SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 370
ATM FOR VISUALLY CHALLENGED PEOPLE
Aneesh Chandran1, Aiswarya Paulson2, Abee Joe Varghese3, DeenShifaz4
1Asst. Professor, Dept. of Computer Science Engineering, Jyothi Engineering college, Kerala, India,
2B.Tech, CSE, Jyothi Engineering College, Kerala, India,
3B.Tech, CSE, Jyothi Engineering College, Kerala, India,
4B.Tech, CSE, Jyothi Engineering College, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - "ATM" stands for Automated Teller Machine.
ATM machine was invented by John Shep- phardbarenonJune
1967 at Barclays bank in Enfield, United Kingdom. ATM, also
called the cash machine is an electronic telecommunication
device that enables the customers of financial institutions to
perform financial transactions, without the need for a human
cashier. An automatic teller machinerequiresausertopassan
identity test before any transactions. The current method
available for access control in ATM is based on smartcard. Itis
difficult to prevent another person from attaining and using a
legitimate person’s card, also conventional smartcard can be
lost, duplicated, stolen or impersonated with accuracy[1].The
aim of our project is to implement an ATM for visually
challenged people. Here we implement automatic ATM
processing using voice command and finger print. In this, only
a single person is strictly permitted at a time. Door will be
locked when the sensors detect human presence inside the
cabin. There will be two modes - Normal mode and Blind
mode. Customer can select their respective modes through
voice command. After inserting the smart card, which already
has the fingerprint template numberofthevisuallychallenged
person encrypted on it, user can use the fingerprint scanner
which compares the one in the smart card with the fresh one
for authentication. In Blind mode, there is a provision using
which the blind people can even choose whether to check
balance or to withdraw cash by voice command. Normal mode
processing is same as that of existing ATM.
Key Words: Easy VR, Automated Teller Machine,
Fingerprint, RSA, Voice recognition
1. INTRODUCTION
About 285 million people around the world are
visually impaired and about 35 million people are
blind. So there should be a system to help the
differently abled ones to access ATM. ATM stands for
Automated Teller Machine. It was invented by John
Shepphardbaren on June 1967 at Barclays bank in
Enfield, United Kingdom. In India, Hong Kong and
Shanghai banking corporation (HSBC) installed first
ATM in 1987[7]. ATM, also called the cash machineisan
electronic telecommunication device that enables the
customers of financial institutions to performfinancial
transactions, without the need for a human cashier.
According to ATM industry association (ATMIA) there
are now close to 3 million cash machines installed
world-wide. Usually, the customer is identified by
inserting an ATM card with a magnetic stripe that
contains a unique card number and some security
information. Security is of paramount importance
during ATM transactions. People choose passwords
which are easy to remember, and easily predicted, or
they change all PINs to be the same. Anotherconcernis
the accessibility of ATM machines to differently abled
people.
ATM requires a user to pass an identity test before
any transaction can be granted. The current method
available for access control in ATM is based on
smartcard. Efforts were made to conduct an interview
with required questions among the ATM users and the
result proofed that a lot of problems was associated
with ATM smartcard for access control. Among the
problems are; it is very difficult to prevent another
person from attaining and using a legitimate persons
card, also conventional smartcard can be lost,
duplicated, stolen or impersonated with accuracy. The
financial crime case rises repeatedly in recent years; a
lot of criminals tamper with the ATM terminal and
steal user’s credit card and password by illegal means.
Once user’s bank card is lost and the password is
stolen, the criminal will draw all cash from their
