SlideShare a Scribd company logo
1 of 49
Fingerprint
Authentication
for ATM
BY:-
Parul Varshney - 0919213069
Paras Garg - 0919213067
Upendra N. Giri - 0919213121G. L. Bajaj Institute of Technology, Gr
Noida
1. PROBLEM STATEMENT
2. OBJECTIVE
3. INTRODUCTION
4. APPROACHES / PROCEDURE
5. SOFTWARE REQUIREMENT AND SPECIFICATION
6. FLOW CHART
7. USE CASE DIAGRAM
8. E-R DIAGRAM
9. SEQUENCE DIAGRAM
10. ACTIVITY DIAGRAM
11. CLASS DIAGRAM
12. DFD
13. SNAPSHOTS
14. ADVANTAGES / DISADVANTAGES
15. CONCLUSION
CONTENT
PROBLEM STATEMENT
 In present scenario, traditional ATM system accepts only on the
PIN CODE security system, enabling the other person rather
than the owner to access the account very easily.
 This ensures that the traditional ATM system is not fully secured.
 The objective of our project is to provide biometric security
through fingerprint authentication in ATM application.
 The underlying principle is the phenomenon of biometrics
“AUTHENTICATION”, in this project we propose a method for
fingerprint matching based on matching algorithms.
OBJECTIVE
 The fingerprint is a person’s most unique physical characteristic.
 This software can pick only authentic
fingerprint out of crowd, extract that
fingerprint is compared from rest of
which those are stored in database.
 Fingerprint recognition software is based
on the ability to first recognize fingerprint,
in this technological fingerprint measure the
various features of each fingerprint.
INTRODUCTION
What Fingerprint Is?
 A fingerprint is the feature pattern of fingers (Figure 1), and each
fingerprint is unique, and every person has unique fingerprints. So
fingerprints have being used for identification.
 A fingerprint is composed of many ridges and furrows, fingerprints are
not distinguished by their ridges And furrows, but by Minutiae, which
are some abnormal points on the ridges (Figure 2).
 Two types of minutiae are called termination, which is the immediate
ending of a ridge and the other called bifurcation, which is the point
on the ridge from which two branches derive.
Figure 1 Figure 2
What is Fingerprint Authentication?
 The fingerprint authentication problem can be grouped into two sub-
domains i.e. fingerprint verification and fingerprint identification.
 Fingerprint verification is to verify the authenticity of one person by his
fingerprint and PIN Code and Fingerprint identification is by matching
the information of user such as PIN Code and Fingerprint matching.
Figure 2.2. Verification vs. Identification
Approaches For Fingerprint Recognition
 The first approach, which is minutiae-based, represents the fingerprint
by its local features, like terminations and bifurcations. This approach
has been intensively studied, also is the backbone of the current
available fingerprint recognition products.
 The second approach, which uses image-based methods, tries to do
matching based on the global features of a whole fingerprint image. It is
an advanced approach. And it is useful to solve some intractable
problems of the first approach.
Procedure
SOFTWARE REQUIREMENT
SPECIFICATION (SRS)
INTRODUCTION
 Purpose
This Software Requirements Specification provides a complete description
of all the functions and specifications of the ATM system of bank. The
purpose is to provide extra security to the ATM systems
 Scope
The ATM system is designed to run for 24 hours and to allow bank clients
to carry out transactions in a secured way. The data will be held in a bank
database. The system is connected to the bank database using a modem.
 Document Overview
The remainder of this document is two chapters, the first providing a full
description of the project for the bank’s ATM with fingerprint security. This
SRS gives the details about the various requirements & about the various
hardware & software interfaces.
OVERALL DESCRIPTION
The ATM system encompasses various GUI menus including the SENSOR,
to provide high security. It provides secure access to the account of a
customer. The ATM must be able to provide the following services to the
customer:
Enter Pin: A customer is allowed to enter the PIN Code for his/her Account.
Change Pin: A customer must be able to change the pin linked to the card.
Enroll Finger: A customer is allowed to enroll the fingerprint impression
which has been used to provide security to the Account
Change Fingerprint: A customer is allowed to change the fingerprint
impression.
Functional Requirements Definition
The software to be designed will control a simulated automated teller
machine (ATM) having :
 A sensor to enroll and detect fingerprint.
 A customer console (keyboard and display) for interaction with the
customer.(for entering PIN Code)
 Facility of Aborting transaction
A customer must be able to abort a transaction in progress by pressing the
Cancel key instead of responding to a request from the machine.
 PIN Code format
Pin should be of exactly 4 digit.
 Facility of PIN Re-entering
If the customer's PIN is invalid, the customer will be required to re-enter
the PIN before a transaction can proceed.
 Denial of service, if PIN goes wrong.
If the customer is unable to successfully enter the PIN after three tries, the
service would be denied for particular card.
 Enroll finger
Enroll your finger from first joint to the tip.
 Facility of Re-enrolling the finger
If the customer's Fingerprint is invalid, the customer will be required to re-
