SlideShare a Scribd company logo
1 of 22
AN ATM WITH AN EYE
THE FUTURE’S TECHNOLOGY
MOHD NAZIR SHAKEEL
1
Outline
 ATM
 ATM WITH AN EYE
 ON THE MOST CUSTOMER IS
 WHERE IT IS USE
 WORKING
 TECHNIQUES
 HOW IT WORK
 PROTECTION
 CONCLUSION
 REFERENCES
2
Automated Teller Machine
An automated teller machine (ATM) is :
 Computerize telecommunications
 Made money transactions easy for customers to bank.
 Device that provides the customers of a financial transactions in
a public space without the need for a human clerk or bank teller.
 Security requiring combination Physical access card+
Password(PIN)
3
4
Physical Access Card
(ATM Card)
1. Card Provider Name : Name of Card
Provider like bank or financial institute;
for E.g.. ICICI Bank, SBI Bank etc.
2. Card Number : 16 Digit Number. It
divided into 4 parts with 4 number.
3. 3D Hologram : Contain 3D Hologram
to represent whether it is Visa card or
Maestro.
4. Valid From : It contains valid from
date, i.e. Contains the card activation
date.
5. Valid Thru : It contains valid thru
date, i.e. Contains last date for the use of
card.
6. Brand Logo : Contains Brand
FIGURE-1
8. Magnetic Strip : Contains
Magnetic Strip have special
identification
9. Verification Number : Contains
Three digit verification number.
10. Signature Panel : Contains
Signature Panel, i.e. Card Holder
Signature.
FIGURE-2
5
Password
 Whether you are on the internet or an online banking
program, you are often required to use a password
 The worst passwords to use are the ones that come to mind first
name, spouse's name, maiden name, pets, children's name, even
street addresses, etc.
 The best passwords mix numbers with upper and lowercase
letters. A password that is not found in the dictionary is even
better.
6
Personal Identification Number
(Pin)
 PIN is one method used by banks and phone companies to
protect your account from unauthorized access
 PIN is a confidential code issued to the cardholder to permit
access to that account
 PIN should be memorized, secured and not given to
anyone, not even family members or bank employees
7
 The chances of misuse of this much hyped 'insecure' baby
product (ATM) are manifold due to the exponential growth of
'intelligent' criminals day by day.
 There is an urgent need for improving security in banking
region. With the advent of ATM though banking became a lot
easier it even became a lot vulnerable.
 Provide a cordless, password-free way to get their money out of
an ATM
An ATM With An
Eye
8
On Most Modern ATM, The
Customer Is
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
9
 By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
 A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
10
Techniques
BIOMETRIC IDENTIFICATION TECHNIQUES
 Finger Printing
 Retina Scanning
 Facial Recognition
 Iris Recognition
11
How It Work
A camera based in ash machine will
 Detect the pattern in second
 Compare it with one store in a central computer.
 Or encode on to the cash card.
A sensor system examines the randomly
 Formed features of the iris of the eye
 as unique as a fingerprint.
12
Where It Used
The development of such a system would
 serve to protect consumers
 financial institutions alike from fraud
 other breaches of security.
FIGURE-3
13
Camera Installation On ATM
Machine
FIGURE-4
14
Portrait camera
Camera Snapshots
Cash slot(Dispenser) camera
FIGURE-5
15
Iris code generation
FIGURE-6 16
Steps Of Iris Working
17
How you protect your password
 Changing your password regularly
 Memorizing your password.
 If you do write down the password, keep it at home or hidden
at work. Don't rewrite your password on a post-it note and
stick it on your monitor or hard drive.
 Web site remember a password for you, don't use it. Anyone
who uses your machine will have automatic access to
information that is password protected.
18
Protect Your ATM Cards
 An ATM card should be treated as thought it were cash.
 Avoid providing card and account information to anyone over
the telephone.
 When making a cash withdrawal at an ATM, immediately
remove the case as soon as the machine releases it.
 Put the case in your pocket and wait until you are in a secure
location before counting it.
 Never use an ATM in an isolated area or never leave up
receipt
 Be sure to take your receipt to record transactions and match
them against monthly statements.
19
Conclusion
We Thus Develop An Atm Model That Is
 More reliable in providing security by using facial recognition
software.
 By keeping the time elapsed in the verification process to a
negligible amount
 Try to maintain the efficiency of this ATM system
20
REFERENCES
[1] www.nationmaster.com
[2] www.google.co.in
[3] www.atmeye.net
[4] Wikipedia
21
22

