EXTENDED SECURITY FOR BANKING SECTOR

advertisement
ER.PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING
EXTENDED SECURITY FOR BANKING
SECTOR USING EMBEDDED SYSTEM
PRESENTED BY
JAIMITHRA.P
111-ECE
Contact no :7708906087
Jaimithraias3@gmail.com
AMREENTAJ.A
111-EEE
Contact no:9566376393
aamreentaj01@gmail.com
EXTENDED SECURITY FOR BANKING SECTOR USING
EMBEDDED SYSTEM
ABSTRACT
The world of today has high become a place with very high security but there
are hackers (code breakers) and thieves who are trying to bring down this security system. So
we need keep updating our security system. Here one of the system which is presently in
function could be more secured using Biometrics and Embedded System. In this paper we
have used the biometrics (finger print recognition) for security purpose and embedded system
to automate the complete process. There many methods in providing security using
biometrics we have gone for the finger print recognition. In embedded system we have gone
for PIC micro controller (PIC16F877). Here our project is helping the banking sector to safe
keep the credit cards so called the plastic money, ATM cards and the bank lockers. We have
taken into consideration all factors that affect the security of the present system in those
sectors and have given an updated version of security for them .The biometrics have been
used as the lock in providing security and the embedded system has been interface that
connect the user and the automated system. We hope to give an better security for the society
which needs to be a secured place live for us. We believe that our idea provides better
security than the existing system.
2.PERIPHERAL INTERFACE
CONTROLLER
The PIC16F877 Micro controller
1.INTRODUCTION
belongs to the midrange PIC. ThePIC16F87X
Embedded system is defined as the
Micro controller (MCU) Family provides a
system into which the user’s logic or ideas are
migration path from OTP to FLASH in 28 to 44-
embedded. Embedded systems include a variety of
pin packages, with a wide range of peripheral
hardware
which
integration options. This family features a 14-bit
perform specific functions in host system, for
instruction set, 5 to 8 channels of 10-bit Analog-
example satellites, Washing machine, handheld
to-Digital
telephones and automobiles. Embedded systems
capability, various serial interface capabilities,
have become increasing digital with a non-digital
Capture/Compare/PWM,
peripheral (analog power) and therefore both
and an 8-level deep stack.
and
software
components,
Hardware and software coding signs are relevant.
The
Converters,
PIC16F87X
interrupt
handling
Brown-out
Detection
family
provides
We are going for micro controller called the PIC
performance and versatility to meet the most
micro controller. The PIC micro controller has the
demanding requirements of today’s cost-sensitive
following advantages.
analog designs. Plus, with FLASH program
 Cost effectiveness
memory,
 Low power
reprogrammed over the entire operating voltage
 Highly user interactive
range. The PIC16F87X family is ideally suited for
 A High level of system integration
high-speed applications. The PIC16F8 is a 40-pin
PIC16F87X
devices
package and the pin details are shown.
can
be
 22 to 33 I/O pins.
 Processor read/write access to program
memory.
2b. Peripheral Features
 Includes 3 timers – Timer 0, Timer 1 and
Timer 2.
 Capture/Compare/PWM (CCP) modules
 10-bit
multi-channel
Analog-to-Digital
Converter
 Synchronous Serial Port (SSP) with I2C
(Master/Slave)
 Universal
FIG.1
Asynchronous
Receiver
Some of the core features of PIC micro controller
is as follows.
 Transmitter (USART) with 9-bit address
detection.
2a. High-Performance RISC CPU
 Only
Synchronous
35
instructions
are
2c. Special Micro controller Features
there
to
implement the user’s logic.
 All instructions are single cycle (200 ns)
except branch instructions which requires
two-cycles.
 Power-on Reset (POR), Power-up Timer
(PWRT) and
Oscillator Start-up Timer (OST).
 Watchdog Timer (WDT) with its own onchip RC oscillator for reliable operation.
 128 to 368 bytes of user RAM.
 Programmable code protection
 Up to 256 bytes of data EEPROM memory
 Power saving SLEEP mode
(internal), but we can interface max of
 Selectable oscillator options.
512KB of memory externally.
 XT: Standard crystal/resonator
 Erase/write endurance.
 HS: High-speed crystal/resonator
 14-bit wide instructions.
