The “Fingerprint Based Secured Flexible System for ATM

advertisement
FINGERPRINT BASED SECURED FLEXIBLE SYSTEM FOR
ATM TRANSACTIONS
K.SATHIBABU1, B.SURESHRAM2
1
M.Tech, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India,
Email:komurelli.sathi@gmail.com
2
Assoc.Prof, Dept of ECE, CMR College of Engineering &Technology, Hyderabad, TS-India,
Email:sram6383@gmail.com
Abstract:
I. INTRODUCTION
The security of the financial
transactions of the customers that use the ATM
machines can be increased using this system.
Once user’s bank card is lost and the password
is stolen, the criminal will draw all cash in the
shortest time, which will bring enormous
financial losses to customer. Using credit card
and password cannot verify the client’s
identity exactly. so to rectify these problems
we are implementing this paper under
fingerprint based.
Now a day’s using the ATM (Automatic
Teller Machine) which provides customers
with the convenient banknote trading is very
common. However, the financial crime case
rises repeatedly in recent years; a lot of
criminals tamper with the ATM terminal and
steal user’s credit card and password by illegal
means. How to carry on the valid identity to the
customer becomes the focus in current financial
circle
This Authentication method combined
with the biometric. And here we are giving
access to multiple persons, who are known to
authorized person. Those multiple persons
fingerprint also will be saved into data server.
System will treat them as authorized persons.
From those multiple authorized persons
anyone can access ATM terminal .For other
people tries to access it will generate OTP to
authorized person, if they enter correct OTP it
allows them to access ATM terminal otherwise
those persons fingerprints will be saved into
data server, ATM ROOM DOOR will be
locked, gives alarm to security and message
alerts will be sent to authorized person.
With the development of computer network
technology and e-commerce, the self-service
banking
system
has
got
extensive
popularization with the characteristic offering
high-quality 24 hours service for customer.
Present days bankers using the ATM which
provides customers with the convenient
banknote. But the financial crime case rises
repeatedly in recent years; a lot of criminals
tamper with the ATM terminal and steal user's
credit card and password by illegal means.
Once user's bank card is lost and the password
is stolen, the criminal will draw all cash in the
shortest time, which will bring enormous
financial losses to customer. By using this
hashing scheme, the money cannot be taken by
strangers.
KEYWORDS: Fingerprint module, GSM
I.INTRODUCTION
Module,
DC motors, KEY Pad, Smart card
reader, Smart card.
For solving the bugs of traditional ones, the
author designs new ATM terminal customer
recognition system. The chip of LPC1768 is
used for the core of microprocessor in ARM
CORTEX-M3.furthermore, a improved
enhancement algorithm of fingerprint image
increase the security that customer use the
ATM machine.
START
INITIALIZE
SMART
CARD
READER,
GSM,
KEYPAD,
FINGERPRINT MODULE
II. SOFTWARE DESIGN
ENROLL THE FINGERPRINTS
The design of entire system consisted of
two part which are hardware and software. The
hardware is designed by the rules of embedded
system, Steps of software Consisted of three
parts.
Software design
The design was component of two parts
included the design of main program flow
chart, the initializing one. This system of
software is implemented by the steps as
follows: first of all, embedded program and the
File system are loaded into the main chip. The
next, the system is initialized to implement
specific task, such as checking ATM system,
GSM communication, DC motor and so on,
and then each module reset for ready to run
commands. Before using ATM terminal, the
mobile number and fingerprint of the customer
is required.
First the system is required the owner's
fingerprint. If all the recognition is right, it
allows the person to access ATM terminal
otherwise the system would send OTP to the
Account holder and if he enter the same OTP
in time for accessing the ATM Terminal.If
OTP is valid system allows to accss otherwise
the ATM room door will bw locked ,buzzer
will be on and message alerts will be sent to
authorized peron.Flow chart of software shown
in figure1.The main parts of flow chart are
a)
b)
c)
d)
Initilizing
Enrolling
Accessing
Authentication
(MULTIPLE FINERPRINTS)
REGISTER THE MOBILE NUMBER
INSERT THE SMART CARD
READ THE FINGERPRINTS
FAILURE
AUTHENT
ICATION?