account, which will bring enormous financial losses to
the customer. To carry on the valid identity to the
customer becomes the focus incurrent financial circle.
Traditional ATM systemsauthenticategenerallyby
using the credit cardandthepassword,themethodhas
some defects. Using credit card and password cannot
verify the client’s identityexactly. ThereforeBiometric
authentication is used in this system
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 371
2. WORKING
The system is developed for assisting blind
people for accessing the ATM. ATM is a place where
people can easily handle the banking transactions
without much time delay. The current feature of ATM
doesn’t support much security for the personswhoare
visually impaired. Hence, the project focuses on
developing the ATM system for the visually impaired
people. The system consists of ATM card reader
section, fingerprint section and various indication
alarms.
OndetectinghumanpresenceintheATMroom,
the system will produce voice output in order to select
either normal mode or blind mode. The voice input of
the person will be recognized using a voicerecognition
module. On selecting the blind mode, the sequence of
voice information will be provided in the ATM through
the PC. On the other hand, if the selected mode is
normal, the information will be displayed on the LCD
screen. Both two modes include ATM card verifying
process as well as fingerprint matching.
The ATM card data consists of the encrypted
fingerprint data of the card holder. RSA algorithm is
used for the encryption process. On inserting the card,
the encrypted fingerprint data will be sending to the
PC. The on time fingerprint data will be comparedwith
the decrypted fingerprint data. The successful
matching of the data will lead the person to access the
ATM service. If the details mismatched, the systemwill
not allow the person to access the ATM.
There are 4 modules in the system
1. ENTRY MODULE
2. LOGIN MODULE
3. NORMAL MODE
4. SPECIAL MODE
In Entry module, with the help of sensors; the system
ensures that only one person is inside the ATM cabin.
Once the user has entered the cabin, the solenoid lock
will lock the door after the PIR sensor ensuring that
only a single user has entered into the cabin.
In Login module, the user authenticates by inserting
the smartcard which has the fingerprint template
encrypted in it. This encrypted template is cross
checked with that stored in the memory.
In Normal mode, the functioning is as same as the
existing one but fingerprint template is used insteadof
PIN number. Here keypad is used as the input method
i.e either to withdraw cash or to check the balance.
In Special mode, fingerprint template is used as PIN
and voice commanding is used to select the operation
to be performed i.e either to withdraw money or to
check the balance[5].
3. RSA ALGORITHM
RSA algorithm is to encrypt and decrypt
messages. Thekeyusedforencryptionisdifferentfrom
the key used for decryption. It is asymmetric
cryptographic algorithm. Asymmetric means that it
contains two different keys. This is also called public
key cryptography, because one of them can be given to
everyone, the other key must be kept private[3].
In case of public cryptography, we use one
public key and one private key to send our message.
But in this case we may have a chance to loss our
content, to avoid that we are providing more secure
and authentication by using two set of keys, one use as
the sender’s private key by using this we can encrypt
the image and another key as the receiver’s Public key
by using this we provide the authentication. Then the
receiver decrypts the encrypted image
The steps involvedinRSAdoublekeyimageencryption
algorithm is described below:
1. Choose two prime numbers p and q.
2. Set n equal to p * q.
3. Calculate f(n) = (p 1)*(q 1)
4. Select e such that e is relatively primetof(n)andless
than f(n)
5. Determine d such that de mod f(n) = 1 and d < f(n)[4].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 372
3.1 Encryption process
Encryption is the process of transforming
plaintext into a cipher text by using an encryption
