ER.PERUMAL MANIMEKALAI COLLEGE OF ENGINEERING EXTENDED SECURITY FOR BANKING SECTOR USING EMBEDDED SYSTEM PRESENTED BY JAIMITHRA.P 111-ECE Contact no :7708906087 Jaimithraias3@gmail.com AMREENTAJ.A 111-EEE Contact no:9566376393 aamreentaj01@gmail.com EXTENDED SECURITY FOR BANKING SECTOR USING EMBEDDED SYSTEM ABSTRACT The world of today has high become a place with very high security but there are hackers (code breakers) and thieves who are trying to bring down this security system. So we need keep updating our security system. Here one of the system which is presently in function could be more secured using Biometrics and Embedded System. In this paper we have used the biometrics (finger print recognition) for security purpose and embedded system to automate the complete process. There many methods in providing security using biometrics we have gone for the finger print recognition. In embedded system we have gone for PIC micro controller (PIC16F877). Here our project is helping the banking sector to safe keep the credit cards so called the plastic money, ATM cards and the bank lockers. We have taken into consideration all factors that affect the security of the present system in those sectors and have given an updated version of security for them .The biometrics have been used as the lock in providing security and the embedded system has been interface that connect the user and the automated system. We hope to give an better security for the society which needs to be a secured place live for us. We believe that our idea provides better security than the existing system. 2.PERIPHERAL INTERFACE CONTROLLER The PIC16F877 Micro controller 1.INTRODUCTION belongs to the midrange PIC. ThePIC16F87X Embedded system is defined as the Micro controller (MCU) Family provides a system into which the user’s logic or ideas are migration path from OTP to FLASH in 28 to 44- embedded. Embedded systems include a variety of pin packages, with a wide range of peripheral hardware which integration options. This family features a 14-bit perform specific functions in host system, for instruction set, 5 to 8 channels of 10-bit Analog- example satellites, Washing machine, handheld to-Digital telephones and automobiles. Embedded systems capability, various serial interface capabilities, have become increasing digital with a non-digital Capture/Compare/PWM, peripheral (analog power) and therefore both and an 8-level deep stack. and software components, Hardware and software coding signs are relevant. The Converters, PIC16F87X interrupt handling Brown-out Detection family provides We are going for micro controller called the PIC performance and versatility to meet the most micro controller. The PIC micro controller has the demanding requirements of today’s cost-sensitive following advantages. analog designs. Plus, with FLASH program Cost effectiveness memory, Low power reprogrammed over the entire operating voltage Highly user interactive range. The PIC16F87X family is ideally suited for A High level of system integration high-speed applications. The PIC16F8 is a 40-pin PIC16F87X devices package and the pin details are shown. can be 22 to 33 I/O pins. Processor read/write access to program memory. 2b. Peripheral Features Includes 3 timers – Timer 0, Timer 1 and Timer 2. Capture/Compare/PWM (CCP) modules 10-bit multi-channel Analog-to-Digital Converter Synchronous Serial Port (SSP) with I2C (Master/Slave) Universal FIG.1 Asynchronous Receiver Some of the core features of PIC micro controller is as follows. Transmitter (USART) with 9-bit address detection. 2a. High-Performance RISC CPU Only Synchronous 35 instructions are 2c. Special Micro controller Features there to implement the user’s logic. All instructions are single cycle (200 ns) except branch instructions which requires two-cycles. Power-on Reset (POR), Power-up Timer (PWRT) and Oscillator Start-up Timer (OST). Watchdog Timer (WDT) with its own onchip RC oscillator for reliable operation. 128 to 368 bytes of user RAM. Programmable code protection Up to 256 bytes of data EEPROM memory Power saving SLEEP mode (internal), but we can interface max of Selectable oscillator options. 512KB of memory externally. XT: Standard crystal/resonator Erase/write endurance. HS: High-speed crystal/resonator 14-bit wide instructions. LP: Power saving, low frequency crystal 8-level deep hardware stack. Direct, indirect and relative addressing modes. 3. BIOMETRICS Biometrics is defined as an The statistics of various recognition automated method of identifying or authenticating techniques used are as follows: the identity of a living person based on the physiological characteristics. It offers inherently stronger security than any other methods like iris, face and voice recognition. Basic steps involved in recognition systems are as follows: A mechanism to scan and capture Compression, Processing and Comparison FIG.2 Interfacing with the application system. 