SUCCESS
SEND OTP BY SERVER
ENTER OTP IN TIME
CHECK
OTP?
VALID
DO THE
TRANSACTION
INVALID
SAVE UNAUTHORIZED
FINGER PRINTS
ATM ROOM DOOR WILL
BE CLOSED
ALARM WILL BE ON TO
SECURITY GUARDS
MESSAGE ALERTS WILL
BE SENT TO
AUTHORIZED PERSON
START
Fig1 Overall flow chart of software
In the process of inputting fingerprint, the
KY-M6 which is a linear sensor that captures
fingerprint images by sweeping the finger
over the sensing area, will used for
acquiring the image of fingerprint. This
product embeds true hardware based 8-way
navigation and click functions. The fingerprint
information will be temporarily stored in
SRAM and upload to the remote finger
data server to compare through bank network.
The result of process will be controlled by main
chip (LPC1768).
The initializing process means that set the
hardware and software and then starts the
multiple mission modules, each module will be
started according to the priority processes. At
first, initialize the system clock, and execute
the codes of open interrupt and the open
interrupt task. Then, the system would judge
and enter process of module. Finally, the
system would start to attempt multiple tasks.
V.
VI.
KEY pad
BUZZER
These modules are shown in a proper way in
block diagram as shown in fig2.
MOBILE
SMART CARD
GSM
MODEM
SMART CARD
READER
FINGERPRINT
MODULE
LPC1768
Cortex-M3
LCD
DISPLAY
BUZZER
DATA
SERVER
KEYPAD
DC
MOTOR
III.SYSTEM MODEL
The design of entire system consisted of
two part which are hardware and software. The
hardware is designed by the rules of embedded
system.
Hardware Design
The LPC1768 chip is used as the core
of entire hardware. Furthermore, the modules
of LCD, keypad, buzzer, fingerprint
recognition, DC motor are connected with the
main chip (LPC1768). The SRAM and FLASH
are also embodied in the system.
BLOCK DIAGRAM
The “Fingerprint Based Secured
Flexible System for ATM Transactions” works
on few important components those are
I.
II.
III.
IV.
LPC 1768 CONTROLLER
Fingerprint Module
DC Motor
GSM Module
Fig2 Block Diagram of Hardware
1. LPC1768: The LPC1768 LPCXpresso board
with NXP's ARM Cortex-M3 microcontroller
has been designed to make it as easy as
possible to get started with Cortex-M3. The
LPCXpresso comprises a target board
combined with a JTAG debugger. A free
Eclipse from NXP is also included. Their
functions are storing the running code, the
information of fingerprint and the algorithm.
The LPC1768 has 64 KB SRAM, 512
KB Flash, 4xUART, 3xI2C, SPI, 2xSSP,
2xCAN, PWM, USB 2.0 Device/Host/OTG,
RTC, Ethernet, I2S, etc. Embedded Artists also
provides Prototype board and Base board that
make it possible to make experiments and
prototyping with many peripherals.
2. LCD module: it is used in this module as a
LCD controller, it supported 1024*1024
images of 15 gray-scale or 3375 colors.
3. Keyboard module: It is used for inputting
one time password.
4. Fingerprint recognition module: KY-M6
can be used as a finger-print recognition. It has
a 500dpi resolution, anti-press, anti-static,
anticorrosion.
5. DC MOTOR: It is used to lock the ATM
room door.
6. BUZZER: It is used to give sound to
security guards .In LPC 1768, buzzer is inbuilt.
7. GSM module: Here we are using sim900
GSM module to send the message alerts to the
authorized person. It can be used to internet.
The more details are shown as follows
GSM
Global system for Mobile Communications
(GSM: originally from Group Special Mobile)
is the most popular standard for mobile phones
in the world. Its promoter, the GSM
Association, estimates that 82% of the global
mobile market uses the standard GSM is used
by over 2 billion people across more than 212
countries and territories. GSM differs from its
predecessors in that both signaling and speech
channels are digital call quality, and thus is
considered a second generation (2G) mobile
phone system. This has also meant that data
communication was built into the system using
the 3rd Generation Partnership Project (3GPP).
