You are on page 1of 25

BIOMETRIC ATM IRIS RECOGNITION

A
TECHNICAL SEMINAR REPORT
On

BIOMETRIC ATM IRIS RECOGNITION


Submitted by

VIJAY YEDLA
(Register No: 187Y1A0558)

To
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

In partial fulfillment of the requirements for the award of the Degree of


BACHELOR OF TECHNOLOGY

In

COMPUTER SCIENCE AND ENGINEERING

Under the Guidance


Of

Mr. Imtiyaz Khan


Assistant Professor

Dec 2021

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


1
BIOMETRIC ATM IRIS RECOGNITION

CERTIFICATE

This is to certify that VIJAY YEDLA has completed Bachelor of Technology technical

seminar entitled “BIOMETRIC ATM IRIS RECOGNITION” under my guidance and

supervision. To the best of my knowledge, the present work is the result of her original

investigation and study. No part of the report has ever been submitted for any other degree

or diploma. The seminar report is fit for the submission and the partial fulfillment of the

conditions for the award of B.Tech Computer Science and Engineering.

Date: Signature of Advisor

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


2
BIOMETRIC ATM IRIS RECOGNITION

DECLARATION

I hereby declare that the Technical Seminar entitled, “BIOMETRIC ATM IRIS

RECOGNITION” submitted for the B.Tech Degree is entirely my work and all ideas and

references have been duly acknowledged. It does not contain any work for the award of

any other degree or diploma.

Date: Investigator
VIJAY YEDLA
(Register No: 187Y1A0558)

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


3
BIOMETRIC ATM IRIS RECOGNITION

ACKNOWLEDGEMENT

I am happy to express my deep sense of gratitude to the principal of the college

Dr. K. VENKATESWARA REDDY, Professor, Department of Computer Science and

Engineering, Marri Laxman Reddy Institute of Technology & Management, for having provided

us with adequate facilities to pursue our technical seminar report.

I would like to thank Dr. Mr. ABDUL BASITH KHATEEB, Professor and Head,

Department of Computer Science and Engineering, Marri Laxman Reddy Institute of

Technology & Management, for having provided the freedom to use all the facilities

available in the department, especially the laboratories and the library.

I am very grateful to my project guide Mr. IMTIYAZ KHAN, Asst. Prof., Department of

Computer Science and Engineering, Marri Laxman Reddy Institute of Technology &

Management, for his extensive patience and guidance in completing the technical seminar

report.

I sincerely thank my seniors and all the teaching and non-teaching staff of the Department

of Computer Science for their timely suggestions, healthy criticism and motivation during

the course of this work.

Finally, I express my immense gratitude with pleasure to the other individuals who have

either directly or indirectly contributed to my need at right time for the development and

success of this work.

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


4
BIOMETRIC ATM IRIS RECOGNITION

ABSTRACT

There is an urgent need for improving security in banking region. With the advent of
ATM though banking became a lot easier it even became a lot vulnerable. The chances of
misuse of this much hyped ‘insecure’ 0baby product (ATM) are manifold due to
the exponential growth of ‘intelligent’ criminals’ day by day. ATM systems today use no
more than an access card and PIN for identity verification. This situation is unfortunate
since tremendous progress has been made in biometric identification techniques, including
finger printing, facial recognition, and iris scanning. This paper proposes the development of a
system that integrates Iris scanning technology into the identity verification process used in
ATMs. The development of such a system would serve to protect customers and financial
institutions alike from fraud and other breaches of security.

Keywords: Biometric, ATM, PIN, Security, Fingerprint, Encryption.

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


5
BIOMETRIC ATM IRIS RECOGNITION

------------------------------------- CONTENT--------------------------------------------------

Introduction ……………………………………………………………………...8
Literature Review ………………………………………………………………..10
How the Biometric ATM works………………………………………………….11
Methodology …………………………………………………………………….13
Iris Recognition…………………………………………………………………...16
Definition of Terms ………………………………………………………………18
Financial Budget ………………………………………………………………....19
Applications…………………………………………………………………...….20
Conclusion ………………………………………………………………………..21
References ………………………………………………………………………..22