algorithm combined with a parameter c= me mod n.
Where “c” represents a cipher text, “m” represents a
message to be encrypted, n=pq.
3.2 Decryption process
Decryption is the process of converting the
cipher (hidden) form into an original image, to know
the actual content by the receiver.
m= cd mod n
4. SYSTEM ARCHITECTURE
A system architecture is a conceptual model
that defines the structure, behaviour, and more views
of a system[7]. An architecture description is a formal
description and representation of a system, organized
in a such way that describes the structures and
behaviours of the system. System architecturegivesan
idea about the content of the elements comprising a
system, the relationships among those elements, and
the rules governing those relationships. The
architectural components and set of relationships
between these components that an architecture
description may consist of hardware, software,
documentation, facilities, manual procedures, or roles
played by organizations or people. A system
architecture can comprise system componentsandthe
expand system. So that will work together to
implement the overall system. There have been efforts
to formalize languagestodescribesystemarchitecture,
collectively these are called architecture description
languages Normal or Body Text
4.1 Easy V R
Easy V R 3 is a multi-purpose speech
recognition module designed to easily add versatile,
robust and cost effective speech recognition
capabilities to almost any application[6]. The EasyVR3
module can be used with any host with an UART
interface powered at 3.3V , 5V,suchasPICandArduino
boards. Some application examples include home
automation, such as voice controlled light switches,
locks, curtains or kitchen appliances, to the most
popular robots on the market. It can be easily plugged
into a solder-less breadboard or standard prototyping
board, and it is compatible with the microbus
specifications.
The Easy V R 3 communicates via an asynchronous
serial interface (commonly known as UART interface),
with the following features:
Baud Rate: 9600 (default), 19200, 38700, 57600,
115200
Frame: 8 Data bits, No parity, 1 Stop bit
ATMEGA2560
4X3 KEYPAD
hgjhiuhi
KK
EASY VR
SMART CARD
R305
IR 1 ENTRY
IR2 EXIT
PIR
LEVELSHIFTER
SOLENOID
BUZZER3 (CASH)
R305
BUZZER2 (CARD)
BUZZER1 (DOOR)
SPEAKERPC
20X4
Fig -1: Architecture diagram
4.2 R305
This is a finger print sensor module with TTL
UART interface for direct connections to
microcontrollerUARTortoPCthroughMAX232/USB-
Serial adapter. The user can store the finger print data
in the module and can configure it in 1:1 or 1: N mode
for identifying the person. The FP module can directly
interface with 3v or 5v Microcontroller. A level
converter is required for interfacing with PC serial
port.
Optical biometric fingerprint readerwithgreat
features and can be embedded into a variety of end
products, such as: access control, safety deposit box,
car door locks.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 373
4.3 Level Shifter
MAX232 IC is used to convert the TTL/CMOS
logic levels to RS232 logic levels during serial
communication of microcontrollers with PC. The
controller operates at TTL logic level (0-5V) and the
serial communicationin PC works onRS232standards
(-25 V to + 25V). This makes it difficult to establish a
direct link between them to communicate with each
other.
4.4 IR Sensor
IR Sensors work by using a specificlightsensor
to detect a select light wavelength in the Infra-Red
spectrum. By using an LED which produces light at the
same wavelength as what the sensor is looking for. By
keeping an object close to the sensor, the lightfromthe
LED bounces off the object and into the light sensor
4.5 Buzzer
A buzzer or beeperisanaudiosignalingdevice;
it may be mechanical, electromechanical, or
piezoelectric. Typical uses of buzzers and beepers
include alarm devices, timers and confirmation of user
input such as a mouse click or keystroke.
4.6 Keypad
The 12 keys keypad is widely used in many
applications, some of those are telephones and ATM
machines. There are many different types of keypads