GSM also pioneered a low-cost alternative to
voice calls, the Short message service. GSM is
a digital mobile telephone system that is widely
used in Europe and other parts of the world.
Technical details
GSM is a cellular network, which
means that mobile phones connect to it by
searching for cells in the immediate vicinity.
GSM networks operate in four different
frequency ranges. Most GSM networks operate
in the 900 MHz or 1800 MHz bands. Some
countries in the Americans (including Canada
and the United States) use the 850 MHz and
1900 MHz bands because the 900 and 1800
MHz frequency bands were already allocated.
The rarer 400 and 450 MHz frequency bands
are assigned in some countries, notably
Scandinavia, where these frequencies were
previously used for first-generation systems.
IV. FINGERPRINT RECOGNITION &
RESULT VERIFICATION
A fingerprint recognition system is
done using three steps known as Image
acquisition, Minutiae extraction and Minutiae
matching. The block diagram of basic
fingerprint recognition system is shown in
figure 3.
IMAGE CAPTURE
IMAGE PREPROCESSING &
FEATURE EXTRACTION
MATCHING
STORED
PATTERN
Fig3 Fingerprint Recognition Process
A. Detail of fingerprint recognition process.
The first step was the acquisition of
fingerprint image by above device mentioned
in the algorithm, and the results could be sent
to the following process. Secondly, preprocessing the images acquired. After obtain
the fingerprint image, it must be preprocessing. Generally, pre-processing of one's
is filtering, histogram computing, image
enhancement and image binarization. Lastly,
the characteristic value was extracted, and the
results of the above measures would be
compared with the Information of owner's
fingerprint in the database so as to verify
whether the character is matched, and then the
system returned the results matched or not.
Fingerprints are one of those bizarre twists
of nature. Human beings happen to have builtin, easily accessible identity cards. You have a
unique design, which represents you alone,
literally at your fingertips, fingerprints are a
unique marker for a person, even an identical
twin. Fingerprints are one of many forms of
biometrics, used to identify individuals and
verify their identity. This part touches on two
major classes of algorithms and four sensor
designs(optical, ultrasonic, passive capacitance,
and active capacitance) The analysis of
fingerprints for matching purposes generally
requires the comparison of several features of
the print pattern. These include patterns, which
are aggregate characteristics of ridges, and
minutia points, which are unique features found
within the patterns It is also necessary to know
the structure and properties of human skin in
order to successfully employ some of the
imaging technologies.
The three basic patterns of fingerprint ridges
are the arch, loop, and whorl:
Arch: The ridges enter from one side of the
finger, rise in the center forming an arc, and
then exit the other side of the finger.
Loop: The ridges enter from one side of a
finger, form a curve, and then exit on that same
side.
Whorl: Ridges form circularly around a central
point on the finger.
The design of fingerprint image
enhancement:
Fingerprint recognition module is an
extremely important part of the system, the
high-quality images was the major factors of
influencing the performance in the system.
There is a lot of noise in fingerprint image; the
image enhancement was the precondition for
recognition of fingerprint characteristics. The
algorithm of fingerprint recognition based on
the algorithm of Gabor and direction filter was
used. Finger print enhancement algorithm
based on Gabor filter could be better to remove
noise, strengthen the definition between the
ridge and valley, it could significantly improve
the image enhancement processing capacity,
but this algorithm was slow in dealing with the
high capacity requirements. Fingerprint
enhancement algorithm based on direction
filter has faster processing capabilities, but it
was not good to handing the large noise areas.
so combination of these two algorithms could
obtain better effects. The algorithm based on
direction filter was used in the clear area, and
based on Gabor filter was used in the
recoverable region.
B. The design of fingerprint recognition
algorithm
The design of algorithm based on fingerprint
recognition is so vital for the whole system.