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


6
BIOMETRIC ATM IRIS RECOGNITION

LIST OF FIGURES
1. CHAPTER 3

1.1 A PERSON EYE PULSATING………………………………. 12

2. CHAPTER 5

5.1 IRIS RECOGNITION…………………….………………………16

5.2 HUMAN EYE…………………………………………………….17

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


7
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 1
INTRODUCTION

The rise of technology in India has brought into force many types of equipment that aim at
more customer satisfaction. ATM (Automated Teller Machine) is one such machine which
made money transactions easy for customers to bank. The other side of this improvement is the
enhancement of the culprit’s probability to get his ‘unauthentic’ share. Traditionally, security is
handled by requiring the combination of a physical access card and a PIN or other password in
order to access a customer’s account. This model invites fraudulent attempts through stolen
cards, badly-chosen or automatically assigned PINs, cards with little or no encryption schemes,
employees with access to non-encrypted customer account information and other points of
failure. The use of Biometric ATM's based on iris recognition technology has gone a long way in
improving customer service by providing a safe and paperless banking environment. A
biometric system provides automatic recognition of an individual based on some sort of unique
feature or characteristic possessed by the individual. Biometrics gained lot of attention over
recent years as a way to identify individuals. As technology and services have developed in the
modern world, human activities and transactions have proliferated in which rapid and reliable
personal identification is required. The ATM is an electronic machine that enables customers of
financial institutions to perform financial transactions, such as cash withdrawals, deposits,
transfer funds, or obtaining account information, at any time and without the need for direct
interaction with bank staff. The ATMs have become very common and user friendly in the
public.

TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM


8
BIOMETRIC ATM IRIS RECOGNITION

Iris recognition is an automated method of biometric identification that


uses mathematical pattern recognition techniques on video images of one or both of the irises of
an individual's eyes, whose complex patterns are unique, stable, and can be seen from
some distance. Every individual is recognized by a set of features unique to that individual. No
two different individual’s possess same set of physical and behavioral
characteristics. This uniqueness of an individual can be preserved and deployed to
identify and recognize an individual. Biometrics is a field which deals with identifying and
recognizing an individual based on some measurable physical characteristics and some
biological behavior such as DNA. The word “biometric” is a Greek word that is derived from
two words- bio (life) and metric (to measure). Iris recognition has drawn much attention due
to its convenience and security. Compared with other biometric modality, iris pattern has
been regarded as one of the most accurate biometric modalities for its uniqueness, stability
and no intrusiveness. However, as other biometric systems, iris system is also
under threat of forged iris attack
TECHNICAL SEMINAR REPORT (2018-2022 Batch) Dept.of CSE, MLRITM
9
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 2
LITERATURE REVIEW

The first ATMs were off-line machines, meaning money was not automatically withdrawn from
an account. The bank accounts were not (at that time) connected by a computer network to the
ATM (The New York Times 1961). Therefore, banks were at first very exclusive about who
they gave ATM privileges to. Giving them only to credit card holders (credit cards were used
before ATM cards) with good banking records (ATM Marketplace 2013). In modern ATMs,
customers authenticate themselves by using a plastic card with a magnetic stripe, which
encodes the customer's account number, and by entering a numeric pass code called a PIN
(personal identification number), which in some cases may be changed using the
machine.(BBC News 2010) Typically, if the number is entered incorrectly several times in a
row, most ATMs will retain the card as a security precaution to prevent an unauthorised user
from working out the PIN by pure guesswork (History of Telecommunications Conference
2008)
Problem Statement
The issue of people’s accounts being emptied by fraudsters when they are able to hack into
their cards to know their PIN.
Research Objectives
(i) To proffer solution to ATM fraud in the Banking Industry.
(ii) To stop the vice of people impersonating others to withdraw money on their behalf from the
ATM.

Significance of the Study


Once this study is carried out the issue of fraudsters making away with customers’ money will be a
thing of the past.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


10
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 3
HOW THE BIOMETRIC ATM WORKS

When a customer puts in a bank card, a stereo camera locates the face, finds the eye and
takes a digital image of the iris at a distance of up to three feet. The resulting computerized "iris
code" is compared with one the customer will initially provide the bank. The ATM won't work if
the two codes don't match. The entire process takes less than two seconds.

