• Nu S-Au Găsit Rezultate

View of Card-Less Face ATM System Using Machine Learning Approach

N/A
N/A
Protected

Academic year: 2022

Share "View of Card-Less Face ATM System Using Machine Learning Approach"

Copied!
6
0
0

Text complet

(1)

Card-Less Face ATM System Using Machine Learning Approach

Srithar Sa, Sanjai Kumar Sb, Subash Ec

aAssistant Professor, Department of CSE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India-641407

b,cUG student, Department of CSE, KPR Institute of Engineering and Technology, Coimbatore, Tamilnadu, India-641407

Email: a[email protected], b[email protected], c[email protected]

ABSTRACT

ATMs are used today by all. But It’s not possible to carry the atm card all the time, But everyone forgets to take their atm card or maybe they forget the atm PIN. There is also a chance of getting an atm card damaged so that they aren't able to take the amount from their respective banks. In this by using the biometrics in accordance to the atm card and PIN is appreciable. Here, The face recognition id is most secured by comparing to others as biometrics is providing the secured one compared to pin. The implementation of ATMs has features if card misuse by the illegal users is then able to take the amount if they have the correct atm PIN. Here provides a feature only the legal users able to take the amount from the respective bank account. The bank users can be verified by the respective banks as it is previous the images are stored in the database. The accuracy of the image if the new users come in and if they are legal then authenticate successfully. In this, the system uses the image processing technique OpenCV to process the image and haar cascade identifier to compare the faces in the image. The face recognition system is done by Binary Pattern.

Keywords- Face Id, ATM, PIN, OpenCV database, Machine Learning

Introduction

An Automatic Teller Machine (ATM) is a machine that is used to withdraw money from a customer’s individual bank account. As financial users prefer ATMs for cash cash deposits, withdrawals, and many other transactions, the banks are now focusing a lot on the security of ATMs. Hence ATMs should be endangered properly from illegal activities or any undesirable things. In development with science and technology, nowadays the security system is built with innovative technologies. The threads on the other hand posed to destroy the level of security.

Automation has made a positive impact on security systems overall, Although ATM and other financial institutions are still at risk of fraudulent activities and theft. But still, nowadays the atm consists of only atm card with a PIN so if the card is stolen by others then one will be stolen from the accounts, or by making a duplicate card with the same PIN and other similar ways. Then another major problem is the hacking of PIN. There are other fraudulent attacks like eavesdropping, spoofing, brute force attacks, blackmailing the user. In the worst case, there can also be ATM Robbery. To overcome these problems, the project ATM Security system based on Face recognition, PIN, and OTP’ consists of conventional features like Personal Identification Number (PIN) along with extra features like One-time password and Database. To improve security to a large extent database are used to store images of the account holders and other information.

(2)

Literature Review

Mohsin Karovaliya et al. (2019) proposes an Eigenface-based method for face recognition. This shows the quality algorithm based on the existing algorithms. In this, the stats show the principle component analysis face recognition is best compared to the others and also consumes less storage space and computational time and the images are stored in the base of projections. The drawback of using the Eigenface method is sometimes there may be a chance of getting fraudulent activities because of fake masks and photos of the account holder. For this purpose 3D face mask comes into the picture. However, the computation cost is very high.

M.M. Desai et al. (2015) suggest a vibration sensor when the robbery or any other illegal activities occur then the vibration comes from the ATM. And in this system they use ARM Controller which is used to reduce instruction set architecture used in vibration controllers on which real-time data is collected. The beep sound can be heard when they start buzzing.

Wang. H et al (2011) use the Motor DC to lock atm doors. Some other additional security measures are also used. This will show the robbery and the person involved in the theft. Software implementation is deployed using software packages, the first one is the Flash magic simulator and the second one is the Keil Vision 3.0. GSM technology helps to find the stolen money when any robbery takes place at an ATM with minimization of loss and by the rapid reaction.

C. Bhosale et al. (2005), fingerprint recognition is done with a curvelet transform and finding distance between the fingers by the euclidean algorithm. In the database it consists of the entire database of finger codes and then compared with the test finger codes. If found some then the OTP send to the corresponding account holder and registered mobile number. Preprocessing is done by using the built-in Matlab function imread. The histogram equalization method helps in which the histogram and by increasing the global contrast image and by intensity distribution.

without affecting the entire contrast this permits higher contrast by a lower local contrast.

Spreading the frequent contrast values can be fulfilled by histogram. The feature extraction can be done using curvelet transform and by using FFT.

P. Dere et al. (2013), the OTP is generated by using the GSM module to enhance the security of the ATM system. If there is a problem with the network so instead of GSM technologies use Bluetooth connection with the atm, generates the OTP through mobile. SMS can be efficient with GSM Modems, and with a special subscription to get efficient GSM Modems. A standard GSM mobile with driver and cable to connect with a serial port.

S.Karediab et al. (2002) suggest Fisher faces algorithm for face recognition. Fisher Discriminant Analysis (FDA) includes the Local Fisher Discriminant Analysis (LFDA) that they aim to the data structures and have interests that are attracted and can handle the multimodally distributed data. Fisher’s original objective is both FDA and LFDA are solved with a ratio that traces from to the trace ratio.

