fingerprint. This product embeds true hardware based 8-way navigation and click functions. The fingerprint information will be temporarily stored in SRAM and upload to the remote finger data server to compare through bank network. The result of process will be controlled by main chip (LPC1768). The initializing process means that set the hardware and software and then starts the multiple mission modules, each module will be started according to the priority processes. At first, initialize the system clock, and execute the codes of open interrupt and the open interrupt task. Then, the system would judge and enter process of module. Finally, the system would start to attempt multiple tasks. V. VI. KEY pad BUZZER These modules are shown in a proper way in block diagram as shown in fig2. MOBILE SMART CARD GSM MODEM SMART CARD READER FINGERPRINT MODULE LPC1768 Cortex-M3 LCD DISPLAY BUZZER DATA SERVER KEYPAD DC MOTOR III.SYSTEM MODEL The design of entire system consisted of two part which are hardware and software. The hardware is designed by the rules of embedded system. Hardware Design The LPC1768 chip is used as the core of entire hardware. Furthermore, the modules of LCD, keypad, buzzer, fingerprint recognition, DC motor are connected with the main chip (LPC1768). The SRAM and FLASH are also embodied in the system. BLOCK DIAGRAM The “Fingerprint Based Secured Flexible System for ATM Transactions” works on few important components those are I. II. III. IV. LPC 1768 CONTROLLER Fingerprint Module DC Motor GSM Module Fig2 Block Diagram of Hardware 1. LPC1768: The LPC1768 LPCXpresso board with NXP's ARM Cortex-M3 microcontroller has been designed to make it as easy as possible to get started with Cortex-M3. The LPCXpresso comprises a target board combined with a JTAG debugger. A free Eclipse from NXP is also included. Their functions are storing the running code, the information of fingerprint and the algorithm. The LPC1768 has 64 KB SRAM, 512 KB Flash, 4xUART, 3xI2C, SPI, 2xSSP, 2xCAN, PWM, USB 2.0 Device/Host/OTG, RTC, Ethernet, I2S, etc. Embedded Artists also provides Prototype board and Base board that make it possible to make experiments and prototyping with many peripherals. 2. LCD module: it is used in this module as a LCD controller, it supported 1024*1024 images of 15 gray-scale or 3375 colors. 3. Keyboard module: It is used for inputting one time password. 4. Fingerprint recognition module: KY-M6 can be used as a finger-print recognition. It has a 500dpi resolution, anti-press, anti-static, anticorrosion. 5. DC MOTOR: It is used to lock the ATM room door. 6. BUZZER: It is used to give sound to security guards .In LPC 1768, buzzer is inbuilt. 7. GSM module: Here we are using sim900 GSM module to send the message alerts to the authorized person. It can be used to internet. The more details are shown as follows GSM Global system for Mobile Communications (GSM: originally from Group Special Mobile) is the most popular standard for mobile phones in the world. Its promoter, the GSM Association, estimates that 82% of the global mobile market uses the standard GSM is used by over 2 billion people across more than 212 countries and territories. GSM differs from its predecessors in that both signaling and speech channels are digital call quality, and thus is considered a second generation (2G) mobile phone system. This has also meant that data communication was built into the system using the 3rd Generation Partnership Project (3GPP). GSM also pioneered a low-cost alternative to voice calls, the Short message service. GSM is a digital mobile telephone system that is widely used in Europe and other parts of the world. Technical details GSM is a cellular network, which means that mobile phones connect to it by searching for cells in the immediate vicinity. GSM networks operate in four different frequency ranges. Most GSM networks operate in the 900 MHz or 1800 MHz bands. Some countries in the Americans (including Canada and the United States) use the 850 MHz and 1900 MHz bands because the 900 and 1800 MHz frequency bands were already allocated. The rarer 400 and 450 MHz frequency bands are assigned in some countries, notably Scandinavia, where these frequencies were previously used for first-generation systems. IV. FINGERPRINT RECOGNITION & RESULT VERIFICATION A fingerprint recognition system is done using three steps known as Image acquisition, Minutiae extraction and Minutiae matching. The block diagram of basic fingerprint recognition system is shown in figure 3. IMAGE CAPTURE IMAGE PREPROCESSING & FEATURE EXTRACTION MATCHING STORED PATTERN Fig3 Fingerprint Recognition Process A. Detail of fingerprint recognition process. The first step was the acquisition of fingerprint image by above device mentioned in the algorithm, and the results could be sent to the following process. Secondly, preprocessing the images acquired. After obtain the fingerprint image, it must be preprocessing. Generally, pre-processing of one's is filtering, histogram computing, image enhancement and image binarization. Lastly, the characteristic value was extracted, and the results of the above measures would be compared with the Information of owner's fingerprint in the database so as to verify whether the character is matched, and then the system returned the results matched or not. Fingerprints are one of those bizarre twists of nature. Human beings happen to have builtin, easily accessible identity cards. You have a unique design, which represents you alone, literally at your fingertips, fingerprints are a unique marker for a person, even an identical twin. Fingerprints are one of many forms of biometrics, used to identify individuals and verify their identity. This part touches on two major classes of algorithms and four sensor designs(optical, ultrasonic, passive capacitance, and active capacitance) The analysis of fingerprints for matching purposes generally requires the comparison of several features of the print pattern. These include patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within the patterns It is also necessary to know the structure and properties of human skin in order to successfully employ some of the imaging technologies. The three basic patterns of fingerprint ridges are the arch, loop, and whorl: Arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then exit the other side of the finger. Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same side. Whorl: Ridges form circularly around a central point on the finger. The design of fingerprint image enhancement: Fingerprint recognition module is an extremely important part of the system, the high-quality images was the major factors of influencing the performance in the system. There is a lot of noise in fingerprint image; the image enhancement was the precondition for recognition of fingerprint characteristics. The algorithm of fingerprint recognition based on the algorithm of Gabor and direction filter was used. Finger print enhancement algorithm based on Gabor filter could be better to remove noise, strengthen the definition between the ridge and valley, it could significantly improve the image enhancement processing capacity, but this algorithm was slow in dealing with the high capacity requirements. Fingerprint enhancement algorithm based on direction filter has faster processing capabilities, but it was not good to handing the large noise areas. so combination of these two algorithms could obtain better effects. The algorithm based on direction filter was used in the clear area, and based on Gabor filter was used in the recoverable region. B. The design of fingerprint recognition algorithm The design of algorithm based on fingerprint recognition is so vital for the whole system. We would approach two steps to process the images of fingerprint. i. The detail of fingerprint recognition process Fig4 Fingerprint Pattern The first step was the acquisition of fingerprint image by above device mentioned in the algorithm, and the results could be sent to the following process. Secondly, preprocessing the images acquired. After obtain the fingerprint image, it must be preprocessing. Generally, pre-processing of one's is filtering, histogram computing, image enhancement and image binarization. Lastly, the characteristic value was extracted, and the results of the above measures would be compared with the information of owner's fingerprint in the database so as to verify whether the character is matched, and then the system returned the results matched or not. ii. The design of fingerprint image enhancement Fingerprint recognition module is an extremely important part of the system, the high-quality images was the major factors of influencing the performance in the system. The algorithm of fingerprint recognition based on the algorithm of Gabor and direction filter was used. Finger print enhancement algorithm based on Gabor filter could be better to remove noise, strengthen the definition between the ridge and valley, it could significantly improve the image enhancement processing capacity, but this algorithm was slow in dealing with the high capacity requirements. Fig6 Accessing ATM Terminal by Authorized Person If both fingerprints matched it allows to access ATM machine Fig7 Comparing with Masters V.IMPLEMENATIONS 1) Enrolling fingerprints of Authorized persons Fig8 Transactions of ATM Terminal a) b) Balance Enquiry Withdraw 4) If authorized person wants to access ATM terminal Fig5 Fingerprint Enrolling 2) 3) First we have to enroll our fingerprints in data server Registering phone number If authorized person wants to access ATM terminal Fig9 Accessing ATM Unauthorized Person Terminal by If both fingerprints are mismatched it stores fingerprints of unauthorized person fingerprints. And it sends OTP to Authorized person. ii. Balance Enquiry Withdraw If Invalid Door Will Be Closed Buzzer Will Be ON Message Alert Will Be Sent Fig10 Storing Unauthorized fingerprints a) Sending OTP to authorized person Fig14 Message Alerts To Authorized person VI. CONCLUSIONS Fig11 Sending OTP by Server b) Checking OTP Fig12 Checking OTP i. If valid Fig13 Validating OTP It provides accurate solutions to present problems of accessing ATM terminal By using this technology in banking, the security and flexibility will be increased in ATM transactions. The design of fingerprint based secured flexible system for ATM transactions took advantages of the stability and reliability of fingerprint characteristics, a new biological technology based on the image enhancement algorithm of Gabor and direction filter. Additional, the system also contains the original verifying methods. The security features will be enhanced largely for the stability and reliability of authorized person recognition. The whole system has been built on technology of embedded system, which makes the system more safe, reliable and easy to use. REFERENCES [1] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C]. Proceedings of the 7th IEEE International Workshop on Cellular Neural Networks and their Applications 2002: 377-382. [2] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation[J]. IEEE Transactions on Pattern Analysis and Machine intelligence. 1998,20(8): 777-789. [3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern Recognition, 2004, 37: 543-553. [4] Fingerprint image enhancement: algorithm and performance evaluation [j]. ieee transactions on pattern analysis and machine intelligence. Author’s Details Komurelli sathibabu, Recevied him B.tech degree from JNTU, Hyd, currently perceiving him M.tech ,embedded system in CMR College of Engineering Technology ,Hyderabad. B.Suresh Ram, Pursuing Ph.D from Acharya NagarjunaUniversity, Guntur, In the area of communications. Currently working as Associate Professor in ECE Dept, CMR College of Engineering Technology ,Hyderabad.