enroll the Fingerprint before a transaction can proceed.
 Denial of service, if fingerprint goes wrong
If the customer is unable to successfully enroll fingerprint after three tries,
the service would be denied for that particular card.
 Explanation of problem
If a transaction fails for any reason other than an invalid PIN and
fingerprint, the ATM will display an explanation of the problem.
NON FUNCTIONAL REQUIREMENT
There are requirements that are not functional in nature. Specifically,
these are the constraints the system must follow. They are often called
qualities of a system. Other terms for non-functional requirements are
“constraints”,” quality attributes”,” quality goals”,” quality of service
requirements” and “non-behavioral requirements”.
 Scope: The scope of this project is to allow the user to get access to
their account through the ATM using fingerprinting functionality.
 Functionality: One customer at a time can process their account in the
ATM machine.
 Usability: The desktop user interface shall be Windows 95/98/2000/XP/7
complaint.
 Reliability: The ATM machine must be able to scan or read the card and
the fingerprint properly and identify the customer account.
 Performance: The ATM machine support only one customer at a time.
The speed and accurate transaction decides the performance factor.
The screen must be clearly visible to the user.
 Security: The pin number and the fingerprint in the card guarantee the
security of a customer’s account. The ATM system must not store any
of this data in its database. The customer with a pin number and a valid
card with valid fingerprint impression is allowed to do all transactions.
For developing the front – end interface, we have decided to use
ASP.NET platform, with C# as the programming language, due to the
following reasons:-
 Easy to use and flexible interface.
 A number of options for customizability.
 Proven to provide good performance and high reliability.
 Attractive and visually pleasing interface.
For developing the database (back – end), we have decided to use
MS-SQL Server 2008 database, due to the following reasons:-
 Native support and full compatibility with ASP.NET platform .
 Flexible, scalable and robust database architecture.
 Used by market-leading companies worldwide.
 Strong data protection and ease of management.
FRONT END DESCRIPTION
BACK END DESCRIPTION
Tools Used:
 Database - MS SQL Server 2008 R2
 Processor - Pentium 4
 Hard Disk - 5 GB
 RAM - 256 MB
 Sensor - Fingerprint Recognizer
 Operating System - Windows 7
 Database System - MS SQL Server 2008 R2
 Front End - Visual Studio 2010
 Framework - .NET Framework 4.0
DATABASE DESCRIPTION
HARDWARE REQUIREMENT
SOFTWARE REQUIREMENT
FLOW CHART
USE CASE DIAGRAM
E-R DIAGRAM
SEQUENCE DIAGRAM
ACTIVITY DIAGRAM
DATA FLOW DIAGRAM LEVEL-0
DATA FLOW DIAGRAM LEVEL-1
DATA FLOW DIAGRAM LEVEL-2
SNAPSHOTS
1. Very high accuracy and security
• Identification (Do I know who you are?)
• Verification (Are you who you claim to be?)
2. Is the most economical biometric PC user authentication
technique.
3. It is one of the most developed biometrics.
4. Easy to use.
5. Small storage space required for the biometric template, reducing
the size of the database memory required.
6. It is standardized.
7. Enhance traditional methods (PINs, Passwords).
ADVANTAGES
 General Limitations
1. Misidentification
 False Acceptance
 False Rejection
2. Privacy
3. Image captured at 500 dots per inch(dpi). Resolution: 8 bits per pixel.
A 500 dpi fingerprint image at 8 bits per pixel demands a large
memory space, 240 KB approximately  Compression required ( a
factor of 10 approximately).
 Limitations for individual
1. Dry, wet or dirty hands.
2. For some people it is very intrusive, because it is still related to
criminal identification.
DISADVANTAGES
 A smartcard based ATM fingerprint authentication scheme has been
proposed. The possession (smartcard) together with the claimed user’s
Biometrics (fingerprint) is required in a transaction. The smartcard is used for
the first layer of mutual authentication when a user requests transaction.
Biometric authentication is the second layer. The fingerprint image is
encrypted via 3D map as soon as it is captured, and then is transmitted to
the central server via symmetric algorithm. The encryption keys are extracted
from the random pixels distribution in a raw image of fingerprint.
 The stable features of the fingerprint image need not to be transmitted, it can
be extracted from the templates at the central server directly.
 After this, the minutiae matching is performed at the central server. The
successful minutiae matching at last verifies the claimed user. Future work
will focus on the study of stable features (as part of encryption key) of
fingerprint image, which may help to set up a fingerprint matching dictionary
so that to narrow down the workload of fingerprint matching in a large
database.
CONCLUSION
REFERENCES
 Bhanu Bir, Tan Xuejun, Computational Algorithms for
Fingerprint Recognition
 Kluwer Academic Publishers, 20 Das, K. Design and
Implementation of an Efficient Thinning Algorithm
 Bachelor of Technology thesis, Department of
Computer Science and Engineering, Indian Institute of
Technology, Kanpur
 Hong, L., Wan, Y. and Jain, A. Fingerprint Image
Enhancement: Algorithm and Performance Evaluation.
 IEEE Transactions on Pattern Analysis and Machine
Intelligence,1998
THANK YOU