The system works equally well with customers wearing glasses or contact lenses and at night.
No special lighting is needed. The camera also does not use any kind of beam. Instead, a
special lens has been developed that will not only blow up the image of the iris, but provide
more detail when it does. Iris scans are much more accurate than other high-tech ID systems
available that scan voices, faces and fingerprints.

Scientists have identified 250 features unique to each person's iris-compared with about 40 for
fingerprints-and it remains constant through a person's life, unlike a voice or a face. Fingerprint
and hand patterns can be changed through alteration or injury. The iris is the best part of the eye
to use as an identifier because there are no known diseases of the iris and eye surgery is not
performed on the iris. Iris identification is the most secure, robust and stable form
of identification known to man. It is far safer, faster, more secure and accurate than DNA
testing. Even identical twins do not have identical irises. The iris remains the same from 18
months after birth until five minutes after death.

When the system is fully operational, a bank customer will have an iris record made for
comparison when an account is opened. The bank will have the option of identifying either the
left or right eye or both. It requires no intervention by the customer. They will simply get a
letter telling them they no longer have to use the PIN number. And, scam artists beware, a
picture of the card holder won't pass muster. The first thing the camera will check is whether the
eye is pulsating. If we don't see blood flowing through your eye, you're either dead or it's a
picture.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


11
BIOMETRIC ATM IRIS RECOGNITION

Figure-3.1 A PERSON EYE PULSATING

Human iris on the other hand as an internal organ of the eye and as well protected from
the external environment, yet it is easily visible from within one meter of distance makes it a
perfect biometric for an identification system with the ease of speed, reliability and automation.
It is estimated that the chance of two iris being identical is 1 in 10.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


12
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 4
METHODOLOGY

The first and most important step of this project will be to locate a powerful open-source
iris recognition program that uses local feature analysis and that is targeted at
facial verification. This program should be compliable on multiple systems, including
Linux and Windows variants, and should be customizable to the extent of allowing for
variations in processing power of the machines onto which it would be deployed.

We will then need to familiarize ourselves with the internal workings of the program so that we
can learn its strengths and limitations. Simple testing of this program will also need to occur so
that we could evaluate its effectiveness. Several sample images will be taken of several
individuals to be used as test cases – one each for “account” images, and several each for “live”
images.

Once a final program is chosen, we will develop a simple ATM black box program. This
program will serve as the theoretical ATM with which the iris recognition software will
interact. It will take in a name and password, and then look in a folder for an image that is
associated with that name. It will then take in an image from a separate folder of “live” images
and use the iris recognition program to generate a match level between the two. Finally, it will
use the match level to decide whether or not to allow “access”, at which point it will terminate.
Both pieces of software will be compiled and run on a Windows XP and a Linux system. Once
they are both functioning properly, they will be tweaked as much as possible to increase
performance (decreasing the time spent matching) and to decrease memory footprint.
Following that, the black boxes will be broken into two components – a server and a client – to
be used in a two-machine network. The client code will act as a user interface, passing all input
data to the server code, which will handle the calls to the iris recognition software, further
reducing the memory footprint and processor load required on the client end. In this sense, the
thin client architecture of many ATMs will be emulated.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


13
BIOMETRIC ATM IRIS RECOGNITION

We will then investigate the process of using the black box program to control a USB camera
attached to the computer to avoid the use of the folder of “live” images. Lastly, it may be
possible to add some sort of DES encryption to the client end to encrypt the input data and
decrypt the output data from the server – knowing that this will increase the processor load, but
better allowing us to gauge the time it takes to process. The function of the iris is to control the
amount of light entering through the pupil, and this is done by the sphincter and the dilator
muscles, which adjust the size of the pupil. The iris recognition systems have recently shown
very high accuracies in verifying an individual's identity. A complete iris recognition system
can be split into four stages: Image acquisition, segmentation, encoding and matching. The
results of this system are very efficient for ATM transactions.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


14
BIOMETRIC ATM IRIS RECOGNITION

Activity Diagram for Customer’s Transaction

Customer arrives at the ATM

Insert ATM Card

Enter PIN or Enrol Iris

PIN or Iris Accepted? No


Yes

Select Transaction Type

Perform the Transaction

No more Transactions No

Yes

Exit and Remove Card

Customer leaves the ATM venue

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


15
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 5
IRIS RECOGNITION

In spite of all these security features, a new technology has been developed. Bank
United of Texas became the first in the United States to offer iris recognition technology at
automatic teller machines, providing the customers a card less, password-free way to get their
money out of an ATM. There's no card to show, there's no fingers to ink, no customer
inconvenience or discomfort. It's just a photograph of a Bank United customer's eyes. Just step
up to the camera while your eye is scanned. The iris -- the colored part of the eye the camera
will be checking -- is unique to every person, more so than fingerprints.