We would approach two steps to process the
images of fingerprint.
i. The detail of fingerprint recognition process
Fig4 Fingerprint Pattern
The first step was the acquisition of
fingerprint image by above device mentioned
in the algorithm, and the results could be sent
to the following process. Secondly, preprocessing the images acquired. After obtain
the fingerprint image, it must be preprocessing. Generally, pre-processing of one's
is filtering, histogram computing, image
enhancement and image binarization. Lastly,
the characteristic value was extracted, and the
results of the above measures would be
compared with the information of owner's
fingerprint in the database so as to verify
whether the character is matched, and then the
system returned the results matched or not.
ii. The design of fingerprint image
enhancement
Fingerprint recognition module is an
extremely important part of the system, the
high-quality images was the major factors of
influencing the performance in the system. The
algorithm of fingerprint recognition based on
the algorithm of Gabor and direction filter was
used. Finger print enhancement algorithm
based on Gabor filter could be better to remove
noise, strengthen the definition between the
ridge and valley, it could significantly improve
the image enhancement processing capacity,
but this algorithm was slow in dealing with the
high capacity requirements.
Fig6 Accessing ATM Terminal by
Authorized Person
If both fingerprints matched it
allows to access ATM machine
Fig7 Comparing with Masters
V.IMPLEMENATIONS
1)
Enrolling fingerprints of Authorized
persons
Fig8 Transactions of ATM Terminal
a)
b)
Balance Enquiry
Withdraw
4) If authorized person wants to
access ATM terminal
Fig5 Fingerprint Enrolling
2)
3)
First we have to enroll our
fingerprints in data server
Registering phone number
If authorized person wants to access
ATM terminal
Fig9 Accessing ATM
Unauthorized Person
Terminal
by
If both fingerprints are mismatched
it stores fingerprints of unauthorized
person fingerprints. And it sends
OTP to Authorized person.
ii.
 Balance Enquiry
 Withdraw
If Invalid
 Door Will Be Closed
 Buzzer Will Be ON
 Message Alert Will Be
Sent
Fig10 Storing Unauthorized fingerprints
a) Sending OTP to authorized person
Fig14 Message Alerts To Authorized person
VI. CONCLUSIONS
Fig11 Sending OTP by Server
b) Checking OTP
Fig12 Checking OTP
i.
If valid
Fig13 Validating OTP
It provides accurate solutions to present
problems of accessing ATM terminal
By using this technology in banking, the
security and flexibility will be increased in
ATM transactions. The design of fingerprint
based secured flexible system for ATM
transactions took advantages of the stability
and reliability of fingerprint characteristics, a
new biological technology based on the image
enhancement algorithm of Gabor and direction
filter. Additional, the system also contains the
original verifying methods. The security
features will be enhanced largely for the
stability and reliability of authorized person
recognition. The whole system has been built
on technology of embedded system, which
makes the system more safe, reliable and easy
to use.
REFERENCES
[1] ESaatci,
V
Tavsanogh.
Fingerprint
image
enhancement using CNN gabor-Cpe filter[C].
Proceedings of the 7th IEEE International Workshop on
Cellular Neural Networks and their Applications 2002:
377-382.
[2] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image
enhancement: algorithm and performance evaluation[J].
IEEE Transactions on Pattern Analysis and Machine
intelligence. 1998,20(8): 777-789.
[3] Gu J, Zhou J, Zhang D.A combination model for
orientation field of fingerprints. Pattern Recognition,
2004, 37: 543-553.
[4] Fingerprint image enhancement: algorithm and
performance evaluation [j]. ieee transactions on pattern
analysis and machine intelligence.
Author’s Details
Komurelli sathibabu, Recevied him
B.tech degree from JNTU, Hyd,
currently perceiving him M.tech
,embedded system in CMR College of
Engineering Technology ,Hyderabad.
B.Suresh Ram, Pursuing Ph.D from
Acharya NagarjunaUniversity, Guntur,
In the area of communications. Currently
working as Associate Professor in ECE
Dept, CMR College of Engineering
Technology ,Hyderabad.
Download