More Related Content

What's hot

Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.Manoj Kumar
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction systemsagar solanky
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT preeti tripathi
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirementswajahat Gul
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation systemkhushi kalaria
 
Report on online bus management
Report on online bus managementReport on online bus management
Report on online bus managementNaeem Ahmad
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system pptsNimisha_Goel
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face RecognitionNikhil Katte
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics123seminarsonly
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face RecognitionNanditaDutta4
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointmentAmna Nawazish
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password PresentationSambit Mishra
 
Online bus pass management system
Online bus pass management systemOnline bus pass management system
Online bus pass management systempiyush khadse
 

What's hot (20)

Attendance management system project report.
Attendance management system project report.Attendance management system project report.
Attendance management system project report.
 
Fingerprint based transaction system
Fingerprint based transaction systemFingerprint based transaction system
Fingerprint based transaction system
 
Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT Biometrics Technology Intresting PPT
Biometrics Technology Intresting PPT
 
ATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional RequirementsATM System Description and functional and non- functional Requirements
ATM System Description and functional and non- functional Requirements
 
srs for railway reservation system
 srs for railway reservation system srs for railway reservation system
srs for railway reservation system
 
Report on online bus management
Report on online bus managementReport on online bus management
Report on online bus management
 
Graphical password authentication system ppts
Graphical password authentication system pptsGraphical password authentication system ppts
Graphical password authentication system ppts
 