and the keypadwhichwouldbeexplainedherewoulda
matrix method in order to find which key is pushed.
4.7 LCD
LCD (Liquid Crystal Display) screen is an electronic
display module and find a wide range of applications.
These modules are preferred over seven segments and
other multi segment LEDs. economical; easily
programmable. The reasons being: LCDs are
economical; easily programmable.
5. FEATURES OF THE SYSTEM
 More economical as finger print scanner is
much easier to set up.
 Fingerprint biometric scheme is much user
friendly as it is unique and cannot be copied
 Finger-print authentication is accurate
 Emphasis the idea of self-dependence to blind
as well as poorly educated people.
 Much safer scheme, as there is no fear of losing
the secret PIN by any means
 Confusions regarding memorizing and
maintaining PINs can be avoided
6. FLOW CHART
7. ADVANTAGES OF THE SYSTEM
 Blind and partially sighted peoplecancheckon
their accounts on their own.
 As the transactions is through voice
commands, it is very helpful to the uneducated
people as well as aged ones
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 374
8. SYSTEM REQUIREMENTS & SPECIFICATION
Here we are including the softwares and hardwares
used for developing the project and implementing the
project
8.1 SOFTWARE REQUIREMENTS
1. Operating system : windows 7/8.1
2. Coding language : Embedded C
3. Visual studio (2008 version)
4. Proteus (simulation software)
5. Circuit wizard
6. Easy V R Commander
8.2 HARDWARE REQUIREMENTS
1. AT Mega 2560[6]
2. I R Sensor
3. P I R Sensor
4. R305 Fingerprint module
5. Easy V R voice module
6. Buzzers
7. Keypad
8. LCD
9. TECHNOLOGIES USED
 In this section we are including the
technologies used for our project
developement phase.
 RSA algorithm[3][4][5]
 Fingerprint Encryption technology (R305)
 Buzzer usage
 voice commanding technology (Easy V R)[5][6]
10. CONCLUSIONS
We have selected the topic for the project ”ATM
FOR VISUALLY CHALLENGED PEOPLE” and got
accepted .The base papers and related papers are
selected and studied and presented in the literature
survey. After the literature survey we selected the RSA
algorithm to implement in our project. This algorithm
includes methods for fingerprint encryption.
Our proposed system enables the visually
challenged people to access the ATM and perform
transactions through voice commands. Safe and
economical fingerprint authentication is used instead
of PIN for their account It not only helps the blinds but
also emphasis self- dependence to uneducated and
aged people We provides two levels of security. It not
only allows a single user at a time but also provides
Fingerprint Authentication. Our system is more user
friendly and is also open to future advancements
11. FUTURE WORKS
 Implementation of ATM for differently abled
ones
 Can be expanded to multipleuserenvironment
12. SCREEN SHOTS
Fig -2: Screenshot
Fig -3: System Design
REFERENCES
[1] Yekini N.A, Itegboje A.O, Oyeyinka I.K Akinwole A.K.”
Automated Biometric Voice-Based Access Control in
Automatic Teller Machine (ATM)” (IJACSA)
International Journal ofAdvancedComputerScienceand
Applications, Vol. 3, No.6, 2012
[2] DhirajSunehra, “Fingerprint Based Biometric ATM
Authentication System”, InternationalJournal of
Engineering Inventions, Volume 3, Issue 11 (June
2014)PP: 22-2
[3] Safnitha P Y, Sheena Kurian K, “EnhancingSecurity With
FingerprintCombination Using RSA Algorithm”,
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 375
International Journal of Advanced Trends inComputer
Science and Engineering, Vol.3 , No.4, Held on
September 01, 2014
[4] Mrs.R.Sridevi ,S.Karthika “Biometric Cryptosystem for
VoIP Security usingRSA Key Generation ”, International
Journal of Software and Web Sciences(IJSWS)
[5] R.D.Salagar, AkshataPatil, “Voice Enabled ATM Machine
with IrisRecognitionForAuthentication”, Proceedingsof
3rd IRF InternationalConference,10th May-2014, Goa,
India.
[6] K. Kannan, Dr. J. Selvakumar , “ Arduino based voice
controlled robot ”, International Research Journal of
Engineering and Technology (IRJET) Volume:02 Issue:
01, Mar-2015
[7] https://www.wikipedia.org/