4. FINGER PRINT VERIFICATION SYSTEM In order to have safety over the property, the people living in all parts of a country go for “Fully Secured Banking system”. But there are hackers and thieves who steel out of our own credit cards and debit cards People mainly look for the protective measures provided by the bankers. So to strengthen this system, we had chosen fingerprint of the user as the credit and debit cards along with an password for better security. Since, the fingerprints of all the human beings are unique in nature, we had prescribed it as key factor. But there are other factors, which are unique like that of fingerprint. They are face, iris, signature and voice. Iris recognition system has the highest accuracy in finding the fraudulent persons and to have the lowest error rate. But it has a disadvantage of high cost. Hence we selected the next better factor (fingerprint), as it has moderate cost and high accuracy. 5. Various Recognition Systems- Comparison Here according to the statistic we can see from the graph that iris recognition has the maximum security but we have chosen the fingerprint technique. Since finger print recognition has the next best security system to the iris recognition. The cost of the finger print recognition system is comparably less and most reliable among the various recognition system The above reasons that have made us go for fingerprint instead of the other biometrics technique for security system. This security techniques have made the credit or debit cards, ATM cards and bank lockers more secured.As per the above statistics, finger print recognition technique gains advantage than any other recognition techniques specified above. The basic features of fingerprint are as follows. Uniqueness Permanency 6. BASIC BLOCK DIAGRAM The five ports of the PIC micro controller which are interfaced to five different module INTERFACING LCD AND PIC: FIG.4 The LCD is interfaced through the PORT B of the PIC MCU. The port pins are connected to the data lines of a two row LCD. The three control pins FIG.3 The blocks are 1. LCD display module 2. CCD scanner module 3 .Keypad module 4. Memory cards module 6a. LCD DISPLAY Two line liquid crystal display-each line can hold 16 characters Displays the characters with a bright background (yellow). A potentiometer is varied to adjust the brightness of characters. LCD consists of 16 pins to provide interfacing with PIC. ENABLE, READ/WRITE & READ SELECT are connected to the port pins RE0, RE1, RE2 of the PIC MCU. 6b. CCD SCANNER MODULE This module is used to scan the user fingerprint. Then the user is asked for the certain password that has been provided by the bank. Here the password is used as filename which holds the information of the card holder and their fingerprint. The fingerprint obtain from the user is compared with fingerprint for that corresponding password code which is stored in the computer. The data comparison is done by certain techniques using MATLAB for simulation. 6c, KEYPAD MODULE The hex keypad consists of 16 keys to input the alphabets and numerals. This 4X4 matrix keypad is formed by using the D port of the PIC MCU 16F877. Here the port pins RD0, RD1, RD2, RD3 act as input pins and RD4, RD5, RD6, RD7 act as output pins. The pins are the corresponding banks the amount for the cards can be connected to the power supply and when both the collected by the shopkeepers. pins become high i.e., when the switch corresponding to both the pins is pressed then the corresponding letters (that are pre assigned in the 7. LOCKER MODULE BLOCK DIAGRAM program) are read from the program and input to We are providing the same security system two row LCD through the data lines. At the same for the bank lockers here the fingerprints are compared time these letters are also got for processing. to the existing the file. The comparison results in The diagrammatic view of the hex keypad is shown below followed by the functions executing a serious of actions like opening the main door and also there individual lockers of each special keys. In our system each key (switch) is programmed to input multiple characters. This can be explained by taking an example of the first key (i.e.,) the switch provided at the intersection of the pins RD0 & RD4. So on the first press of this key ‘A’ would be input to the system. And on pressing it FIG.5 again a ‘B’ would be input and the next From the above block diagram we can see the press would input a ‘0’. various blocks of the locker sub system .the blocks The next press would again insert an ‘A’ and so on. are 1. Keypad and display unit (Entry subsystem) 6d. MEMORY CARD MODULE This module has memory card reader and data editor. Every bank are provided with separate 2. The PIC MCU controlled Locker. 