Sivakumar T et al. (2009) investigate the Deep Learning method provides samples of the face and complete analysis of the system. The noise, poses, diversions in the angle, and expressions are fraudulent in face recognition. These are the problems that are the cause for the security system and its perfection becomes a loss when the face arrives and tracks face by recognizes. when the system recognizes the face that saves into the database and the OTP send through mobile so that deep learning techniques can improve the standards of capturing the face with accuracy when it matches the term so that the particular person along with OTP provides the security.

(3)

System Design

The Implementation of face ATM recognition systems is mainly focused on security which uses an embedded Linux platform. The system is implemented with OpenCV which is used for image processing and with extended credit card size capability. Initially, the system recognizes the face and if it is in the database then it authenticates successfully or if the face is not detected properly, then there will be an alert in a mobile application for further process. If the user press yes the process will continue. If not the user press no then the process will be terminated.

Figure 1: Face ATM Process Flow Diagram

System Implementation

Face Recognition Technique

Initially enter the first transaction method and if we enter 1 then it open the camera and recognizes the face.

Figure 2: Face recognition

Image Capture

If the face is found which is stored in the database then it will authenticate successfully and it shows the particular account name holder and we enter the amount we need to it from the account

(4)

That is when the other person tries to use your atm card then the alert message goes to the police web portal page.

Figure 3: Image training

Secret Pin

For the sake of users, we provide the two ways of transaction one is the face recognition method and another one is secret pin generating for the other users. This is for if the account holder not able to came and he/she wants another person to take the amount from their account for this we created an atm secret OTP generating app. In this when they enter the second option then we can enter the secret pin and amount then tells the secret pin to him/her then take the amount from our account it’s a highly secured one.

Figure 4: Secret Pin Entry

Secret OTP using ATM App

If we enter the secret pin in this app and tell the other user who wants to take the amount then tell the secret pin to them and take the amount from the account.

(5)

Figure 5: OTP through ATM

Police Web Portal

In this, if the person's face not in the database or if he/she tries to use our atm card then their face is captured and the alert message sends to the police through the police web portal so the fraudulent activity will not takes place.

Figure 3.6 OTP through ATM

Conclusion

Facial recognition has proven to be one of the most secure methods of all biometric systems to a point for high-level security and to stop robberies and provide secure ATM service. In the proposed project, the traditional ATM system was replaced. It also consists of advantages that are reducing the cost of manufacturing overcomes the disadvantages of the traditional system. With new improved techniques in the field of Artificial Intelligence that help eliminate more disturbances and distortions, the rate of effectiveness of the system can be improved.

REFERENCES

[1] Patoliya,JJ, Desai, MM 2017, "Face Detection based ATM Security System using Embedded Linux Platform ", 2nd Int. Conf. for Convergence in Technology (I2CT).

[2] Karovalia,M, Karediab,S, Ozac,S, Kalbande,DR 2015, "Enhanced security for ATM machine with OTP and Facial recognition features", Int. Conf. on Advanced Computing Technologies and Applications (ICACTA).

(6)

[3] Sivakumar, T, Ashok, G, Venu Prathap,KS 2013, "Design and Implementation of Security Based ATM theft Monitoring system", International Journal of Engineering Inventions, Volume 3, Issue 1.

[4] Bhosale,C, Dere,P, Jadhav,C, 2017, "ATM security using face and fingerprint recognition", Interna- tional Journal of Research in Engineering, Technology and Science, Volume VII.

[5] Manoj,V et al. 2018, "Multi Authentication ATM Theft Prevention Using iBeacon", International Research Journal of Engineering and Technology (IRJET), Volume : 6, Issue : 2, pp.1713-1715.

[6] Wang, L et al. 2011 " Face recognition using maximum local fisher discriminant analysis", 18th IEEE Int. Conf. on Image Processing.

[7] Shailaja,K et al. 2016 "Effective Face Recognition using Deep Learning based Linear Discriminant Classification ", IEEE Int. Conf. on Computational Intelligence and Computing Research.

[8] Babaei,HR, Molalapata, O, Akbar Pandor,AHY 2012, "Face Recognition Application for Automatic Teller Machines (ATM)", International Conference on Information and Knowledge Manage- ment (ICIKM).

Referințe

DOCUMENTE SIMILARE

Abstract: Creation of the modern epoch, the state law is mainly governed by the supremacy of law, but of a fair law, equal for all citizens and exerting positive effects not only

Keywords: trickster discourse, meaning, blasphemy, social change, transgression of social norms.. The Myth of the trickster and its

The evolution to globalization has been facilitated and amplified by a series of factors: capitals movements arising from the need of covering the external

Using a case study designed for forecasting the educational process in the Petroleum-Gas University, the paper presents the steps that must be followed to realise a Delphi

The global variability analysis of the geological characteristics focuses on the insurance of the representative evaluation and it can be realised by the distribution mode,

International food trade and foreign travel are increasing, bringing important social and economic benefits. But this also makes the spread of illness around the world easier.

We then go on to examine a number of prototype techniques proposed for engineering agent systems, including methodologies for agent-oriented analysis and design, formal

Key Words: American Christians, Christian Right, Christian Zionism, US-Israel Relations, Conservative Christians Theology, State of Israel, Jews, Millennial beliefs,