Weitere ähnliche Inhalte

Was ist angesagt?

FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
Journal For Research
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 

Was ist angesagt? (20)

C132733
C132733C132733
C132733
 
Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
predefense presentation
predefense presentationpredefense presentation
predefense presentation
 
Finger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSMFinger Vein Based Licensing And Authentication Scheme Using GSM
Finger Vein Based Licensing And Authentication Scheme Using GSM
 
IRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment SystemIRJET- Fingerprint Based Online Payment System
IRJET- Fingerprint Based Online Payment System
 
IRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMSIRJET- Face Recognition System with HOG in ATMS
IRJET- Face Recognition System with HOG in ATMS
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
N044057478
N044057478N044057478
N044057478
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
IRJET- Smart and Secured Voting System using Magnetic Stripe Voter ID Card an...
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...IRJET-  	  Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
IRJET- Brightness Preserving Bi-Histogram Equalization for Preprocessing ...
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
A011140104
A011140104A011140104
A011140104
 
Bio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdkBio atm with-microsoft_finger_print_sdk
Bio atm with-microsoft_finger_print_sdk
 

Ähnlich wie ATM for visually challenged people

Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
ijsrd.com
 

Ähnlich wie ATM for visually challenged people (20)

Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...An efficient implementation for key management technique using smart card and...
An efficient implementation for key management technique using smart card and...
 
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONSSECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
SECURE DATA ENCRYPTION FOR ATM TRANSACTIONS
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
IRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATMIRIS Recognition Based Authentication System In ATM
IRIS Recognition Based Authentication System In ATM
 
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHMCREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
CREDIT CARD FRAUD DETECTION USING ARTIFICIAL NEURAL NETWORK (ANN) ALGORITHM
 
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
IRJET- SteganoPIN:Two Faced Human-Machine Interface for Practical Enforcement...
 
Third Generation Automatic Teller Machine
Third Generation Automatic Teller MachineThird Generation Automatic Teller Machine
Third Generation Automatic Teller Machine
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 

Mehr von IRJET Journal

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Kürzlich hochgeladen (20)

Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086Minimum and Maximum Modes of microprocessor 8086
Minimum and Maximum Modes of microprocessor 8086
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 

