101seminartopics.com AN ATM WITH AN EYE
ABSTRACT
There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable. The chances of misuse of this much hyped ‘insecure’ baby product (ATM) are manifold due to the exponential growth of ‘intelligent’ criminals day by day. ATM systems today use no more than an access card and PIN for identity verification. This situation is unfortunate since tremendous progress has been made in biometric identification techniques, including finger printing, retina scanning, and facial recognition. This paper proposes the development of a system that integrates facial recognition technology into the identity verification
…show more content…
However, one could argue that having the image compromised by a third party would have far less dire consequences than the account information itself. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is no broad leap to realize that banks already build an archive of their customer images, even if they are not necessarily grouped with account information.
2. LITERATURE REVIEW
For most of the past ten years, the majority of ATMs used worldwide ran under IBM’s now-defunct OS/2. However, IBM hasn’t issued a major update to the operating system in over six years. Movement in the banking world is now going in
101seminartopics.com two directions: Windows and Linux. NCR, a leading world-wide ATM manufacturer, recently announced an agreement to use Windows XP Embedded in its next generation of personalized ATMs (crmdaily.com.) Windows XP Embedded allows OEMs to pick and choose from the thousands of components that make up Windows XP Professional, including integrated multimedia, networking and database management functionality. This makes the use of off-the-shelf facial recognition code more desirable because it could easily be compiled for the Windows XP environment and the networking and database tools will already be in place. For less powerful ATMs, KAL, a
Biometrics technology aims at utilizing major and distinctive characteristics such as behavioral or biological, for the sake of positively indentifying people. With the help of a combination of hardware and specific identifying sets of rules, a basic human attribute, automated biometric recognition mimics to distinguish and categorize other people as individual and unique. But the challenges surrounding biometrics are great as well.
Facial recognition is a technological product of the digital age that is continuing to evolve. The efficiency of the technology is an asset to crime detectives apprehending criminals, or the government tracking suspected terrorists for the safety of the country. It can also be used on a corporate level to allow a business to understand their ideal customer, or to increase the intractability of their website. While these abilities are positives to the people using them, the data collection may be harming more than it is helping. Considering the benefits of facial recognition, it is important for people to see what they are giving up for a more efficient experience. Facial recognition technology forces users to relinquish control of their own
The digital image of the face of a person can be matched against a record of other images by using face recognition software. In case that some of the images in the database go with the digitized image, the owner is reported about it by the system. Automatic face recognition has been studied and investigated extensively since 1990s and its usage is turning out to be no-nonsense in the present times. Although a number of automatic face recognition applications are relatively agreeable and harmless (access regulation to armaments, currency, illegal proof, nuclear equipment/supplies etc), there are still several dangers of face recognition systems that include violation of privacy and civil liberties, unrestrained exploitation, identity theft, illegal use of database, free access to personal data on social media etc. (Agre, 2001).
Chase has more than 5,500 branches and 18,000 ATMs and holds approximately over $2.6 trillion in assets (Get More from Your Banking Relationship, 2014, p.2). JP Morgan Chase is often called the leader of the pack among the “Big Four” banks (King 2015). In recent years the bank has embarked on a major expenditure program to keep up to date with technological advances and consumer change of taste. The trend is digitalization of the banking experience, which enables customers to bank from their smartphone and/or computer. Chase has invested heavily on its smartphone application and online banking platform. In which chase has become the #1 most visited banking portal in the U.S and #1 Mobile banking functionality for 3 consecutive years (Smith 2015). In addition, Chase has expanded the capabilities of its ATM stock. On this new platform, wires can be sent via personal computer, funds
Biometrics are important to not only information systems, but to information security as a subject. Today, most information is kept secure via ID cards or secret information, such as a PIN, password, pattern, etc., the downside to this type of security is the lack of a failsafe (Ashok, Shivashankar and Mudiraj)! What would happen if an ID card was lost? Or a PIN, password or pattern was leaked to individuals who were not on a “need to know” basis”? This is where the importance of biometrics comes into play.
