You are on page 1of 55

BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

DECLERATION
We declare that, this is our work and that all part of the project report is by our own idea and
with some reference from internet. This project paper is submitted to school of Electrical and
Computer engineering Control stream at Jimma institute of technology.
This is to certify that the above declaration made by our effort is correct to the best of our
knowledge. In doing so, we prove that we agree with all written above with our signature as
follows.
Name Id Signature

1.Yeshiwas Admasu…………………………………….03417/04 ……..

2.Yibelital Tefera……………………………………….03427/04 ……….

3.Yillak Gedamu……………………………………….03439/04 ……….

4.Yimam Ali……………………………………………03445/04 ……….

5.Zekeria Ibrahim ……………………………………. 03510/04 ………

Adivisor Dr.Parashanth

Signature………….

Examiner…………………

Signature…………………

JIT 5TH YEAR ECE FINAL PROJECT I


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

ACKNOWLEDGMENT
Firstly, we would like to express our deepest gratitude to our respected advisor Dr.Parashanth for
his humble guidance, encouragement, patient enthusiasm, invaluable support and motivation
through the whole completion of this project. This project would not be succeeded without his
continuous support. Secondly, we would like to drop our sincere appreciation to thank to our co-
workers who have been tolerant, motivated us and support us all these semester in accomplishing
this project. Thanks for their encouragement, love and emotional supports that they had given to
us. Last but not least, we would like to express our heartiest appreciation to our friends and JIT
member’s and those whom involve directly or indirectly with this project. There is no such
meaningful word thank, thank you So Much.

JIT 5TH YEAR ECE FINAL PROJECT II


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

ABSTRACT
In this project we have done on biometric authentication system that is finger print authentication
system. Biometric authentication system is used for different purpose in place of visa cards or
automated teller machine (ATM) cards because of the visa or ATM card and the password is
forgotten during a person travel from one place to other place. Due to difficult to remember and
memorize of this two things (visa cards and password) we design this biometric authentication
system, since biometric authentication system is safe and secure, unforgettable and also very
easy to use everywhere. Biometric authentication system is reliable, economical, save time, and
has more advantage compare to other like visa cards. The user suspect their password may be
stolen or attack by thief then the user change their password when they expect the password
attack by the thief. In order to solve this kind of problem we design biometric authentication
system (finger print), because biometrics is the science of using human measurements to identify
people. This technology not only make our lives easier and simple by reducing the required to
carry identification but also it prevents the use of forget visa card or ATM and passwords.
Biometric is selective because of why? It has unique characteristics that is no one shares and
remain the same over time.

In this project we have survey on biometric authentication system. Biometric authentication


system is used for various kinds of authentication system instead of the tension of cards to put
with them and to memorize their difficult passwords and pin numbers. Biometric authentication
system is much safe and secure and very easy to use and even without using any password or
secret codes to remember as compare with previous system like credit card payment system,
wireless system and mobile system etc. Biometric authentication system is reliable, economical
and it has more advantage as compare with others. In daily life the usage of credit cards, check
cards for shopping, bus card, subway card for traveling, student card for library and department,
and many kinds of cards for unlimited purpose and so on. So problem is that a person has to take
many cards and has to remember their password or secret codes and to keep secure to take with it
all time. So the biometric authentication system will solve this problem. Greater adoption of
biometric authentication system will drive down the cost of biometric readers and thus making it
more affordable to small business owner.

JIT 5TH YEAR ECE FINAL PROJECT III


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Table of Contents
ACKNOWLEDGMENT ............................................................................................................................ II
ABSTRACT ................................................................................................................................................ III
List of figure ............................................................................................................................................... VI
List of table ................................................................................................................................................ VII
ACRONYMS ............................................................................................................................................ VIII
CHAPTER ONE ..................................................................................................................................... - 1 -
1. INTRODUCTION ............................................................................................................................ - 1 -
1.1. BACKGROUND ...................................................................................................................... - 2 -
1.2. STATEMENT OF PROBLEM ............................................................................................... - 3 -
1.3. OBJECTIVE OF THE PROJECTS ....................................................................................... - 3 -
1.4. PROJECT SCOPE................................................................................................................... - 4 -
1.5. SIGNIFICANCE OF THE PROJECT................................................................................... - 4 -
1.6. LIMITATION OF THE PROJECT ....................................................................................... - 4 -
1.7. THESIS OVERVIEW.............................................................................................................. - 5 -
CHAPTER TWO .................................................................................................................................... - 6 -
2. LITERATURE REVIEW ................................................................................................................. - 6 -
2.1 GENERAL LITERATURE REVIEW ........................................................................................ - 6 -
CHAPTER THREE ................................................................................................................................ - 9 -
3. METHODOLOGY AND SYSTEM BLOCK DIAGRAM............................................................... - 9 -
3.1 METHODOLOGY...................................................................................................................... - 9 -
3.2 OVERVIEW OF SYSTEM BLOCK DIAGRAM ................................................................ - 11 -
3.3. COMPONENTS DESCRIPTION ........................................................................................ - 12 -
CHAPER FOUR ................................................................................................................................... - 25 -
4. System design and simulation ......................................................................................................... - 25 -
4.1. Finger print modules recognition ......................................................................................... - 26 -
4.2 BLOCK DIAGRAM OF THE SYSTEM .............................................................................. - 30 -
4.3. Overall flow chart of the projects ......................................................................................... - 31 -
CHAPTER FIVE .................................................................................................................................. - 34 -

JIT 5TH YEAR ECE FINAL PROJECT IV


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

5. CONCLUSION AND RECOMMENDATION .............................................................................. - 34 -


5.1. CONCLUSION ........................................................................................................................ - 34 -
5.2 RECOMMENDATION ............................................................................................................ - 35 -
REFERENCES ...................................................................................................................................... - 36 -
APPENDIXES ....................................................................................................................................... - 37 -

JIT 5TH YEAR ECE FINAL PROJECT V


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

List of figure

Figure 1.Methodology............................................................................................................................... - 9 -
Figure 2 system block diagram ............................................................................................................... - 12 -
Figure 3 PIC Microcontroller................................................................................................................. - 15 -
Figure 4 LCD diagram. ........................................................................................................................... - 18 -
Figure 5 power supply unit ..................................................................................................................... - 19 -
Figure 6 diagram of motor used .............................................................................................................. - 20 -
Figure 7 print authentication ................................................................................................................... - 21 -
Figure 8 binarization of fingerprint ......................................................................................................... - 21 -
Figure 9 Crystal oscillator interfaced with PIC....................................................................................... - 22 -
Figure 10 Diagram of keypad ................................................................................................................. - 23 -
Figure 11 System model diagram. .......................................................................................................... - 25 -
Figure 12 Simulation circuit of customer to enter the password ............................................................ - 26 -
Figure 13 Flow chart of basic fingerprint modules recognition .............................................................. - 27 -
Figure 14 Simulation of wrong code fingerprint entered. ....................................................................... - 29 -
Figure 15 Simulation for correct fingerprint entered. ............................................................................. - 30 -
Figure 16 The overall flow chart of the project. ..................................................................................... - 33 -
Figure 17 Final project design while displaying the finger print authentication ATM security system. - 33 -