 LP: Power saving, low frequency crystal
 8-level deep hardware stack.
 Direct, indirect and relative addressing
modes.
3. BIOMETRICS
Biometrics
is
defined
as
an
The statistics of various recognition
automated method of identifying or authenticating
techniques used are as follows:
the identity of a living person based on the
physiological characteristics. It offers inherently
stronger security than any other methods like iris,
face and voice recognition. Basic steps involved in
recognition systems are as follows:
 A mechanism to scan and capture
 Compression,
Processing
and
Comparison
FIG.2
 Interfacing with the application
system.
4. FINGER PRINT VERIFICATION SYSTEM
In order to have safety over the property,
the people living in all parts of a country go for
“Fully Secured Banking system”. But there are
hackers and thieves who steel out of our own
credit cards and debit cards People mainly look for
the protective measures provided by the bankers.
So to strengthen
this system, we had chosen
fingerprint of the user as the credit and debit cards
along with an password for better security.
Since, the fingerprints of all the human
beings are unique in nature, we had prescribed it
as key factor. But there are other factors, which
are unique like that of fingerprint. They are face,
iris, signature and voice. Iris recognition system
has the highest accuracy in finding the fraudulent
persons and to have the lowest error rate. But it
has a disadvantage of high cost. Hence we
selected the next better factor (fingerprint), as it
has moderate cost and high accuracy.
5.
Various
Recognition
Systems-
Comparison
Here according to the statistic we can see
from the graph that iris recognition has the
maximum security but we have chosen the
fingerprint
technique.
Since
finger
print
recognition has the next best security system to the
iris recognition. The cost of the finger print
recognition system is comparably less and most
reliable among the various recognition system
The above reasons that have made us go
for fingerprint instead of the other biometrics
technique for security system. This security
techniques have made the credit or debit cards,
ATM cards and bank lockers more secured.As per
the above statistics, finger print recognition
technique
gains
advantage
than
any
other
recognition techniques specified above.
The basic features of fingerprint are as
follows.
 Uniqueness
 Permanency
6. BASIC BLOCK DIAGRAM
The five ports of the PIC micro controller which
are interfaced to five different module
INTERFACING LCD AND PIC:
FIG.4
The LCD is interfaced through the PORT B of the
PIC MCU. The port pins are connected to the data
lines of a two row LCD. The three control pins
FIG.3
The blocks are
1. LCD display module
2. CCD scanner module
3 .Keypad module
4. Memory cards module
6a. LCD DISPLAY
 Two line liquid crystal display-each line can
hold
16 characters
 Displays the characters with a bright
background (yellow).

A potentiometer is varied to adjust the brightness of
characters.

LCD consists of 16 pins to provide interfacing with
PIC.
ENABLE, READ/WRITE & READ SELECT are
connected to the port pins RE0, RE1, RE2 of the
PIC MCU.
6b. CCD SCANNER MODULE
This module is used to scan the user
fingerprint. Then the user is asked for the certain
password that has been provided by the bank.
Here the password is used as filename
which
holds the information of the card holder and their
fingerprint. The fingerprint obtain from the user is
compared with fingerprint for that corresponding
password code which is stored in the computer.
The data comparison is done by certain techniques
using MATLAB for simulation.
6c, KEYPAD MODULE
The hex keypad consists of 16 keys
to input the alphabets and numerals. This
4X4
matrix keypad is formed by using the D port
of
the PIC MCU 16F877.
Here the port pins
RD0, RD1, RD2, RD3 act as input pins and RD4,
RD5, RD6, RD7 act as output pins. The pins are
the corresponding banks the amount for the cards can be
connected to the power supply and when both the
collected by the shopkeepers.
pins
become
high
i.e.,
when
the
switch
corresponding to both the pins is pressed then the
corresponding letters (that are pre assigned in the
7. LOCKER MODULE BLOCK DIAGRAM
program) are read from the program and input to
We are providing the same security system
two row LCD through the data lines. At the same
for the bank lockers here the fingerprints are compared
time these letters are also got for processing.
to the existing the file. The comparison results in
The diagrammatic view of the hex
keypad is shown below followed by the functions
executing a serious of actions like opening the main
door and also there individual lockers
of each special keys.
 In our system each key (switch) is
programmed to input multiple characters.