In order to protect users of computer systems and to secure network-based transactions, demand is increasing for improved user authentication procedures to establish the identity of an actual user and to bar access to a terminal to anyone who is unauthorized. Personal identification using biometrics, i.e., a person’s physical or behavioral characteristics has come to attract increased attention as a possible solution to this issue and one that might offer reliable systems at a reasonable cost. While traditionally this technology has been available only with such expensive, high-end systems as those used in law enforcement and other government applications, today many personal–level applications have also become
Facial recognition is a “one to many” process of searching a large database for individuals having similar features as the probe (Suspect). Facial Recognition is used as a “lead generator only” and should be considered as a tip only, it does not provide a positive identification of an individual. This is similar to inputting a latent print into the Automated Fingerprint Identification System (AFIS) and having ten candidates returned, they are only similar in nature.
The way people bank is going through explosive, explosive changes. In fact, it’s transformed more in the last decade than in the last century. The great news for millennials is that it’s easy to grasp and use the new technology.
Through this routine of advanced technology analysis, it has been established to increase the results and have hastened the procedure of identifying suspects of crimes. Facial recognition is also necessary for public involvement and observation as it also aids law enforcement officials to more easily zone in on possible suspects of a crimes being caught. With the use of facial recognition, it constantly has been proven quite an effective method with the incorporation of this technique.
Biometric recognition plays an important role in the field of security for any system. For embedded system it plays a significant role. As we know ATMs and smart phones are the most used smart devices that we interact daily, is needs to be secured. For this reason it must have a secure system that can provide security to save our personal things. For securing them there are lots of ways that are introduced in the past years. Biometric recognition is one of them. In the field of biometric recognition face, fingerprint, voice and retina are used to recognize an individual. Iris recognition is one of them. (Jain, A.K, 2004) Every human has a different body characteristic. One will never be same like another. Eye is one of them.
Further he questioned whether the individuals could prevent themselves from being identified by cameras that are everywhere? The photo tagging harms citizen’s privacy right. Thus he urged the FBI and government to take action to protect people’s privacy. Also he suggested facebook to address the potential risk of misuse of the massive biometric data to users. In his opinion, the facial recognition technology’s future is
Automatic face recognition has always been a major focus of research for a few decades, because of numerous practical applications where human identification is needed. Compared to other methods of identification (such as fingerprints, voice, footprint, or retina), face recognition has the advantage of its non-invasive and user friendly nature. Face images can be captured from a distance without interacting with the person, which is particularly beneficial for security and surveillance purposes. Furthermore, extra personal information, like gender, face expressions or age, can be obtained by further analyzing recognition results. Nowadays, face recognition technology has been widely applied to public security, person verification, Internet
In the article, “Hackers Devise Wireless Methods for Stealing ATM Users' PINs”, Robertson speaks on how the effects of ATM hacking has been the fastest way
Biometric technology offers an alternative to the most used system currently in place in most operations: passwords or personal identification numbers (PIN). Instead of users inputting their password or PIN, users interact with a computer terminal that will scan their finger, face, voice, retina, etc. to identify them. Many of the next generation personal computer systems will have integrated biometric technology so that no external hardware is needed. In the mean time, users can buy small peripherals, like a mouse with integrated biometric technology or a small finger terminal for finger scans, to secure their personal computers.
Biometric technologies are getting better and finely tuned. The rate of false readings and errors has sharply fallen. However it still requires careful consideration and planning to implement a biometric identification system. They are most costly and complicated to implement as compared with other authentication systems. A proper evaluation of the system is important before purchasing any biometric system. A thorough risk analysis is necessary. In many cases biometrics may be overkill. Biometrics must be used if there is high level of risk involved. Customer acceptance is also important when logging on to company websites. Home users might not be ready to install biometrics on home computers for online banking.