Figure-5.1 A PERSON EYE PULSATING

Iris scan biometrics employs the unique characteristics and features of the human
iris in order to verify the identity of an individual. The iris is the area of the eye where the
pigmented or coloured circle, usually brown or blue, rings the dark pupil of the eye. Iris
recognition system has proven its capability in implementing reliable biometric
security protocols in various high-risk sectors like aviation, border patrol and defence. The
banking and financial sector has to adopt this system because of its robustness and the
advantages it provides in cutting costs and making processes more streamlined. The technology
started out as a novelty however due exigencies in the banking sector characterized by
decreasing profits
it became a necessity. The use of Biometric ATM’s based on iris recognition technology has
gone a long way in improving customer service by providing a safe and paperless banking
environment.
TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM
16
SILENT SOUND TECHNOLOGY
BIOMETRIC ATM IRIS RECOGNITION

Figure-5.2 A PERSON EYE PULSATING

The iris is a thin circular diaphragm, which lies between the cornea and the lens of the
human eye. The iris is perforated close to its centre by a circular aperture known as the pupil.
The function of the iris is to control the amount of light entering through the pupil, and this is
done by the sphincter and the dilator muscles, which adjust the size of the pupil. The iris
recognition systems have recently shown very high accuracies in verifying an individual’s
identity.
A complete iris recognition system can be split into four stages: Image
acquisition, segmentation, encoding and matching. The results of this system are very
efficient for ATM transactions
TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM
17
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER:6
DEFINITION OF TERMS

1. ATM-Automated Teller Machine


2. PIN-Personal Identification Number
3. Biometric-The use of measurement of human features, such as fingers or eyes,
in order to identify people.
4. Security-Protection against attack of the ATM and the users’ accounts.
5. Encryption-Special coding of the ATM card for unauthorized persons not to
have access to accounts of others.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


18
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 7

FINANCIAL BUDGET

ATM Equipment
Card Reader
Speaker
Receipt Printer
Cash Dispenser
Deposit Slot
Key Pad
Biometric Reader (Camera)
CPU
LCD Screen
For all Equipment $1,500 = #675,000) #450 to $1
Workmanship ($1,000 = #450,000) #450 to $1
Miscellaneous ($500 = #225,000) #450 to $1

Total = ($3,000 = #1,350,000) #450 to $1

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


19
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 8

APPLICATIONS:

1. Banking & Finance

2. Food coupons/Tickets/canteen ATM

3. Membership Verification ATM

4. Self-service ATM

5. Retail ATM

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


20
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 9

CONCLUSION

Thus, we are looking forward to an ATM model that is more reliable in providing security
by using iris scanner software. By keeping the time elapsed in the verification process to a
negligible amount we even try to maintain the efficiency of this ATM system to a greater
degree. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is
no broad leap to realize that banks already build an archive of their customer images, even if
they are not necessarily grouped with account information.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


21
BIOMETRIC ATM IRIS RECOGNITION

CHAPTER: 10

REFERENCES

1. J. Daugman. High confidence visual recognition of persons by a test of statistical


independence. IEEE Trans.PAMI, 15(11):11481161, November 1993.

2. J. Daugman. The importance of being random: Statistical principles of iris recognition.


Pattern Recognition, 36(2):279291,

3. J. Daugman. Anatomy and physiology of the iris. [htlm-doc.], [retrieved 15.10.2003]. From:
http://www.cl.cam.ac.uk/users/jgd1000/anatomy. html.R.Wildes. Iris recognition: An
emerging biometric technology. Proceedings of the IEEE, 85(9):13481363, September 1997.

4. W. Boles and B. Boashash. A human identification technique using images of the iris and
wavelet transform. IEEE Trans. Signal Processing,46(4):11851188, April 1998.

TECHNICAL SEMINAR REPORT(2018-2022 Batch) Dept.of CSE, MLRITM


22

You might also like