JIT 5TH YEAR ECE FINAL PROJECT VI


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

List of table

Table 1 pin description of PIC microcontroller ...................................................................................... - 17 -

JIT 5TH YEAR ECE FINAL PROJECT VII


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

ACRONYMS
ATM: Automated teller machine

PIN: Personal identification number

LCD: Liquid crystal oscillator display


MIS: Management information system

EEPROM: Electrically Erasable Programmable Read Only Memory

PIC: Peripheral interfaces control

AC: Alternative current

DC: Direct current


ROM: Read only memory

JIT 5TH YEAR ECE FINAL PROJECT VIII


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

CHAPTER ONE
1. INTRODUCTION
One of our highest priorities in the world of information security is conformation that a person
accessing sensitive, confident, or classified information is authorized to do so. Such access is
usually accomplished by a person’s proving their identity by the use of some means or method of
authentication. Simply put, a person must be able to validate who they say are before accessing
information, and if the person is unable to do so, access will be denied. Generally speaking, a
system can identify you as an authorized user in one of three ways:–what you know, what you
have, or what you are. The most widely used of the three methods is what we know passwords or
other personal information. A more sophisticated method of authentication is what we have smart
cards and tokens. The last method is what we are biometric technology. Biometric is a field of
technology which has been and is being used in the identification of individuals based some
physical attribute. Many research has permitted there has been an effort by several tech companies
to develop standards for hardware and software that would be used throughout the industry in
further development within this area. The purpose of this project will be to look at the use of
biometrics technology to determine how secure it might be in authenticating user’s and how the
users job function or role would impact the authentication process or protocol. We will also
examine personal issue of privacy in the methods used for authentication; the cost of implementing
a biometrics authentication system, the efficiency of biometric authentication and the potential for
false or negative recognition of individual users. Generally biometric system can identify users
based on either physiological or behavioral characteristics. At present, biometric technology holds
great deal of promise for doing just that, but is not without its limitation and certainly not without
its critics.

JIT 5TH YEAR ECE FINAL PROJECT -1-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

1.1. BACKGROUND

Biometric identify people by measuring some aspects of individual anatomy or physiology (such
as your hand geometry or finger print), some deeply Ingrained skill, or other behavioral
characteristics (such your handwritten signature), or something that is a of the two (such as your
voice). Biometric authentication technologies such as face, finger, hand, and iris and speaker
recognition are commercially available today and are already in use. Biometric system is
essentially a pattern recognition system that operates by acquiring biometric data from an
individual, extracting a feature set from the acquire data, and comparing this feature set against
the template set in the database. Depending on the text, a biometric system may operate either in
verification mode or identification mode.

Verification mode: In the verification mode, the system validates a person’s identity by
comparing the capture biometric data with his/her own biometric templates stored system
database. In such a system, an individual who desires to be recognized claims an identity, usually
through a PIN(Personal Identification Number), a user name, a smart card etc…, and the system
conducts a one to one comparison to determine the claim whether the claim is true or wrong.
Generally identity verification is typically use for positive recognition, where the aim is to
prevent many people from the same identity.

Identification mode: In this mode the system recognizes an individual by searching the
templates of all the user in the database for a match. As a result the system conducts a one to
many comparison to establish an individual identity without the subject having to claim an
identity for instance “whose biometric data is this?”. Identification is a critical component in
negative recognition application where the system establishes whether the person is who
implicitly or explicitly denies to be. The purpose of negative recognition is to prevent single
person from using multiple identity’s. Identification may be used in positive recognition for
convenience that the user is not required to claim an identity while traditional method of personal
recognition such as passwords, PINs, keys, and tokens may work for positive recognition can
only be established through biometrics.

JIT 5TH YEAR ECE FINAL PROJECT -2-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

1.2. STATEMENT OF PROBLEM


There is a problem in current banking system since the current banking payment system is used
booking and visa card system. Despite in the modern electronically unified society a highly
consistent and reliable automatic personal authentication method is needed. The very famous
technique which can be used easily and which fulfills high security need is biometric. Due to its
extreme uniqueness and immutability “finger print” is most widely used biometric technique.

With today’s systems, individuals can authenticate their identity by one or an arbitrary
combination of the following three means:

 Knowledge: The specific knowledge of a secret, such as a password, passphrase, or PIN


code.
 Possession: The possession of the specific item or token, for instance a key, smart card or
identity card.
 Biometric: With a specific characteristics of the individual’s body such as finger print, iris
pattern, retina pattern, genetic finger print, voice features, facial properties, signature,
signature.

1.3. OBJECTIVE OF THE PROJECTS


1.3.1 GENERAL OBJECTIVE
Developing an automatic teller machine (ATM) system that utilizes fingerprint module
technology by using PIC microcontroller with other parameter in order to improve authentication
of customer using ATM machine and confidence in the banking sector.

1.3.2. SPECIFIC OBJECTIVE


 To research scope of biometric authentication techniques in ATMs.
 Fingerprint recognition: The masters' fingerprint information was used as the standards
of identification. It must certify the feature of the human fingerprint before using ATM
system.
 Remote authentication: System can compare current client's fingerprint
 To generate module this helps for simple operation of ATMs with full proof secure
authentication.

JIT 5TH YEAR ECE FINAL PROJECT -3-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

1.4. PROJECT SCOPE


This project is mainly concerns about biometric automated teller machine (ATM) which is
mainly used for customer around banks with them bank account to save their money, to transfer
and other services. But in this way if their ATM card is missed or stolen customer will lose his
money easily because of that many of the password they used is their phone number so we
develop to provide the maximum level security system.

1.5. SIGNIFICANCE OF THE PROJECT


The primary significance of biometric authentication methods over other methods of user
authentication is that they really do what they should that is they authenticate the user. This method
use real human physiological or behavioral characteristics to authenticate the user. This biometric
characteristic are permanent and not changeable.

User cannot pass their biometric characteristics to other user as easily as they do with their card or
password. Biometric objects cannot be stolen as tokens, keys, cards or other used for the traditional
user authentication. Most biometric techniques are based on something that cannot be lost or
forgotten.

1.6. LIMITATION OF THE PROJECT


Some of the limitation of this project is listed as follows:-

 Using Fake body parts


 Bit replay
 False accept rate
 False reject rate
 Biometrics cannot be cancelled
 Tracking

JIT 5TH YEAR ECE FINAL PROJECT -4-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

1.7. THESIS OVERVIEW


Chapter one: gives about the brief introduction description to the biometric automated
fingerprints ATM machines system and answer the why we have done this project, what is the
objectives, what the advantages we gained from the project and including its scopes.