 This can be explained by taking an
example of the first key (i.e.,) the switch
provided at the intersection of the pins
RD0 & RD4.
 So on the first press of this key ‘A’ would
be input to the system. And on pressing it
FIG.5
again a ‘B’ would be input and the next
From the above block diagram we can see the
press would input a ‘0’.
various blocks of the locker sub system .the blocks
 The next press would again insert an ‘A’
and so on.
are
1. Keypad
and
display
unit
(Entry
subsystem)
6d. MEMORY CARD MODULE
This module has memory card reader and
data editor. Every bank are provided with separate
2. The PIC MCU controlled Locker.
3. The
fingerprint
matching
system
(simulation)
memory cards where re amount that have been credited
or debited using banks credit or debit card is stored.
But some of the modules are already
This memory card holds the database as the account discussed above. So we are discussing only the
number and the amount debited or credited for the card. locker accessing sub system below
At the end of the day these memory cards are given to
7a. LOCKER ACCESSING SUB-SYSTEM
This system is made up of two
subsystems. They are The PIC MCU controlled
1) Electronic lock
2) The alarm subsystem.
7a.1. ELECTRONIC LOCK
This electronic lock is controlled
Solenoid Coil
FIG.6
by the PIC MCU port pin RC0.Whenever the lock
(corresponding to the account number) is to be
7a.2. ALARM SUBSYSTEM
opened then the high signal is given through this
The alarm subsystem sounds a
pin(RC0). If the lock is to be opened then a high
buzzer if there is any misuse of the system. This is
signal is given through this pin and this energizes
used to prevent any malpractices. The alarm is
the solenoid coil. This solenoid is placed in a
sounded for two reasons
direction such that the current flowing through it
causes the iron rod passing through the center of
the solenoid coil to move in a direction that
releases the lock. Thus as shown in the figure the
spring is now compressed and it is under tension.
1) If the customer makes any mistake in
entering his details.
2) If a person accesses the locker more
than a specified time.
This subsystem is controlled using the
After the user has completed
pic’s port pin (ra2). If any of the above two cases
accessing the locker he presses the close button.
is met then a high signal is given through this pin.
This in turn cuts of the supply given through the
The alarm sound is stopped only after pressing the
port pin(RC0).now the solenoid coil is de-
specified key. Here the enter key is used to stop
energized and the iron rod is pushed in the
the alarm in the first case and for the second case a
opposite direction so that the spring gets released
close key needs to be pressed.
of the tension. Thus the locker is now closed.
8. ALGORITHMS
An algorithm is defined as the stepby step procedure of instructions involved in the
processing. We had used MATLAB to compare
two fingerprint images. We had employed this
fingerprint recognition system by simulation. In
our actual system, we have planned to use a CCD
camera to get the fingerprint from the user. But we
have
(matched) and ‘UM’ (unmatched).
6. Find the difference between M and UM.
not implemented that part, since high precision
cameras are too expensive. As already mentioned,
we have developed two algorithms for comparing
fingerprint impressions. They are as follows:
 Direct Comparison Of Pixels
 Rotational Algorithm
7. Repeat the process for next 10 pixels in
y-axis and so on for entire image.
8. Display the ‘differences’ obtained from
comparing of each block.
9. If the number of negative difference is
greater than or equal to TWO (>=2), then display
In the former method, the pixels of two
that the two images are not matching. (At the
images are compared directly based on the
same time give the alarm signal to the alarm
position of pixels. In the second method, the
circuit).
image is rotated either to clockwise or anti-
10. Else display that the images are
clockwise direction depending on the tilt of input
matching and provide the control signal to debit
image.
or credit the amount from the account.
For the following two fingerprints (one from
8a. DIRECT COMPARISON OF PIXELS
In this algorithm, we are going to
the database and other from the user) the result is
“Finger Prints Are Matched”,since they are
compare the pixel(gray values) of the two images,
exactly,same.
directly. The result of this algorithm is based on
Image from the Database
Input Image
number of pixels that are matched. The algorithm
is given below.
8a.1. Algorithm
1. Get the input from the user.
2. Retrieve the already stored fingerprint
image from the database, corresponding to the
account number.
Direct Comparison of Pixels FIG.7
8a.2. Advantage
3. Pre-process the two images.
4. Modify the two images by cutting the
borders.