ATM for visually challenged people

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 370 ATM FOR VISUALLY CHALLENGED PEOPLE Aneesh Chandran1, Aiswarya Paulson2, Abee Joe Varghese3, DeenShifaz4 1Asst. Professor, Dept. of Computer Science Engineering, Jyothi Engineering college, Kerala, India, 2B.Tech, CSE, Jyothi Engineering College, Kerala, India, 3B.Tech, CSE, Jyothi Engineering College, Kerala, India, 4B.Tech, CSE, Jyothi Engineering College, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - "ATM" stands for Automated Teller Machine. ATM machine was invented by John Shep- phardbarenonJune 1967 at Barclays bank in Enfield, United Kingdom. ATM, also called the cash machine is an electronic telecommunication device that enables the customers of financial institutions to perform financial transactions, without the need for a human cashier. An automatic teller machinerequiresausertopassan identity test before any transactions. The current method available for access control in ATM is based on smartcard. Itis difficult to prevent another person from attaining and using a legitimate person’s card, also conventional smartcard can be lost, duplicated, stolen or impersonated with accuracy[1].The aim of our project is to implement an ATM for visually challenged people. Here we implement automatic ATM processing using voice command and finger print. In this, only a single person is strictly permitted at a time. Door will be locked when the sensors detect human presence inside the cabin. There will be two modes - Normal mode and Blind mode. Customer can select their respective modes through voice command. After inserting the smart card, which already has the fingerprint template numberofthevisuallychallenged person encrypted on it, user can use the fingerprint scanner which compares the one in the smart card with the fresh one for authentication. In Blind mode, there is a provision using which the blind people can even choose whether to check balance or to withdraw cash by voice command. Normal mode processing is same as that of existing ATM. Key Words: Easy VR, Automated Teller Machine, Fingerprint, RSA, Voice recognition 1. INTRODUCTION About 285 million people around the world are visually impaired and about 35 million people are blind. So there should be a system to help the differently abled ones to access ATM. ATM stands for Automated Teller Machine. It was invented by John Shepphardbaren on June 1967 at Barclays bank in Enfield, United Kingdom. In India, Hong Kong and Shanghai banking corporation (HSBC) installed first ATM in 1987[7]. ATM, also called the cash machineisan electronic telecommunication device that enables the customers of financial institutions to performfinancial transactions, without the need for a human cashier. According to ATM industry association (ATMIA) there are now close to 3 million cash machines installed world-wide. Usually, the customer is identified by inserting an ATM card with a magnetic stripe that contains a unique card number and some security information. Security is of paramount importance during ATM transactions. People choose passwords which are easy to remember, and easily predicted, or they change all PINs to be the same. Anotherconcernis the accessibility of ATM machines to differently abled people. ATM requires a user to pass an identity test before any transaction can be granted. The current method available for access control in ATM is based on smartcard. Efforts were made to conduct an interview with required questions among the ATM users and the result proofed that a lot of problems was associated with ATM smartcard for access control. Among the problems are; it is very difficult to prevent another person from attaining and using a legitimate persons card, also conventional smartcard can be lost, duplicated, stolen or impersonated with accuracy. The financial crime case rises repeatedly in recent years; a lot of criminals tamper with the ATM terminal and steal user’s credit card and password by illegal means. Once user’s bank card is lost and the password is stolen, the criminal will draw all cash from their account, which will bring enormous financial losses to the customer. To carry on the valid identity to the customer becomes the focus incurrent financial circle. Traditional ATM systemsauthenticategenerallyby using the credit cardandthepassword,themethodhas some defects. Using credit card and password cannot verify the client’s identityexactly. ThereforeBiometric authentication is used in this system
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 371 2. WORKING The system is developed for assisting blind people for accessing the ATM. ATM is a place where people can easily handle the banking transactions without much time delay. The current feature of ATM doesn’t support much security for the personswhoare visually impaired. Hence, the project focuses on developing the ATM system for the visually impaired people. The system consists of ATM card reader section, fingerprint section and various indication alarms. OndetectinghumanpresenceintheATMroom, the system will produce voice output in order to select either normal mode or blind mode. The voice input of the person will be recognized using a voicerecognition module. On selecting the blind mode, the sequence of voice information will be provided in the ATM through the PC. On the other hand, if the selected mode is normal, the information will be displayed on the LCD screen. Both two modes include