More Related Content

What's hot

Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
Siya Agarwal
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
Leelakh Sachdeva
 

What's hot (20)

Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
ATM
ATMATM
ATM
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
ATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSMATM Security by using Fingerprint Recognition And GSM
ATM Security by using Fingerprint Recognition And GSM
 
Atm system ppt
Atm system pptAtm system ppt
Atm system ppt
 
Atm security
Atm securityAtm security
Atm security
 
Money pad future wallet
Money pad future walletMoney pad future wallet
Money pad future wallet
 
An eye with an atm
An eye with an atmAn eye with an atm
An eye with an atm
 
14 581
14 58114 581
14 581
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Security
SecuritySecurity
Security
 
Atm security
Atm securityAtm security
Atm security
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
Moneypad
MoneypadMoneypad
Moneypad
 
Money pad ppt
Money pad pptMoney pad ppt
Money pad ppt
 
Atm (bm)
Atm (bm)Atm (bm)
Atm (bm)
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
Ppt final
Ppt finalPpt final
Ppt final
 
Atm using fingerprint
Atm using fingerprintAtm using fingerprint
Atm using fingerprint
 

Viewers also liked

automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
tejinderubs
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
Santosh Kumar
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
Siddharth Modi
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
Nilu Desai
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
shilpi nagpal
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPT
Abishek Sam
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
laknatha
 

Viewers also liked (19)

An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
Iris recognition seminar
Iris recognition seminarIris recognition seminar
Iris recognition seminar
 
Iris Recognition
Iris RecognitionIris Recognition
Iris Recognition
 
Atm System
Atm SystemAtm System
Atm System
 
automated teller machines
automated teller  machinesautomated teller  machines
automated teller machines
 
Face recognition ppt
Face recognition pptFace recognition ppt
Face recognition ppt
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Face recognition technology - BEST PPT
Face recognition technology - BEST PPTFace recognition technology - BEST PPT
Face recognition technology - BEST PPT
 
Iris recognition system
Iris recognition systemIris recognition system
Iris recognition system
 
Solar Mobile Charger PPT
Solar Mobile Charger PPTSolar Mobile Charger PPT
Solar Mobile Charger PPT
 
ATM Banking
ATM BankingATM Banking
ATM Banking
 
Best topics for seminar
Best topics for seminarBest topics for seminar
Best topics for seminar
 
Iris recognition
Iris recognition Iris recognition
Iris recognition
 
Biometrics iris recognition
Biometrics iris recognitionBiometrics iris recognition
Biometrics iris recognition
 
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTUREATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
ATM(AUTOMATIC TELLER MACHINE)-HISTORY,TYPES, WORKING, STRUCTURE
 
Animatronics PPT
Animatronics PPTAnimatronics PPT
Animatronics PPT
 
Medical mirror
Medical mirrorMedical mirror
Medical mirror
 
Face Recognition
Face RecognitionFace Recognition
Face Recognition
 

Similar to an atm with an eye

anatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptxanatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptx
TjMsd
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
Hai Nguyen
 

Similar to an atm with an eye (20)

anatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptxanatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Tellerpass -
Tellerpass -  Tellerpass -
Tellerpass -
 
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02Presentationonsecurityfeatureofatm2 130621034116-phpapp02
Presentationonsecurityfeatureofatm2 130621034116-phpapp02
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
13362741.ppt
13362741.ppt13362741.ppt
13362741.ppt
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
N044057478
N044057478N044057478
N044057478
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
ATM Security
ATM SecurityATM Security
ATM Security
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
Ppt on atm machine
Ppt on atm machinePpt on atm machine
Ppt on atm machine
 
Moneypad
MoneypadMoneypad
Moneypad
 
My blink tech.
My blink tech.My blink tech.
My blink tech.
 
Blink tech.
Blink tech.Blink tech.
Blink tech.
 