Chapter two: covers the extensive literature review of previous works on biometric ATM machine
system and different established standards and protocol and the plat form of it how can it
implemented

Chapter three: Methodology and system block diagram: in this chapter brief description of about
the structure and interfacing of the devices such as PIC microcontroller, LCD display fingerprint
modules being used are proposed.

Chapter four: system design and Implementation: which covers the detail design and
implementation of all parametric and the overall integrated system or the main projects simulation
results of biometric authentication ATM machine system.

Chapter five: conclusion and recommendation: this chapter concludes the entire work performed
during the projects and point out some few recommendations on improving the performances and
the efficiency.

JIT 5TH YEAR ECE FINAL PROJECT -5-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

CHAPTER TWO
2. LITERATURE REVIEW
2.1 GENERAL LITERATURE REVIEW
Most finger print scan technologies are based minutiae. Samir Nanavati states that most finger
scan technologies are based on minutiae matching but that pattern matching is a leading alternative.
This technology bases its feature extraction and template generation on a series of ridges, as
opposed to discrete point.
The use of many ridges reduces dependence on minutiae points, which tend to be affected by wear
and tear. The downside of pattern matching is that it is more sensitive to the placement of the finger
during verification and the created template is several times larger in byte size. Finger scan
technology is proven and capable of high levels of accuracy. This is a long history of fingerprint
identification, classification and analysis. This along with distinctive features of fingerprints has
set the finger scan apart from other biometric technologies.
There are physiological characteristics more distinctive than the fingerprint such as iris and retina,
but automated identification technology capable of leveraging these characteristics have been
developed only over the past some years. The technology has grown smaller, more capable and
with many solutions available. Devices slightly thicker than a coin and an inch square in size are
able to capture and process images. Additionally, some may see the large number of finger scan
solutions available today as disadvantages and as advantage by ensuring marketplace completion
which has resulted in in a number of robust solutions for desktop, laptop, tablet, physical access
and point of sale environments. Biometric data are separate and distinct from personal information.
Biometric templates cannot be reverse engineered to recreate personal information and they cannot
be stolen and used to access personal information.
Current biometric systems are generally inflexible and not optimized for use within an enterprise.
Most biometric systems are monolithic, thick-client or standalone applications with very little
ability to interface to enterprise management information systems (MISs). Many biometric
applications do offer some interoperability and integration points with and for established MISs
such as PeopleSoft, SAS, Oracle and the like for personnel and accountability functions. However,
the ability of such enterprise systems to collaborate across a diverse set of biometric systems is

JIT 5TH YEAR ECE FINAL PROJECT -6-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

limited because of the lack of standardization and enterprise architecture support amongst the
various biometric systems. Likewise, there is a distinct lack of robust architectural support within
the security and legal domains when using biometrics in those business contexts evidenced by the
significant investment in stovepipe biometric systems.

Thus, the biometric market today is continuing a trend towards monopolistic stovepipe systems
risking higher prices and less innovation. Small scale, open-source initiatives however
demonstrate the opportunity for improving biometric system collaboration and performance
through higher quality and modern architectural choices. Our intent with this project is to highlight
alternatives for implementing biometric architecture for favorable consideration across an
enterprise. This project could become the basis for goals to which an enterprise could subscribe
when looking to improve their biometrics-business function capability sets. This could be
considered whether an enterprise is updating or upgrading present, existing biometric
infrastructure, or is considering a wholesale reconfiguring, re-architecting, or re-implementing of
business functions supported by biometric identification capabilities.

The purpose of this project is to document and demonstrate the comparison and trade-off of current
systems within their current architecture to like systems supported by a more robust and modern
architecture. To enhance the reliability of biometric based ATM systems, we propose that three
types of biometrics are used in conjunction for returning a clear authentication. The user provides
at the ATM machine, a fingerprint, eye print and palm print biometrics. These data pass over the
network to three different servers and at least two servers must return a clear authentication. This
method efficiently fights the hackers and network spyware systems and ensures that the users
resources are safe.

Now a day ATM with magnetic strip authenticated only by inserting password on the ATM
machine. But according to today’s scenario, cases of fraud are another problem. So they
provided fingerprint for more security. Now a days we are directing towards the pile of new
powerful, intelligent, auto rated system, which will give us easy to do the work smoothly, Thus
systems are not dependent on human support, one of these ATM SECURITY SYSTEM which
we have evolved. Today, ATM systems use PIN & access card for identity verification. The
recent advance in biometric identification techniques, retina scanning, including fingerprinting,

JIT 5TH YEAR ECE FINAL PROJECT -7-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

and facial recognition has made a great effort to rescue the unsafe situation at the ATM. This
research investigated the development of a scheme that integrates facial recognition technology
into the verification process used in ATMs. An ATM system that is reliable in providing more
security by using facial recognition is proposed. The development of such a scheme would help
to protect clients & financial institutions alike from intruders and identity thieves. This paper
concentrates on an ATM security system that would combine a physical access card, a Personal
Identification Number, & electronic facial recognition that will go as far as withholding the
fraudster’s card. Nevertheless, it's obvious that man’s biometric features cannot be replicated,
this proposal will go a long way to solve the problem of Account safety making it possible for
the actual account owner alone have access to his accounts. The combined biometric features
approach is to serve the purpose both the identification and authentication that card and PIN do.
2.2. What is Identification Authentication?
Identification is the process by which the identity of a user is established, authentication is the
process by which a service confirms the claim of a user to use a specific identity by the use of
credentials. Biometrics is very reliable for authentication. The difference is between a system
that looks at a hand geometry and says “this is Doctor Hunk” (identification) versus a man “who
says “I, Doctor Hunk, present my hand to prove who I am? And the system confirms this hand
matches Doctor Hunk’s template (authentication). Biometric authentication is feasible today.
2.3. What is biometric authentication?
Biometrics is biological authentications, based on some physical characteristics of the human
body.
The list of biometric authentication technologies is still growing. There are two categories of
biometric identifiers include physiological and behavioral characteristics. Physiological
characteristics are related to the shape of the body, and include but are not limited to: fingerprint,
face recognition, DNA, palm print, hand geometry, iris recognition (which has largely replaced
retina). Behavioral characteristics are related to the behavior of a person, including but not
limited to: typing rhythm, gait, digital signature and voice. More traditional means of access
control include token-based identification systems, such as driver’s license or passport, and
knowledge-based identification systems, such as password or Personal Identification Number
(PIN).

JIT 5TH YEAR ECE FINAL PROJECT -8-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

CHAPTER THREE
3. METHODOLOGY AND SYSTEM BLOCK DIAGRAM
3.1 METHODOLOGY
Among the methods that we for our project include the following.