The main advantage of this algorithm is its
simplicity in comparing the images. The program
is very simple to implement and to understand.
5. For the first 10 pixels in Y-axis of both
the images,
count
the number of pixels
matched and unmatched. Let they be ‘M’
8a.3. Disadvantage
Since we are comparing the images
directly, this algorithm has a disadvantage that if
3. Pre-process the two images.
the input image of the user is tilted, then the result
4. Take the first image (already stored) and
displayed may be faulty. For example, consider
modify it by cutting the borders.
the following two images (one of which is tilted)
5. Take the second image (input image)
to be compared. The result of the comparison is
and cut the borders in such a way that all the four
“Finger prints are not matching”.
border are tilted towards the clockwise direction.
Image from the Database Input Image from user
Now the entire image is rotated in CW direction.
6. Next count the number of black and
white pixels in both the images.
7. Calculate the difference in the total
black and white pixels. Let it be ‘B_diff’ and
‘W_diff’.
8. If the W_diff is greater than B_diff, then
display that the images are not matching. Provide
Direct Comparison of Pixels
an alarm signal to the alarm circuit. Since we are
FIG.8
finding the differences and we are mainly
In order to overcome this difficulty, we
have
developed
another
algorithm
called
ROTATIONAL algorithm, which is as follows
concerned with the black pixels, the above
condition is developed.
9. Else display the images are matching
and then provide the control signal to open the
8b. ROTATIONAL ALGORITHM
In this algorithm, the images are modified in
locker.
8b.2. Advantage
such a way that the borders are also tilted
As already mentioned this algorithm
(rotated) in the direction of input image’s tilt.
gives additional security in avoiding the entry of
The algorithm is as follows. Assume that the
fraudulent persons and to allow the correct user to
fingerprint of the user has been tilted in
access his/her locker, even when the user’s
clockwise direction.
fingerprint image is tilted. The Efficiency of this
8b.1. Algorithm
1. Get the input from the user.
2. Get the already stored fingerprint image
from the database corresponding to the account
number.
algorithm is “NEARLY 80%”. If we combine the
two above-mentioned algorithms, we can have the
efficiency of “NEARLY 90% “
8b.3. Disadvantage
In this algorithm, there is a
disadvantage that care should be taken in finding
here. Hence, we decided to provide this system
similar to that of ATM’s.
whether the image is tilted in clockwise or in anti
clock direction
We
had
chosen
fingerprint
recognition system to provide security for the user
to access his/her locker. Since PIC micro
9. COMPARISON OF ALGORITHMS
We
can
compare
controllers have many advantages like low cost,
the
two
minimum execution time, RISC architecture, etc..,
algorithms based on the method of comparison,
we had used this MCU as the controlling unit.
efficiency and several other factors. Both the
Hardware parts of our project are implemented
algorithms provide minimum efficiency when we
using PIC MCU, whereas the Software parts are
compare it with the other recognition systems like
implemented using MATLAB and HITEC-C (C
iris. But we can increase the efficiency by
language for PIC MCU).
combining the algorithms. We can also provide a
The aim of our project is to provide this
new algorithm based on the type of impression. If
society by means of a safe credit or debit card with
we combine this algorithm with the other two, we
high security using fingerprint recognition system.
can have efficiency exceeding 95%.
We tried to produce 24 hours working system that
is very compatible in its structure. Since we had
10. CONCLUSION
As
used computer for fingerprint authentication, we
already
mentioned
before,
cannot provide a compatible system. But, we had
Embedded System is the field which has been
reduced man power required as in conventional
developing more rapidly than any other fields.
banking systems.
There are many micro controllers which help the
If we use scanners directly
user to embed his/her logic. Many real-time
to match the fingerprint of the user then we can
systems in our day today life are employing
have a very compatible system. In the future, it
embedded systems. One such system is our idea
may come into exist with additional features like
which is aiming to improve the credit and debit
automatic ON-OFF switch, real-time clock, etc.
card scheme.
We can control the additional features by using the
Since
we
have
provided
an
same PIC micro controller. Hence, in the future
automated system using embedded system, it can
we can hope, a fully automated locker system will
serve the people up to its maximum ability.
develop.
Nowadays, we can’t see a system, providing the
References:-
credit and debit card like what we have provided
www.isecuritykbs.com
www.embdsecurity.com
Download