Atm machine
Atm machineAtm machine
Atm machine
 
E010313141
E010313141E010313141
E010313141
 
Money pad report
Money pad reportMoney pad report
Money pad report
 

More from Mohd Nazir Shakeel (9)

Ip4vsip6
Ip4vsip6Ip4vsip6
Ip4vsip6
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Mems optical switches
Mems optical switchesMems optical switches
Mems optical switches
 
Adaptive cruise control’
Adaptive cruise control’Adaptive cruise control’
Adaptive cruise control’
 
Blue brain
Blue brainBlue brain
Blue brain
 
3D INTEGRATION
3D INTEGRATION3D INTEGRATION
3D INTEGRATION
 
Smart note taker
Smart note takerSmart note taker
Smart note taker
 
Embedded vision
Embedded visionEmbedded vision
Embedded vision
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

an atm with an eye

  • 1. AN ATM WITH AN EYE THE FUTURE’S TECHNOLOGY MOHD NAZIR SHAKEEL 1
  • 2. Outline  ATM  ATM WITH AN EYE  ON THE MOST CUSTOMER IS  WHERE IT IS USE  WORKING  TECHNIQUES  HOW IT WORK  PROTECTION  CONCLUSION  REFERENCES 2
  • 3. Automated Teller Machine An automated teller machine (ATM) is :  Computerize telecommunications  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a human clerk or bank teller.  Security requiring combination Physical access card+ Password(PIN) 3
  • 4. 4 Physical Access Card (ATM Card) 1. Card Provider Name : Name of Card Provider like bank or financial institute; for E.g.. ICICI Bank, SBI Bank etc. 2. Card Number : 16 Digit Number. It divided into 4 parts with 4 number. 3. 3D Hologram : Contain 3D Hologram to represent whether it is Visa card or Maestro. 4. Valid From : It contains valid from date, i.e. Contains the card activation date. 5. Valid Thru : It contains valid thru date, i.e. Contains last date for the use of card. 6. Brand Logo : Contains Brand FIGURE-1
  • 5. 8. Magnetic Strip : Contains Magnetic Strip have special identification 9. Verification Number : Contains Three digit verification number. 10. Signature Panel : Contains Signature Panel, i.e. Card Holder Signature. FIGURE-2 5
  • 6. Password  Whether you are on the internet or an online banking program, you are often required to use a password  The worst passwords to use are the ones that come to mind first name, spouse's name, maiden name, pets, children's name, even street addresses, etc.  The best passwords mix numbers with upper and lowercase letters. A password that is not found in the dictionary is even better. 6
  • 7. Personal Identification Number (Pin)  PIN is one method used by banks and phone companies to protect your account from unauthorized access  PIN is a confidential code issued to the cardholder to permit access to that account  PIN should be memorized, secured and not given to anyone, not even family members or bank employees 7
  • 8.  The chances of misuse of this much hyped 'insecure' baby product (ATM) are manifold due to the exponential growth of 'intelligent' criminals day by day.  There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable.  Provide a cordless, password-free way to get their money out of an ATM An ATM With An Eye 8
  • 9. On Most Modern ATM, The Customer Is Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN). 9
  • 10.  By forcing the ATM match a live image of a customer’s face/eye with an image stored in a bank database (associated with the account number) when the data matches(account image and stored image) user be considered fully verified  A system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on. Working 10
  • 11. Techniques BIOMETRIC IDENTIFICATION TECHNIQUES  Finger Printing  Retina Scanning  Facial Recognition  Iris Recognition 11
  • 12. How It Work A camera based in ash machine will  Detect the pattern in second  Compare it with one store in a central computer.  Or encode on to the cash card. A sensor system examines the randomly  Formed features of the iris of the eye  as unique as a fingerprint. 12
  • 13. Where It Used The development of such a system would  serve to protect consumers  financial institutions alike from fraud  other breaches of security. FIGURE-3 13
  • 14. Camera Installation On ATM Machine FIGURE-4 14
  • 15. Portrait camera Camera Snapshots Cash slot(Dispenser) camera FIGURE-5 15
  • 17. Steps Of Iris Working 17
  • 18. How you protect your password  Changing your password regularly  Memorizing your password.  If you do write down the password, keep it at home or hidden at work. Don't rewrite your password on a post-it note and stick it on your monitor or hard drive.  Web site remember a password for you, don't use it. Anyone who uses your machine will have automatic access to information that is password protected. 18
  • 19. Protect Your ATM Cards  An ATM card should be treated as thought it were cash.  Avoid providing card and account information to anyone over the telephone.  When making a cash withdrawal at an ATM, immediately remove the case as soon as the machine releases it.  Put the case in your pocket and wait until you are in a secure location before counting it.  Never use an ATM in an isolated area or never leave up receipt  Be sure to take your receipt to record transactions and match them against monthly statements. 19
  • 20. Conclusion We Thus Develop An Atm Model That Is  More reliable in providing security by using facial recognition software.  By keeping the time elapsed in the verification process to a negligible amount  Try to maintain the efficiency of this ATM system 20
  • 22. 22