Searching and studding of related literature

Studying Selecting of the required materials

`
Determine the specification of the selecting materials

Design the circuit based on their specification

Developing simulation for the project

Figure 1.Methodology
The design of entire system consisted of two part which are hardware and software. The
hardware is designed by the rules of embedded system, and the steps of software consisted of
three parts. The more details are shown as follows.
A. Hardware Design
The modules of LCD, keyboard, fingerprint recognition are connected with the main chip PIC
16F877A.
There are some modules consisted of the system as follows:

JIT 5TH YEAR ECE FINAL PROJECT -9-


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

 Fingerprint module: fingerprint processing includes two part: fingerprint enrollment and
fingerprint matching (the matching can be 1:1 or 1: N).when enrolling, user needs to
enter the finger two times. The system will process the two time finger images, generates
a templates of the finger based on processing results and store the template. When
matching, user enters the finger through optical sensor and system will generate a
template of the finger and compare it with templates of the finger library. For 1:1
matching, system will compare the live finger with specific template designated in the
Module; for 1: N matching, or searching, system will search the whole finger library for
the matching finger. In both circumstances, system will return the matching result,
success or failure.
 LCD Display: A liquid crystal display (LCD) is a thin, flat panel used for electronically
to display information such as text, images, and moving pictures. Its uses include
monitors for computers, televisions, instrument panels, and other devices ranging from
aircraft cockpit displays, to every-day consumer devices such as clocks, watches,
calculators. Among its major features are their lightweight constructions. Its low
electrical power consumption enables it to be used in battery-powered electronic
equipment. It is an electronically-modulated optical device made up of any number of
pixels filled with liquid crystals and arrayed in front of a light source (backlight) or
reflector to produce images in color or monochrome.

B. Software design
mikroC PRO for PIC and this manual are owned by mikroElektronika and are protected
by copyright law and international copyright treaty. Therefore, you should treat this manual
like any other copyrighted material (e.g., a book). The manual and the compiler may not be
copied, partially or as a whole without the written consent from the mikroEelktronika. The
PDF-edition of the manual can be printed for private or local use, but not for distribution.
Modifying the manual or the compiler is strictly prohibited
High risk activities:
The mikroC PRO for PIC compiler is not fault-tolerant and is not designed, manufactured
Or intended for use or resale as on-line control equipment in hazardous environments requiring
Fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or

JIT 5TH YEAR ECE FINAL PROJECT - 10 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Communication systems, air traffic control, direct life support machines, or weapons systems,
in which the failure of the Software could lead directly to death, personal injury, or severe
Physical or environmental damage ("High Risk Activities").mikro Elektronika and its suppliers
Specifically disclaim any express or implied warranty of fitness for High Risk Activities.
License agreement:
By using the mikroC PRO for PIC compiler, you agree to the terms of this agreement.
Only one person may use licensed version of mikroC PRO for PIC compiler at a time.
Copyright © mikroElektronika 2003 - 2009.
This manual covers mikroC PRO for PIC version 1.1 and the related topics. Newer versions
may contain changes without prior notice.

3.2 OVERVIEW OF SYSTEM BLOCK DIAGRAM

Now a days, in the self-servicing banking system, has got extensive popularization with the
characteristic offering high quality 24 hours for the customers. Using the ATM (automated
teller machine) which provide the customers with the convenient banknote trading is very
common. However, the financial crime case rises repeatedly in recent year, a lot of criminals
tamper with the ATM terminal and steal user’s credit card and password by illegal means.
Once user's bank card is lost and the password is stolen, the criminal will draw all the cash in
short time, which will bring enormous financial losses to the customer. Traditional ATM
systems authenticate generally using the credit card and password, the method has some
defects. Using credit card and password cannot verify the client’s identity exactly.

The biometric authentication of ATM machine is a securing system that ask the customer’s
fingerprint in addition to the user’s credit card and password. This security system allows the
customer to give his/her fingerprint only when the valid card and password is given to the
machine, which makes the system more reliable.

JIT 5TH YEAR ECE FINAL PROJECT - 11 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Our system block diagram is shown below which includes all the components and illustrates
about the connectivity of the design

Power LCD DISPLAY


supply unit PIC16F877A
p MICROCONTRL
LER

MOTOR MOTOR
DRIVER

(ULN2003
MODULE)

FINGER
PRINT
SCANNER
Figure 2 system block diagram

3.3. COMPONENTS DESCRIPTION


3.1.1. PIC16f877 Microcontroller
PIC stands for Peripheral Interface Controller given by Microchip Technology to identify its
single chip microcontroller’s .PIC16f877 Microcontroller is the devices which is one of the most
advanced microcontrollers from microchip. This controller is widely used for experimental and
modern applications because of its low price, wide range of applications, high quality, and ease
of availability. It is ideal for applications such as machine control applications, measurement
devices, study purpose, and so on. The PIC 16F877 features all the components which modern
microcontrollers normally have. The figure of chip is shown below. These devices have been
very successful in 8-bit microcontrollers.

The main reason is that Microchip Technology has continuously upgraded the device
architecture and added needed peripherals to the microcontroller to suit customers' requirements.

JIT 5TH YEAR ECE FINAL PROJECT - 12 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

The popularity of the PIC microcontrollers is due to the following factors:


1. Speed: Harvard Architecture, RISC architecture, 1 instruction cycle = 4 clock cycles.
2. Instruction set simplicity: The instruction set consists of just 35 instructions.
3. Power-on-reset and brown-out reset. Brown-out-reset means when the power supply goes
below a specified voltage (say 4V), it causes PIC to reset; hence malfunction is avoided. A watch
dog timer (user programmable) resets the processor if the software/program ever malfunctions
and deviates from its normal operation.
4. PIC microcontroller has four optional clock sources.

 Low power crystal


 Mid-range crystal
 High range crystal
 RC oscillator

5. Programmable timer and on-chip ADC

6. Up to 12 independent interrupt sources

7. powerful output pin control

8. EEPROM /ROM/flash options

9. I/O port expansions capability

 PIC-Micro-Controller contains timers which can be programmed by the customer manually in


addition to it built in ADCs are also present within the Micro-Controller.
 PIC Micro-Controller uses RISC architecture as opposed to CISC architecture used in other
counterparts.
 PIC Micro-Controller contains a variety or blend of interrupt sources which are solely
autonomous.
 The power rating of the pins of PIC Micro-Controller is sufficiently higher for day to day
functionalities or normal operation.
 PIC Micro-Controller contains a variety or blend of memory alternatives like EEPROM, ROM,
RAM, OTP etc.
 PIC Micro-Controller contains such a type of input output ports which can be expanded.

JIT 5TH YEAR ECE FINAL PROJECT - 13 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

 PIC Micro-Controller contains an incorporated oscillator whose swiftness can be varied


according to the customer requirement.
 PIC Micro-Controllers are available in the market at very reasonable price.
 The packaging of PIC Micro-Controllers facilitate the customers to use it in a less delicate
manner.

This microcontroller is required to serve the purpose monitoring the transformer information such as
temperature, voltage, current and oil level through the LCD display, send SMS alert when there is any
fault. Modern power networks require faster, more accurate and reliable protective schemes.

Following are some distinctive attributes of the PIC 16F877A from its other counterparts.