Smart Voting System with Face Recognition
Smart Voting System with Face RecognitionSmart Voting System with Face Recognition
Smart Voting System with Face Recognition
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Attendance Management System using Face Recognition
Attendance Management System using Face RecognitionAttendance Management System using Face Recognition
Attendance Management System using Face Recognition
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
3D Password PPT
3D Password PPT3D Password PPT
3D Password PPT
 
Online doctor appointment
Online doctor appointmentOnline doctor appointment
Online doctor appointment
 
Atm System
Atm SystemAtm System
Atm System
 
tour management system
tour management systemtour management system
tour management system
 
3D Password Presentation
3D  Password Presentation3D  Password Presentation
3D Password Presentation
 
Online bus pass management system
Online bus pass management systemOnline bus pass management system
Online bus pass management system
 
Project report on blogs
Project report on blogsProject report on blogs
Project report on blogs
 
Biometric Authentication PPT
Biometric Authentication PPTBiometric Authentication PPT
Biometric Authentication PPT
 
An atm with an eye
An atm with an eyeAn atm with an eye
An atm with an eye
 

Viewers also liked

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMAlpesh Kurhade
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentationrajarose89
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkMahesh Shitole
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Sandeep Kumar Panda
 
finger print based Atm software requirement story board
finger print based Atm software requirement story board finger print based Atm software requirement story board
finger print based Atm software requirement story board Md. Sarowar Alam Saidi
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGYJOLLUSUDARSHANREDDY
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognitionvarsha mohite
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security systemPadmakar Mangrule
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
Top 10 fingerprint examiner interview questions and answers
Top 10 fingerprint examiner interview questions and answersTop 10 fingerprint examiner interview questions and answers
Top 10 fingerprint examiner interview questions and answerssistmist
 
Research and implementation of smoke detection in video streams naveedakram@...
Research and implementation of smoke detection in video streams  naveedakram@...Research and implementation of smoke detection in video streams  naveedakram@...
Research and implementation of smoke detection in video streams naveedakram@...Naveed Akram
 
Antimicrobial agents in endodontics /prosthodontic courses
Antimicrobial agents in endodontics /prosthodontic coursesAntimicrobial agents in endodontics /prosthodontic courses
Antimicrobial agents in endodontics /prosthodontic coursesIndian dental academy
 
Umldiagrams ForOOAD Lab B.Tech 4-1
Umldiagrams ForOOAD Lab B.Tech 4-1Umldiagrams ForOOAD Lab B.Tech 4-1
Umldiagrams ForOOAD Lab B.Tech 4-1ShashikanthKaninde
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary ExtractionMaria Akther
 
UML daigrams for Bank ATM system
UML daigrams for Bank ATM systemUML daigrams for Bank ATM system
UML daigrams for Bank ATM systemRamakant Soni
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and SolutionsClarice_Wilson
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEAswinraj Manickam
 

Viewers also liked (19)

ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Fingerprint
FingerprintFingerprint
Fingerprint
 
Fingerprint presentation
Fingerprint presentationFingerprint presentation
Fingerprint presentation
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 
Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)Fingerprint Recognition Technique(PPT)
Fingerprint Recognition Technique(PPT)
 
finger print based Atm software requirement story board
finger print based Atm software requirement story board finger print based Atm software requirement story board
finger print based Atm software requirement story board
 
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
ATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGYATM USER ACCOUNTSECURE BYUSING GSM TECHNOLOGY
ATM USER ACCOUNT SECURE BY USING GSM TECHNOLOGY
 
Fingerprint recognition
Fingerprint recognitionFingerprint recognition
Fingerprint recognition
 
Fingerprint based security system
Fingerprint based security systemFingerprint based security system
Fingerprint based security system
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Top 10 fingerprint examiner interview questions and answers
Top 10 fingerprint examiner interview questions and answersTop 10 fingerprint examiner interview questions and answers
Top 10 fingerprint examiner interview questions and answers
 
Research and implementation of smoke detection in video streams naveedakram@...
Research and implementation of smoke detection in video streams  naveedakram@...Research and implementation of smoke detection in video streams  naveedakram@...
Research and implementation of smoke detection in video streams naveedakram@...
 