ATM card verifying process as well as fingerprint matching. The ATM card data consists of the encrypted fingerprint data of the card holder. RSA algorithm is used for the encryption process. On inserting the card, the encrypted fingerprint data will be sending to the PC. The on time fingerprint data will be comparedwith the decrypted fingerprint data. The successful matching of the data will lead the person to access the ATM service. If the details mismatched, the systemwill not allow the person to access the ATM. There are 4 modules in the system 1. ENTRY MODULE 2. LOGIN MODULE 3. NORMAL MODE 4. SPECIAL MODE In Entry module, with the help of sensors; the system ensures that only one person is inside the ATM cabin. Once the user has entered the cabin, the solenoid lock will lock the door after the PIR sensor ensuring that only a single user has entered into the cabin. In Login module, the user authenticates by inserting the smartcard which has the fingerprint template encrypted in it. This encrypted template is cross checked with that stored in the memory. In Normal mode, the functioning is as same as the existing one but fingerprint template is used insteadof PIN number. Here keypad is used as the input method i.e either to withdraw cash or to check the balance. In Special mode, fingerprint template is used as PIN and voice commanding is used to select the operation to be performed i.e either to withdraw money or to check the balance[5]. 3. RSA ALGORITHM RSA algorithm is to encrypt and decrypt messages. Thekeyusedforencryptionisdifferentfrom the key used for decryption. It is asymmetric cryptographic algorithm. Asymmetric means that it contains two different keys. This is also called public key cryptography, because one of them can be given to everyone, the other key must be kept private[3]. In case of public cryptography, we use one public key and one private key to send our message. But in this case we may have a chance to loss our content, to avoid that we are providing more secure and authentication by using two set of keys, one use as the sender’s private key by using this we can encrypt the image and another key as the receiver’s Public key by using this we provide the authentication. Then the receiver decrypts the encrypted image The steps involvedinRSAdoublekeyimageencryption algorithm is described below: 1. Choose two prime numbers p and q. 2. Set n equal to p * q. 3. Calculate f(n) = (p 1)*(q 1) 4. Select e such that e is relatively primetof(n)andless than f(n) 5. Determine d such that de mod f(n) = 1 and d < f(n)[4].
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 372 3.1 Encryption process Encryption is the process of transforming plaintext into a cipher text by using an encryption algorithm combined with a parameter c= me mod n. Where “c” represents a cipher text, “m” represents a message to be encrypted, n=pq. 3.2 Decryption process Decryption is the process of converting the cipher (hidden) form into an original image, to know the actual content by the receiver. m= cd mod n 4. SYSTEM ARCHITECTURE A system architecture is a conceptual model that defines the structure, behaviour, and more views of a system[7]. An architecture description is a formal description and representation of a system, organized in a such way that describes the structures and behaviours of the system. System architecturegivesan idea about the content of the elements comprising a system, the relationships among those elements, and the rules governing those relationships. The architectural components and set of relationships between these components that an architecture description may consist of hardware, software, documentation, facilities, manual procedures, or roles played by organizations or people. A system architecture can comprise system componentsandthe expand system. So that will work together to implement the overall system. There have been efforts to formalize languagestodescribesystemarchitecture, collectively these are called architecture description languages Normal or Body Text 4.1 Easy V R Easy V R 3 is a multi-purpose speech recognition module designed to easily add versatile, robust and cost effective speech recognition capabilities to almost any application[6]. The EasyVR3 module can be used with any host with an UART interface powered at 3.3V , 5V,suchasPICandArduino boards. Some application examples include home automation, such as voice controlled light switches, locks, curtains or kitchen appliances, to the most popular robots on the market. It can be easily plugged into a solder-less breadboard or standard prototyping board, and it is compatible with the microbus specifications. The Easy V R 3 communicates via an asynchronous serial interface (commonly known as UART interface), with the following features: Baud Rate: 9600 (default), 19200, 38700, 57600, 115200 Frame: 8 Data bits, No parity, 1 Stop bit ATMEGA2560 4X3 KEYPAD hgjhiuhi KK EASY VR SMART CARD R305 IR 1 ENTRY IR2 EXIT PIR LEVELSHIFTER SOLENOID BUZZER3 (CASH) R305 BUZZER2 (CARD) BUZZER1 (DOOR) SPEAKERPC 20X4 Fig -1: Architecture diagram 4.2 R305 This is a finger print sensor module with TTL UART interface for direct connections to microcontrollerUARTortoPCthroughMAX232/USB- Serial adapter. The user can store the finger print data in the module and can configure it in 1:1 or 1: N mode for identifying the person. The FP module can directly interface with 3v or 5v Microcontroller. A level converter is required for interfacing with PC serial port. Optical biometric fingerprint readerwithgreat features and can be embedded into a variety of end products, such as: access control, safety deposit box, car door locks.