A .Excellent Performance RISC CPU: PIC 16F877A uses Reduced Instruction Set Computer due to
following fundamental advantages

 There are very limited amount of instructions that the programmer has to memorize  Majority
of instructions (more than 95 %) takes only one cycle for their execution.
 The processing or working speed is very high (like twenty megahertz for the clock input)
 The amount of duration required for each instruction to be executed is very less (not more than
200 nanoseconds).
 The amount of available memory is in abundance and is sufficient enough for the requirements
of regular projects.

B. Peripheral Features: Some of the peripheral features of the PIC 16F877A are listed below.

 PIC 16F877A encompasses of three different types of timers with special functionalities.
 First of them is termed as Timer0. It is an eight bit timer, can also be used as a counter. The
function of pre-scalar is also inherent in it.
 There is another timer enclosed in this Micro-Controller referred to as Timer1. With respect to
the size it is larger than the previous timer and constitutes of sixteen bits.
 Last but not the least Timer2 is also present in this Micro-Controller, with the feature of post
scalar in addition to pre-scalar.

C. Analog Features:

The primary analog features of PIC 16F877A are listed below

JIT 5TH YEAR ECE FINAL PROJECT - 14 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

1) It comprises of a built-in Analog to Digital converter of ten bits and constituting eight channels
for conversion.

2) To prevent the sensitive circuitry of the Micro-Controller it encompasses an option of Brown out
Reset.

3) It contains a default Analog Comparator module containing a pair of analog comparators, a


module in which voltage reference level can be programmed as per requirement.

4) It contains an additional functionality of multiplexing the inputs that can be programmed.

5) Exterior access to the outputs of the comparator is present with ease.

D. Distinctive Micro Controller Features: There are certain types of unique characteristics that are
inherent in this type of Micro-Controller

Figure 3 PIC Microcontroller

Features of PIC16f877A:

JIT 5TH YEAR ECE FINAL PROJECT - 15 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

 Maximum operating frequency is 20MHz

 Flash program memory (14 bit words), 8KB

 Data memory (bytes) is 368

 EEPROM data memory (bytes) is 256

 5 input/output ports

 3 timers

 2 CCP modules

 2 serial communication ports (MSSP, USART)

 PSP parallel communication port

 10bit A/D module

Special features:

 Hundred thousand times erase/write cycle enhanced memory

 Self-programmable under software control

 In-circuit serial programming and in-circuit debugging capability

 Single 5v, DC supply for circuit serial programming

 Programmable code protection

 Power saving sleep modes

 Selectable oscillator option

JIT 5TH YEAR ECE FINAL PROJECT - 16 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

PIC 16F877 has 5 basic input/output ports. They are usually denoted by PORT A, PORT B,
PORT C, PORT D, and PORT E. these ports are used for input/output interfacing.

Ports Pin number Bit wide(bit)


Port A RA-0 to RA-5 6
Port B RB-0 to RB -7 8
Port C RC-0 to RB -7 8
Port D RD -0 to RB -7 8
Port E RE-0 to RE -2 3
Table 1 pin description of PIC microcontroller

3.1.2.EEPROM (memory)
EEPROM (electrically erasable programmable read-only memory) is user-modifiable read-only
memory (ROM) that can be erased and reprogrammed (written to) repeatedly through the
application of higher than normal electrical voltage. Unlike EPROM chips, EEPROMs do not
need to be removed from the computer to be modified. However, an EEPROM chip has to be
erased and reprogrammed in its entirety, not selectively. It also has a limited life that is, the
number of times it can be reprogrammed is limited to tens or hundreds of thousands of times. In
an EEPROM that is frequently reprogrammed while the computer is in use, the life of the
EEPROM can be an important design consideration. A special form of EEPROM is flash
memory, which uses normal PC voltages for erasure and reprogramming [6].

3.1.3.LCD Display
LCD-Liquid Crystal Display is an electronic device for displaying text or Characters [2]. We are using 14
pin LCD. 16*2 represents 16 characters and 2 line display. LCD’s are economical and easily
programmable and can easily display special and custom characters.

JIT 5TH YEAR ECE FINAL PROJECT - 17 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Figure 4 LCD diagram.

Pin description is as follows


1. Pin 7 to pin 14-All 8 pins are responsible for the transfer of data.

2. Pin 4-This is RS i.e., register select pin.

3. Pin 5-This is R/W i.e., Read/Write pin.

4. Pin 6-This is E i.e., enable pin.

5. Pin 2-This is VDD i.e., power supply pin.

6. Pin 1 -This is VSS i.e., ground pin.

7. Pin 3-This is short pin

3.1.4. Power supply


The power supply unit is used to provide a constant 5V of DC supply from a 230V of AC supply.
These 5V DC will acts as power to different standard circuits. It mainly consists of following blocks.
The power supply section is required to convert AC signal to DC signal and also to reduce
the amplitude of the signal. The available voltage signal from the mains is 230V/50Hz which
is an AC voltage, but the required is DC voltage (no frequency) with the amplitude of +5V

JIT 5TH YEAR ECE FINAL PROJECT - 18 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

and +12V for various applications.

Figure 5 power supply unit

3.1.5. Unipolar motor

A unipolar motor (also called homopolar) is a (DC) motor typically with slip-rings on each end of
a cylindrical rotor and field magnets or a DC field winding generating a magnetic field on the
stator. The rotor has typically not winding but just straight connections in axial direction between
the slip-rings e.g. a copper tube encasing the rotor or rods embedded in the rotor. The field is
uniformly perpendicular to the cylindrical rotor surface and does not change polarity over the 360-
degree perimeter of the cylindrical part of the rotor. That means if the field is considered entering
the rotor between the slip-rings it must leave the rotor though the rotor's end surfaces. It is not
important that the magnetic field is generated from the stator a similar field may be generated from
the rotor with the same effect the magnetic fields would not rotate with the rotor. Unipolar motors
and generators are rarely built anymore because of advancing technology.

JIT 5TH YEAR ECE FINAL PROJECT - 19 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

+88.8

Figure 6 diagram of motor used

3.1.6. Finger print module


Finger print identification is based on the fact that no two persons will have the same finger print
in this world this is because of the peculiar genetic code of DNA in each person .finger print
module differentiate between two fingers based on the ridges and valleys on finger print. When
the finger print is given it stores the point where there are changes in the direction of ridges and
valleys using some algorithms. Inside the fingerprint module a DSP processor is presents to
implement and annalise the algorithms. Main heart of the circuit is fingerprint modules. This
sends commands to the controller whenever fingerprint is matched. Microcontroller receives the
commands from the finger print modules and modules the internal EEPROM to stores the
attendances.

The advent of fast growing technologies makes users to have high security systems with
electronic identification options. These identification technologies include ATM and other
intelligent, cards, user password based system and so on. But, unfortunately these are unsecure
due to hacker attacks, thefts, and forgotten passwords. In spite of all these shortcomings and
malfunctions these systems are still prevailing; however, the biometric authentication based is
the most efficient and reliable solution for stringent security.