3. The fingerprint matching system (simulation) memory cards where re amount that have been credited or debited using banks credit or debit card is stored. But some of the modules are already This memory card holds the database as the account discussed above. So we are discussing only the number and the amount debited or credited for the card. locker accessing sub system below At the end of the day these memory cards are given to 7a. LOCKER ACCESSING SUB-SYSTEM This system is made up of two subsystems. They are The PIC MCU controlled 1) Electronic lock 2) The alarm subsystem. 7a.1. ELECTRONIC LOCK This electronic lock is controlled Solenoid Coil FIG.6 by the PIC MCU port pin RC0.Whenever the lock (corresponding to the account number) is to be 7a.2. ALARM SUBSYSTEM opened then the high signal is given through this The alarm subsystem sounds a pin(RC0). If the lock is to be opened then a high buzzer if there is any misuse of the system. This is signal is given through this pin and this energizes used to prevent any malpractices. The alarm is the solenoid coil. This solenoid is placed in a sounded for two reasons direction such that the current flowing through it causes the iron rod passing through the center of the solenoid coil to move in a direction that releases the lock. Thus as shown in the figure the spring is now compressed and it is under tension. 1) If the customer makes any mistake in entering his details. 2) If a person accesses the locker more than a specified time. This subsystem is controlled using the After the user has completed pic’s port pin (ra2). If any of the above two cases accessing the locker he presses the close button. is met then a high signal is given through this pin. This in turn cuts of the supply given through the The alarm sound is stopped only after pressing the port pin(RC0).now the solenoid coil is de- specified key. Here the enter key is used to stop energized and the iron rod is pushed in the the alarm in the first case and for the second case a opposite direction so that the spring gets released close key needs to be pressed. of the tension. Thus the locker is now closed. 8. ALGORITHMS An algorithm is defined as the stepby step procedure of instructions involved in the processing. We had used MATLAB to compare two fingerprint images. We had employed this fingerprint recognition system by simulation. In our actual system, we have planned to use a CCD camera to get the fingerprint from the user. But we have (matched) and ‘UM’ (unmatched). 6. Find the difference between M and UM. not implemented that part, since high precision cameras are too expensive. As already mentioned, we have developed two algorithms for comparing fingerprint impressions. They are as follows: Direct Comparison Of Pixels Rotational Algorithm 7. Repeat the process for next 10 pixels in y-axis and so on for entire image. 8. Display the ‘differences’ obtained from comparing of each block. 9. If the number of negative difference is greater than or equal to TWO (>=2), then display In the former method, the pixels of two that the two images are not matching. (At the images are compared directly based on the same time give the alarm signal to the alarm position of pixels. In the second method, the circuit). image is rotated either to clockwise or anti- 10. Else display that the images are clockwise direction depending on the tilt of input matching and provide the control signal to debit image. or credit the amount from the account. For the following two fingerprints (one from 8a. DIRECT COMPARISON OF PIXELS In this algorithm, we are going to the database and other from the user) the result is “Finger Prints Are Matched”,since they are compare the pixel(gray values) of the two images, exactly,same. directly. The result of this algorithm is based on Image from the Database Input Image number of pixels that are matched. The algorithm is given below. 8a.1. Algorithm 1. Get the input from the user. 2. Retrieve the already stored fingerprint image from the database, corresponding to the account number. Direct Comparison of Pixels FIG.7 8a.2. Advantage 3. Pre-process the two images. 4. Modify the two images by cutting the borders. The main advantage of this algorithm is its simplicity in comparing the images. The program is very simple to implement and to understand. 