Antimicrobial agents in endodontics /prosthodontic courses
Antimicrobial agents in endodontics /prosthodontic coursesAntimicrobial agents in endodontics /prosthodontic courses
Antimicrobial agents in endodontics /prosthodontic courses
 
Umldiagrams ForOOAD Lab B.Tech 4-1
Umldiagrams ForOOAD Lab B.Tech 4-1Umldiagrams ForOOAD Lab B.Tech 4-1
Umldiagrams ForOOAD Lab B.Tech 4-1
 
Boundary Extraction
Boundary ExtractionBoundary Extraction
Boundary Extraction
 
UML daigrams for Bank ATM system
UML daigrams for Bank ATM systemUML daigrams for Bank ATM system
UML daigrams for Bank ATM system
 
Pca ppt
Pca pptPca ppt
Pca ppt
 
ATM Frauds and Solutions
ATM Frauds and SolutionsATM Frauds and Solutions
ATM Frauds and Solutions
 
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCEHUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
HUMAN MOTION DETECTION AND TRACKING FOR VIDEO SURVEILLANCE
 

Similar to Fingerprint Authentication for ATM

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptxLameesAnees
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptxGAMINGRBF
 

Similar to Fingerprint Authentication for ATM (20)

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
N044057478
N044057478N044057478
N044057478
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
technical seminar-money pad.pptx
technical seminar-money pad.pptxtechnical seminar-money pad.pptx
technical seminar-money pad.pptx
 
Final PPT.pptx
Final PPT.pptxFinal PPT.pptx
Final PPT.pptx
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 

Recently uploaded

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 

Recently uploaded (20)

TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 

Fingerprint Authentication for ATM

  • 1. Fingerprint Authentication for ATM BY:- Parul Varshney - 0919213069 Paras Garg - 0919213067 Upendra N. Giri - 0919213121G. L. Bajaj Institute of Technology, Gr Noida
  • 2. 1. PROBLEM STATEMENT 2. OBJECTIVE 3. INTRODUCTION 4. APPROACHES / PROCEDURE 5. SOFTWARE REQUIREMENT AND SPECIFICATION 6. FLOW CHART 7. USE CASE DIAGRAM 8. E-R DIAGRAM 9. SEQUENCE DIAGRAM 10. ACTIVITY DIAGRAM 11. CLASS DIAGRAM 12. DFD 13. SNAPSHOTS 14. ADVANTAGES / DISADVANTAGES 15. CONCLUSION CONTENT
  • 3. PROBLEM STATEMENT  In present scenario, traditional ATM system accepts only on the PIN CODE security system, enabling the other person rather than the owner to access the account very easily.  This ensures that the traditional ATM system is not fully secured.
  • 4.  The objective of our project is to provide biometric security through fingerprint authentication in ATM application.  The underlying principle is the phenomenon of biometrics “AUTHENTICATION”, in this project we propose a method for fingerprint matching based on matching algorithms. OBJECTIVE
  • 5.  The fingerprint is a person’s most unique physical characteristic.  This software can pick only authentic fingerprint out of crowd, extract that fingerprint is compared from rest of which those are stored in database.  Fingerprint recognition software is based on the ability to first recognize fingerprint, in this technological fingerprint measure the various features of each fingerprint. INTRODUCTION
  • 6. What Fingerprint Is?  A fingerprint is the feature pattern of fingers (Figure 1), and each fingerprint is unique, and every person has unique fingerprints. So fingerprints have being used for identification.  A fingerprint is composed of many ridges and furrows, fingerprints are not distinguished by their ridges And furrows, but by Minutiae, which are some abnormal points on the ridges (Figure 2).  Two types of minutiae are called termination, which is the immediate ending of a ridge and the other called bifurcation, which is the point on the ridge from which two branches derive. Figure 1 Figure 2
  • 7. What is Fingerprint Authentication?  The fingerprint authentication problem can be grouped into two sub- domains i.e. fingerprint verification and fingerprint identification.  Fingerprint verification is to verify the authenticity of one person by his fingerprint and PIN Code and Fingerprint identification is by matching the information of user such as PIN Code and Fingerprint matching. Figure 2.2. Verification vs. Identification
  • 8. Approaches For Fingerprint Recognition  The first approach, which is minutiae-based, represents the fingerprint by its local features, like terminations and bifurcations. This approach has been intensively studied, also is the backbone of the current available fingerprint recognition products.  The second approach, which uses image-based methods, tries to do matching based on the global features of a whole fingerprint image. It is an advanced approach. And it is useful to solve some intractable problems of the first approach.
  • 11. INTRODUCTION  Purpose This Software Requirements Specification provides a complete description of all the functions and specifications of the ATM system of bank. The purpose is to provide extra security to the ATM systems  Scope The ATM system is designed to run for 24 hours and to allow bank clients to carry out transactions in a secured way. The data will be held in a bank database. The system is connected to the bank database using a modem.  Document Overview The remainder of this document is two chapters, the first providing a full description of the project for the bank’s ATM with fingerprint security. This SRS gives the details about the various requirements & about the various hardware & software interfaces.
  • 12. OVERALL DESCRIPTION The ATM system encompasses various GUI menus including the SENSOR, to provide high security. It provides secure access to the account of a customer. The ATM must be able to provide the following services to the customer: Enter Pin: A customer is allowed to enter the PIN Code for his/her Account. Change Pin: A customer must be able to change the pin linked to the card. Enroll Finger: A customer is allowed to enroll the fingerprint impression which has been used to provide security to the Account Change Fingerprint: A customer is allowed to change the fingerprint impression.
  • 13. Functional Requirements Definition The software to be designed will control a simulated automated teller machine (ATM) having :  A sensor to enroll and detect fingerprint.  A customer console (keyboard and display) for interaction with the customer.(for entering PIN Code)
  • 14.  Facility of Aborting transaction A customer must be able to abort a transaction in progress by pressing the Cancel key instead of responding to a request from the machine.  PIN Code format Pin should be of exactly 4 digit.  Facility of PIN Re-entering If the customer's PIN is invalid, the customer will be required to re-enter the PIN before a transaction can proceed.  Denial of service, if PIN goes wrong. If the customer is unable to successfully enter the PIN after three tries, the service would be denied for particular card.