JIT 5TH YEAR ECE FINAL PROJECT - 20 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Figure 7 print authentication

A wide variety of finger print devices are available in the market today that varies in cost and
method of matching fingers mostly involving one or whole five fingers of the hand. There are
various approaches for matching the fingers like matching finger print minutiae, straight pattern
matching, more fringe and ultrasonic patterns.

Figure 8 binarization of fingerprint

JIT 5TH YEAR ECE FINAL PROJECT - 21 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Fingerprints form a unique identification pattern for humans, which consist of a pattern of ridges
on fingers that helps to grip things by hand. Fingerprint scanner is the heart of this automated
authentication system which is responsible for the acquisition of images based on the patterns of
ridges and valleys of human fingers, and then matching them with the pre-stored patterns. It
consists of sensors that are optical, ultrasonic, thermal, capacitive etc. mostly optical and
capacitance scanning methods are used.

3.1.7. Crystal oscillator


The clock circuit is an important element that is required in the system design. This is because the
microcontroller works digitally based on generated clock. The rate of the clock is determined this project
in order to avoid any delay in terms of relay tripping ON and OFF, and monitoring of the transformer
parameters through the ADC of the microcontroller. Because the monitoring of transformer parameters
and tripping off the relay has to be very fast to avoid failure of the entire protection system. The figure
below show the crystal inscribed into the microcontroller, with two capacitors used to filter out external
noise from interfering with the crystal frequency

Figure 9 Crystal oscillator interfaced with PIC

JIT 5TH YEAR ECE FINAL PROJECT - 22 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

3.1.8 Key pad


In embedded devices one of the essential part is key pad which is used to interact with
embedded devices, key pad is input devices which is used to give command the devices from
calculator to computer input is given through key pad. This key pad has 12 buttons, which is
arranged in telephonic order [3 4] matrix. We need only 7 pins to interfaces with
microcontroller that 3coloumn and 4 rows.

Figure 10 Diagram of keypad


Key pad consists of 7 pin in which three from key pad columns and four from key pad rows

COLOMN:

Column 0-to PIC microcontroller pin 19

Column 1-to PIC microcontroller pin 20

Column 2-to PIC microcontroller pin 21

ROW:

Row 0-to PIC microcontroller pin 27

JIT 5TH YEAR ECE FINAL PROJECT - 23 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Row 1-to PIC microcontroller pin 28

Row 2-to PIC microcontroller pin 29

Row 3-to PIC microcontroller pin 30

When you press key pad button respective key values will displays on the LCD .

JIT 5TH YEAR ECE FINAL PROJECT - 24 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

CHAPER FOUR
4. System design and simulation

The designed biometric authenticated fingerprint ATM machine uses:- PIC16F877A controller,
fingerprint modules, crystal oscillator, motor, motor deriver, key pad, and LCD display. At this
stage we have actually design each block and describe actual implementation of circuit of each
block and finally integrated them into the complete working system.

Finger
PIC Micro LCD
Print from
controller DISPLAY
Customer

Figure 11 System model diagram.


For this project at first the customer should entered his/her own password to store the
fingerprint in terms of binary form .therefore we need to prepare the device to receive the
password first then entered the fingerprint then it will be stored in EEPROM memory. As a
result of this it will match the entered fingerprint with the sored one the simulation will be
like this when the customer entered the password shown below:

JIT 5TH YEAR ECE FINAL PROJECT - 25 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Figure 12 Simulation circuit of customer to enter the password

4.1. Finger print modules recognition

The design of algorithm based on fingerprint recognition is so vital for the whole system. We
would approach two steps to process the images of fingerprint.
1) The detail of fingerprint recognition process.
The first step was the acquisition of fingerprint image by above device mentioned in the
algorithm, and the results could be sent to the following process. Secondly, pre-processing
the images acquired. After obtain the fingerprint image, it must be pre-processing. Generally,
pre-processing of one's is filtering, histogram computing, image enhancement and image
binarization. Lastly, the characteristic value was extracted, and the results of the above
measures would be compared with the information of owner's fingerprint in the database so
as to verify whether the character is matched, and then the system returned the results
matched or not.
2) The design of fingerprint image enhancement
Fingerprint recognition module is an extremely important part of the system, the high-quality

JIT 5TH YEAR ECE FINAL PROJECT - 26 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

images was the major factors of influencing the performance in the system. The algorithm of
fingerprint recognition based on the algorithm of Gabor and direction filter was used.
Fingerprint enhancement algorithm based on Gabor filter could be better to remove noise,
strengthen the definition between the ridge and valley, it could significantly improve the
image enhancement processing capacity, but this algorithm was slow in dealing with the high
capacity requirements.

A fingerprint recognition system is done using three steps known as Image acquisition,
Minutiae extraction and Minutiae matching. The block diagram of basic fingerprint recognition
system is shown in figure below.

Image capture

Image pre-processing and


feature extraction

Matching Stored
pattern

Figure 13 Flow chart of basic fingerprint modules recognition

JIT 5TH YEAR ECE FINAL PROJECT - 27 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Detail of fingerprint recognition process.


The first step was the acquisition of fingerprint image by above device mentioned in the
algorithm, and the results could be sent to the following process. Secondly, pre-processing the
images acquired. After obtain the fingerprint image, it must be pre-processing. Generally, pre-
processing of one's is filtering, histogram computing, image enhancement and image binarization
Lastly, the characteristic value was extracted, and the results of the above measures would be
compared with the Information of owner's fingerprint in the database so as to verify whether the
character is matched, and then the system returned the results matched or not. Fingerprints are
one of those bizarre twists of nature. Human beings happen to have built-in, easily accessible
identity cards. You have a unique design, which represents you alone, literally at your fingertips,
fingerprints are a unique marker for a person, even an identical twin. Fingerprints are one of
many forms of biometrics, used to identify individuals and verify their identity. This part touches
on two major classes of algorithms and four sensor designs (optical, ultrasonic, passive
capacitance, and active capacitance) The analysis of fingerprints for matching purposes generally
requires the comparison of several features of the print pattern. These include patterns, which are
aggregate characteristics of ridges, and minutia points, which are unique features found within
the patterns It is also necessary to know the structure and properties of human skin in order to
successfully employ some of the imaging technologies.

The three basic patterns of fingerprint ridges are the arch, loop, and whorl:
i. arch: The ridges enter from one side of the finger, rise in the center forming an arc, and then
exit the other side of the finger.
ii. Loop: The ridges enter from one side of a finger, form a curve, and then exit on that same
side.
iii. Whorl: Ridges form circularly around a central point on the finger.

If the fingerprint that the customer entered is matched with the stored one the LCD display will
show that “WRONG CODE” because that the fingerprint of each customer is stored in the
memory in terms of binary codes.