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 373 4.3 Level Shifter MAX232 IC is used to convert the TTL/CMOS logic levels to RS232 logic levels during serial communication of microcontrollers with PC. The controller operates at TTL logic level (0-5V) and the serial communicationin PC works onRS232standards (-25 V to + 25V). This makes it difficult to establish a direct link between them to communicate with each other. 4.4 IR Sensor IR Sensors work by using a specificlightsensor to detect a select light wavelength in the Infra-Red spectrum. By using an LED which produces light at the same wavelength as what the sensor is looking for. By keeping an object close to the sensor, the lightfromthe LED bounces off the object and into the light sensor 4.5 Buzzer A buzzer or beeperisanaudiosignalingdevice; it may be mechanical, electromechanical, or piezoelectric. Typical uses of buzzers and beepers include alarm devices, timers and confirmation of user input such as a mouse click or keystroke. 4.6 Keypad The 12 keys keypad is widely used in many applications, some of those are telephones and ATM machines. There are many different types of keypads and the keypadwhichwouldbeexplainedherewoulda matrix method in order to find which key is pushed. 4.7 LCD LCD (Liquid Crystal Display) screen is an electronic display module and find a wide range of applications. These modules are preferred over seven segments and other multi segment LEDs. economical; easily programmable. The reasons being: LCDs are economical; easily programmable. 5. FEATURES OF THE SYSTEM  More economical as finger print scanner is much easier to set up.  Fingerprint biometric scheme is much user friendly as it is unique and cannot be copied  Finger-print authentication is accurate  Emphasis the idea of self-dependence to blind as well as poorly educated people.  Much safer scheme, as there is no fear of losing the secret PIN by any means  Confusions regarding memorizing and maintaining PINs can be avoided 6. FLOW CHART 7. ADVANTAGES OF THE SYSTEM  Blind and partially sighted peoplecancheckon their accounts on their own.  As the transactions is through voice commands, it is very helpful to the uneducated people as well as aged ones
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 374 8. SYSTEM REQUIREMENTS & SPECIFICATION Here we are including the softwares and hardwares used for developing the project and implementing the project 8.1 SOFTWARE REQUIREMENTS 1. Operating system : windows 7/8.1 2. Coding language : Embedded C 3. Visual studio (2008 version) 4. Proteus (simulation software) 5. Circuit wizard 6. Easy V R Commander 8.2 HARDWARE REQUIREMENTS 1. AT Mega 2560[6] 2. I R Sensor 3. P I R Sensor 4. R305 Fingerprint module 5. Easy V R voice module 6. Buzzers 7. Keypad 8. LCD 9. TECHNOLOGIES USED  In this section we are including the technologies used for our project developement phase.  RSA algorithm[3][4][5]  Fingerprint Encryption technology (R305)  Buzzer usage  voice commanding technology (Easy V R)[5][6] 10. CONCLUSIONS We have selected the topic for the project ”ATM FOR VISUALLY CHALLENGED PEOPLE” and got accepted .The base papers and related papers are selected and studied and presented in the literature survey. After the literature survey we selected the RSA algorithm to implement in our project. This algorithm includes methods for fingerprint encryption. Our proposed system enables the visually challenged people to access the ATM and perform transactions through voice commands. Safe and economical fingerprint authentication is used instead of PIN for their account It not only helps the blinds but also emphasis self- dependence to uneducated and aged people We provides two levels of security. It not only allows a single user at a time but also provides Fingerprint Authentication. Our system is more user friendly and is also open to future advancements 11. FUTURE WORKS  Implementation of ATM for differently abled ones  Can be expanded to multipleuserenvironment 12. SCREEN SHOTS Fig -2: Screenshot Fig -3: System Design REFERENCES [1] Yekini N.A, Itegboje A.O, Oyeyinka I.K Akinwole A.K.” Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)” (IJACSA) International Journal ofAdvancedComputerScienceand Applications, Vol. 3, No.6, 2012 [2] DhirajSunehra, “Fingerprint Based Biometric ATM Authentication System”, InternationalJournal of Engineering Inventions, Volume 3, Issue 11 (June 2014)PP: 22-2 [3] Safnitha P Y, Sheena Kurian K, “EnhancingSecurity With FingerprintCombination Using RSA Algorithm”,
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | March -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 375 International Journal of Advanced Trends inComputer Science and Engineering, Vol.3 , No.4, Held on September 01, 2014 [4] Mrs.R.Sridevi ,S.Karthika “Biometric Cryptosystem for VoIP Security usingRSA Key Generation ”, International Journal of Software and Web Sciences(IJSWS) [5] R.D.Salagar, AkshataPatil, “Voice Enabled ATM Machine with IrisRecognitionForAuthentication”, Proceedingsof 3rd IRF InternationalConference,10th May-2014, Goa, India. [6] K. Kannan, Dr. J. Selvakumar , “ Arduino based voice controlled robot ”, International Research Journal of Engineering and Technology (IRJET) Volume:02 Issue: 01, Mar-2015 [7] https://www.wikipedia.org/