  • 15.  Enroll finger Enroll your finger from first joint to the tip.  Facility of Re-enrolling the finger If the customer's Fingerprint is invalid, the customer will be required to re- enroll the Fingerprint before a transaction can proceed.  Denial of service, if fingerprint goes wrong If the customer is unable to successfully enroll fingerprint after three tries, the service would be denied for that particular card.  Explanation of problem If a transaction fails for any reason other than an invalid PIN and fingerprint, the ATM will display an explanation of the problem.
  • 16. NON FUNCTIONAL REQUIREMENT There are requirements that are not functional in nature. Specifically, these are the constraints the system must follow. They are often called qualities of a system. Other terms for non-functional requirements are “constraints”,” quality attributes”,” quality goals”,” quality of service requirements” and “non-behavioral requirements”.  Scope: The scope of this project is to allow the user to get access to their account through the ATM using fingerprinting functionality.  Functionality: One customer at a time can process their account in the ATM machine.  Usability: The desktop user interface shall be Windows 95/98/2000/XP/7 complaint.  Reliability: The ATM machine must be able to scan or read the card and the fingerprint properly and identify the customer account.
  • 17.  Performance: The ATM machine support only one customer at a time. The speed and accurate transaction decides the performance factor. The screen must be clearly visible to the user.  Security: The pin number and the fingerprint in the card guarantee the security of a customer’s account. The ATM system must not store any of this data in its database. The customer with a pin number and a valid card with valid fingerprint impression is allowed to do all transactions.
  • 18. For developing the front – end interface, we have decided to use ASP.NET platform, with C# as the programming language, due to the following reasons:-  Easy to use and flexible interface.  A number of options for customizability.  Proven to provide good performance and high reliability.  Attractive and visually pleasing interface. For developing the database (back – end), we have decided to use MS-SQL Server 2008 database, due to the following reasons:-  Native support and full compatibility with ASP.NET platform .  Flexible, scalable and robust database architecture.  Used by market-leading companies worldwide.  Strong data protection and ease of management. FRONT END DESCRIPTION BACK END DESCRIPTION
  • 19. Tools Used:  Database - MS SQL Server 2008 R2  Processor - Pentium 4  Hard Disk - 5 GB  RAM - 256 MB  Sensor - Fingerprint Recognizer  Operating System - Windows 7  Database System - MS SQL Server 2008 R2  Front End - Visual Studio 2010  Framework - .NET Framework 4.0 DATABASE DESCRIPTION HARDWARE REQUIREMENT SOFTWARE REQUIREMENT
  • 21.
  • 23.
  • 25.
  • 27.
  • 29.
  • 30. DATA FLOW DIAGRAM LEVEL-0
  • 31.
  • 32. DATA FLOW DIAGRAM LEVEL-1
  • 33.
  • 34. DATA FLOW DIAGRAM LEVEL-2
  • 35.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45. 1. Very high accuracy and security • Identification (Do I know who you are?) • Verification (Are you who you claim to be?) 2. Is the most economical biometric PC user authentication technique. 3. It is one of the most developed biometrics. 4. Easy to use. 5. Small storage space required for the biometric template, reducing the size of the database memory required. 6. It is standardized. 7. Enhance traditional methods (PINs, Passwords). ADVANTAGES
  • 46.  General Limitations 1. Misidentification  False Acceptance  False Rejection 2. Privacy 3. Image captured at 500 dots per inch(dpi). Resolution: 8 bits per pixel. A 500 dpi fingerprint image at 8 bits per pixel demands a large memory space, 240 KB approximately  Compression required ( a factor of 10 approximately).  Limitations for individual 1. Dry, wet or dirty hands. 2. For some people it is very intrusive, because it is still related to criminal identification. DISADVANTAGES
  • 47.  A smartcard based ATM fingerprint authentication scheme has been proposed. The possession (smartcard) together with the claimed user’s Biometrics (fingerprint) is required in a transaction. The smartcard is used for the first layer of mutual authentication when a user requests transaction. Biometric authentication is the second layer. The fingerprint image is encrypted via 3D map as soon as it is captured, and then is transmitted to the central server via symmetric algorithm. The encryption keys are extracted from the random pixels distribution in a raw image of fingerprint.  The stable features of the fingerprint image need not to be transmitted, it can be extracted from the templates at the central server directly.  After this, the minutiae matching is performed at the central server. The successful minutiae matching at last verifies the claimed user. Future work will focus on the study of stable features (as part of encryption key) of fingerprint image, which may help to set up a fingerprint matching dictionary so that to narrow down the workload of fingerprint matching in a large database. CONCLUSION
  • 48. REFERENCES  Bhanu Bir, Tan Xuejun, Computational Algorithms for Fingerprint Recognition  Kluwer Academic Publishers, 20 Das, K. Design and Implementation of an Efficient Thinning Algorithm  Bachelor of Technology thesis, Department of Computer Science and Engineering, Indian Institute of Technology, Kanpur  Hong, L., Wan, Y. and Jain, A. Fingerprint Image Enhancement: Algorithm and Performance Evaluation.  IEEE Transactions on Pattern Analysis and Machine Intelligence,1998