JIT 5TH YEAR ECE FINAL PROJECT - 28 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Figure 14 Simulation of wrong code fingerprint entered.

JIT 5TH YEAR ECE FINAL PROJECT - 29 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

But if the entered fingerprint is the same as that of the stored one the LCD display will shows
“WELLCOME” as like this

Figure 15 Simulation for correct fingerprint entered.

4.2 BLOCK DIAGRAM OF THE SYSTEM


From the designed system the fingerprint module which is interfaced with the microcontroller
through microcontroller’s pins (TX and RX) receives the image of the user’s finger, processes it
and sends the input in a digital form (i.e. as a sequence of 0’s and 1’s) to the microcontroller. The
system asks the user to give his/her fingerprint through the fingerprint scanner only when the valid
password is given. Then after, as it is mentioned above fingerprint scanner adopt the image,
processes and in a digital form sends to the microcontroller. The microcontroller stores the data
given by the fingerprint scanner as a sequence of 0’s and 1’s in its memory. Now, the system works
in such a way that, when the user intends to transact with the ATM system, it asks the valid

JIT 5TH YEAR ECE FINAL PROJECT - 30 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

password and its fingerprint. When the user’s fingerprint matches with the data stored by the
microcontroller, the tansact will be possible. If not, it is impossible.

The flow chart that we use to design our system effectively is shown below.

4.3. Overall flow chart of the projects


The design was components of several parts includes the design of the main program flow chart,
the initialization ones and the algorithms of the fingerprint recognition flow chart. The system
requires the administrator set the mode to control, setting and data entry, the system in user mode
customer accessing ATM machine require customer fingerprint if all the recognition is right, the
system would allow customer to enter password (PIN) for accessing ATM machine, if
authentication failure then it send the message notification to the bank security department
indicating location of ATM, and Time. The overall software flow chart is shown on the figure.

The final flow chart that we developed gives the detailed information about how the system can
be developed and how they are integrated and combine all the major parameters of the PIC micro
controllers for monitoring and fault detecting purpose. The system checks these parameters
whether or not they are in normal condition. The microcontrollers send the monitored parameters
to LCD display.

JIT 5TH YEAR ECE FINAL PROJECT - 31 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Start

User

Read the
fingerprint

Scan the
finger print
and add the
password

Check
NO for
authenti
cation
Save the
Yes
data

Enter the
password

Verify

NO

YES Service for


customer

JIT 5TH YEAR ECE FINAL PROJECT - 32 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Figure 16 The overall flow chart of the project.

Simulation of the over all project is given as folows :

Figure 17 Final project design while displaying the finger print authentication
ATM security system.

JIT 5TH YEAR ECE FINAL PROJECT - 33 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

CHAPTER FIVE
5. CONCLUSION AND RECOMMENDATION
5.1. CONCLUSION
The conclusion of this project is that the card should be replaced and it must be simple, easier,
reliable, and secure. Biometrics is a means of verifying personal identity by measuring and
analyzing unique physical or behavioral characteristics of human being like fingerprints. The
purpose of this project will be to look at the use of biometrics technology to determine how
secure it might be in authenticating user’s and how the users job function or role would impact
the authentication process or protocol. We will also examine personal issue of privacy in the
methods used for authentication. Depending on this, a biometric system may operate either in
verification mode or identification mode. Generally identity verification is typically use for
positive recognition, where the aim is to prevent many people from the same identity.

Biometric authentication systems consider all the kinds of problems and disadvantages of card
payment system. The fingerprints system is suggested to be implemented because it is easier,
reliable, feasible, secure and easily authorized to everyone. And there is no any worry that
anyone can stolen my finger are can be loosed anywhere so other body can use it. In fingerprint
payment system customer has to place his fingers on the finger scanner and then scanner will
recognize the account which belongs to that person and charge the bill. So it is easy for the user
because of its reliability. The report also includes some simulation of hardware and software
components of the system.

JIT 5TH YEAR ECE FINAL PROJECT - 34 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

5.2 RECOMMENDATION

Based on the simulation result from the activities of this project, team members of the project
offers have the following recommendation for better performance of the system:

 To become more secure peoples should use this biometric authentication system.
 We recommended for the people this system is simple and easy to use in order to reduce
fear.
 We also recommended all bank found in Ethiopia to use this system to attract more
customer.

JIT 5TH YEAR ECE FINAL PROJECT - 35 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

REFERENCES
[1] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and
performance evaluation [J]. IEEE Transactions on Pattern Analysis and Machine intelligence.
1998,20(8):777-789.
[2] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C].
Proceedings of the 7th IEEE International Workshop on Cellular Neural Networks and their
Applications 2002: 377-382.
[3] Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern
Recognition, 2004, 37: 543-553.

[4] Cheng J, Tian J. Fingerprint enhancement with dyadic scale-space. Pattern Recognition
Letters,2004, 25(11): 1273-1284.

[5] ATM terminal dual verification process using finger print recognition Scanner and GSM by
Golla Jayaraju “journal of innovation in electronics and communication vol.1 [1] Oct 2011march
2012”
[6] ATM terminal design is based on fingerprint recognition for security purpose by Jeohaddad
& idhabihigue “(IIETRC) INTERNATIONAL INSTITUTE OF ENGINEERING AND
TECHNOLOGY RESEARCH CENTER VOL NO. 1, ISSUE NO. 2, 030 – 036.

[7] Salil Prabhakar, Anil Jain: “Fingerprint Identification” Anil K. Jain, Arun Ross and Salil
Prabhakar: “An Introduction to Biometric Recognition” IEEE Transactions on Circuits and
Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics, Vol. 14,
No. 1, January 2004.
[8] Dileep Kumar, Dr.Yeonseung Ryu, Dr.Dongseop Kwon: “A Survey on Biometric
Fingerprints: The Cradles Payment System” IEEE ISBAST April, 2008.

JIT 5TH YEAR ECE FINAL PROJECT - 36 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

APPENDIXES
unsigned short kp;

char code1[15] ,user1[7];

int i = 0, j, cnt;

int w1;

//keypad module connections

char keypadPort at PORTD;

//end keypad module connections

//lcd module connections

sbit LCD_RS at RB0_bit;

sbit LCD_EN at RB1_bit;

sbit LCD_D4 at RB2_bit;

sbit LCD_D5 at RB3_bit;

sbit LCD_D6 at RB4_bit;

sbit LCD_D7 at RB5_bit;

sbit LCD_RS_Direction at TRISB0_bit;

sbit LCD_EN_Direction at TRISB1_bit;

sbit LCD_D4_Direction at TRISB2_bit;

JIT 5TH YEAR ECE FINAL PROJECT - 37 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

sbit LCD_D5_Direction at TRISB3_bit;

sbit LCD_D6_Direction at TRISB4_bit;

sbit LCD_D7_Direction at TRISB5_bit;

//

void code_enter(){

kp = 0; //Reset key code variable

//wait for key to be pressed and released

do

//kp = Keypad_Key_Press(); // store key code in kp variable

kp = Keypad_Key_Click(); // store key code in kp variable

while (!kp);