5. For the first 10 pixels in Y-axis of both the images, count the number of pixels matched and unmatched. Let they be ‘M’ 8a.3. Disadvantage Since we are comparing the images directly, this algorithm has a disadvantage that if 3. Pre-process the two images. the input image of the user is tilted, then the result 4. Take the first image (already stored) and displayed may be faulty. For example, consider modify it by cutting the borders. the following two images (one of which is tilted) 5. Take the second image (input image) to be compared. The result of the comparison is and cut the borders in such a way that all the four “Finger prints are not matching”. border are tilted towards the clockwise direction. Image from the Database Input Image from user Now the entire image is rotated in CW direction. 6. Next count the number of black and white pixels in both the images. 7. Calculate the difference in the total black and white pixels. Let it be ‘B_diff’ and ‘W_diff’. 8. If the W_diff is greater than B_diff, then display that the images are not matching. Provide Direct Comparison of Pixels an alarm signal to the alarm circuit. Since we are FIG.8 finding the differences and we are mainly In order to overcome this difficulty, we have developed another algorithm called ROTATIONAL algorithm, which is as follows concerned with the black pixels, the above condition is developed. 9. Else display the images are matching and then provide the control signal to open the 8b. ROTATIONAL ALGORITHM In this algorithm, the images are modified in locker. 8b.2. Advantage such a way that the borders are also tilted As already mentioned this algorithm (rotated) in the direction of input image’s tilt. gives additional security in avoiding the entry of The algorithm is as follows. Assume that the fraudulent persons and to allow the correct user to fingerprint of the user has been tilted in access his/her locker, even when the user’s clockwise direction. fingerprint image is tilted. The Efficiency of this 8b.1. Algorithm 1. Get the input from the user. 2. Get the already stored fingerprint image from the database corresponding to the account number. algorithm is “NEARLY 80%”. If we combine the two above-mentioned algorithms, we can have the efficiency of “NEARLY 90% “ 8b.3. Disadvantage In this algorithm, there is a disadvantage that care should be taken in finding here. Hence, we decided to provide this system similar to that of ATM’s. whether the image is tilted in clockwise or in anti clock direction We had chosen fingerprint recognition system to provide security for the user to access his/her locker. Since PIC micro 9. COMPARISON OF ALGORITHMS We can compare controllers have many advantages like low cost, the two minimum execution time, RISC architecture, etc.., algorithms based on the method of comparison, we had used this MCU as the controlling unit. efficiency and several other factors. Both the Hardware parts of our project are implemented algorithms provide minimum efficiency when we using PIC MCU, whereas the Software parts are compare it with the other recognition systems like implemented using MATLAB and HITEC-C (C iris. But we can increase the efficiency by language for PIC MCU). combining the algorithms. We can also provide a The aim of our project is to provide this new algorithm based on the type of impression. If society by means of a safe credit or debit card with we combine this algorithm with the other two, we high security using fingerprint recognition system. can have efficiency exceeding 95%. We tried to produce 24 hours working system that is very compatible in its structure. Since we had 10. CONCLUSION As used computer for fingerprint authentication, we already mentioned before, cannot provide a compatible system. But, we had Embedded System is the field which has been reduced man power required as in conventional developing more rapidly than any other fields. banking systems. There are many micro controllers which help the If we use scanners directly user to embed his/her logic. Many real-time to match the fingerprint of the user then we can systems in our day today life are employing have a very compatible system. In the future, it embedded systems. One such system is our idea may come into exist with additional features like which is aiming to improve the credit and debit automatic ON-OFF switch, real-time clock, etc. card scheme. We can control the additional features by using the Since we have provided an same PIC micro controller. Hence, in the future automated system using embedded system, it can we can hope, a fully automated locker system will serve the people up to its maximum ability. develop. Nowadays, we can’t see a system, providing the References:- credit and debit card like what we have provided www.isecuritykbs.com www.embdsecurity.com