//prepare value for output, transform key to it's ASCII value

switch (kp){

case 1: kp = 49; break; // 1

case 2: kp = 50; break; // 2

case 3: kp = 51; break; // 3

//case 4: kp = 65; break; // A for 4x4 pad

case 5: kp = 52; break; // 4

case 6: kp = 53; break; // 5

case 7: kp = 54; break; // 6

//case 8: kp = 66; break; // B for 4x4 pad

JIT 5TH YEAR ECE FINAL PROJECT - 38 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

case 9: kp = 55; break; // 7

case 10: kp = 56; break; // 8

case 11: kp = 57; break; // 9

//case 12: kp = 67; break; // C for 4x4 pad

case 13: kp = 42; break; // *

case 14: kp = 48; break; // 0

case 15: kp = 35; break; // #

//case 16: kp = 67; break; // D for 4x4 pad

code1[i] = kp;

Lcd_Chr(2, i+1, code1[i]); //Print key ASCII value on Lcd

i++;

//20ms delay function no need of it

void code_read(){ //read data from eeprom

Delay_ms(20);

user1[0] = EEPROM_Read(0x00); // Read data from address 0

Delay_ms(20);

user1[1] = EEPROM_Read(0x01); // Read data from address 1

Delay_ms(20);

user1[2] = EEPROM_Read(0x02); // Read data from address 2

JIT 5TH YEAR ECE FINAL PROJECT - 39 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Delay_ms(20);

user1[3] = EEPROM_Read(0x03); // Read data from address 3

Delay_ms(20);

user1[4] = EEPROM_Read(0x04); // Read data from address 4

Delay_ms(20);

user1[5] = EEPROM_Read(0x05); // Read data from address 5

Delay_ms(20);

user1[6] = EEPROM_Read(0x06); // Read data from address 6

Delay_ms(20);

user1[7] = EEPROM_Read(0x07); // Read data from address 7

Delay_ms(20);

void code_write(){ //write data to eeprom

Delay_ms(20);

EEPROM_Write(0x00,code1[0]); // Write data to address 0

Delay_ms(20);

EEPROM_Write(0x01,code1[1]); // Write data to address 1

Delay_ms(20);

EEPROM_Write(0x02,code1[2]); // Write data to address 2

Delay_ms(20);

EEPROM_Write(0x03,code1[3]); // Write data to address 3

JIT 5TH YEAR ECE FINAL PROJECT - 40 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

Delay_ms(20);

EEPROM_Write(0x04,code1[4]); // Write data to address 4

Delay_ms(20);

EEPROM_Write(0x05,code1[5]); // Write data to address 5

Delay_ms(20);

EEPROM_Write(0x06,code1[6]); // Write data to address 6

Delay_ms(20);

EEPROM_Write(0x07,code1[7]); // Write data to address 7

void change_code(){

Lcd_Cmd(_LCD_CLEAR); // clear display

Lcd_Out(1,1, "eroll your finger");

i = 0;

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

JIT 5TH YEAR ECE FINAL PROJECT - 41 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

code_enter();

code_write();

delay_ms(20);

code_read();

delay_ms(20);

Lcd_Cmd(_LCD_CLEAR); // clear display

Lcd_Out(1,1, "finger print stored ");

Delay_ms(1000);

void main() {

ADCON1 != 0x07;

Keypad_Init(); // Initialize Keypad

TRISC = 0x00;

PORTC = 0x00;

Lcd_Init(); // Initialize LCD

Lcd_Cmd(_LCD_CLEAR); // Clear display

Lcd_Cmd(_LCD_CURSOR_OFF); // Cursor off

code_read();

Lcd_Cmd(_LCD_CLEAR); //clear display

Lcd_Cmd(_LCD_CURSOR_OFF); // cursor off

//Lcd_Out(1, 1, msg1);

JIT 5TH YEAR ECE FINAL PROJECT - 42 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

//Delay_ms(500);

Lcd_Cmd(_LCD_CLEAR); // Clear display

Lcd_Out(1, 5, "Jimma"); // Write message text on LCD

Lcd_Out(2, 4, "University");

delay_ms(1000);

Lcd_Cmd(_LCD_CLEAR);

Lcd_Out(1, 1, "security");

Lcd_Out(2, 6, "System");

delay_ms(1000);

cnt = 0;

L1: do{

Lcd_Cmd(_LCD_CLEAR);

Lcd_Out(2, 3, "Press *");

i = 0;

code_enter();

if(code1[0] == 42){ // *

Lcd_Cmd(_LCD_CLEAR); // clear display

Lcd_Out(1, 1, "enter password ");

//delay_ms(500);

i = 0;

code_enter();

JIT 5TH YEAR ECE FINAL PROJECT - 43 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

code_enter();

if(code1[0] == '1' && code1[1] == '2' && code1[2] == '3' && code1[3] == '4' && code1[4] ==
'5'&& code1[5] == '6' && code1[6]== '7' && code1[7] == '8'&& code1[8] == '9' ){ // master
code

code_enter();

if(code1[9] == 35){ // #

change_code();

else if(cnt<7 && code1[0] == user1[0] && code1[1] == user1[1] && code1[2] == user1[2] &&
code1[3] == user1[3] && code1[4] == user1[4] && code1[5] == user1[5] && code1[6] ==
user1[6] && code1[7] == user1[7] && code1[8] == 35){ // save password verification

Lcd_Cmd(_LCD_CLEAR); //Lcd clear

Lcd_out(1,4,"welcome"); // makes the motor on

EEPROM_Read(0x21);

JIT 5TH YEAR ECE FINAL PROJECT - 44 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

w1 = 1;

Delay_ms(20);

EEPROM_Write(0X21, w1);

Delay_ms(20);

EEPROM_Read(0x21);

//move stepper motor to ON position

PORTC=0x03;

Delay_ms(500);

PORTC=0x06;

Delay_ms(500);

PORTC=0x0C;

Delay_ms(500);

PORTC=0x09;

Delay_ms(500);

Delay_ms(1000);

//goto L1;

LCD_Cmd(_LCD_CLEAR);

Lcd_out(1,4,"close");

EEPROM_Read(0x21);

w1 = 0;

Delay_ms(20);

JIT 5TH YEAR ECE FINAL PROJECT - 45 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

EEPROM_Write(0x21, w1);

Delay_ms(20);

EEPROM_Read(0x21);

//move stepper motor to OFF position

PORTC=0x0C;

Delay_ms(500);

PORTC=0x06;

Delay_ms(500);

PORTC=0x03;

Delay_ms(500);

PORTC=0x09;

..

JIT 5TH YEAR ECE FINAL PROJECT - 46 -


BIOMETRIC AUTHENTICATED ATM MACHINE SYSTEM June 9, 2016

JIT 5TH YEAR ECE FINAL PROJECT - 47 -

You might also like