ATM Security Using Fingerprint Recognition
ATM Security Using Fingerprint Recognition
Page | 170
Ojha, International Journal of Advanced Research in Computer Science and Software Engineering 5(6),
June- 2015, pp. 170-175
Existing approaches for this estimation are either to use of local features of the image or to use of global features
of the image. Outmoded fingerprint recognition approaches have demerits of easy losing rich information and poor
presentations due to the complex type of inputs, such as image turning, poor quality image conscription, incomplete input
image, and so on. In paper, fuzzy features match (FFM) based novel method on a local triangle feature is set to match the
deformed fingerprints. Fingerprint here is represented by the fuzzy feature set: the local triangle feature set. In paper, a
test chip has been fabricated using a 0.5 m standard CMOS process.
The total execution time for attaining and processing a fingerprint image is less than 360 ms at 10 MHz and the
power feeding is below 70 mW at 3.3 V supply voltage. We found development of a sensor with CMOS technology in.
Also, a chip architecture that integrates a fingerprint sensor and an identifier in a single chip is proposed in. The sensing
element senses capacitances formed by a finger surface to capture a fingerprint image. To have good speed of operation
for fingerprint matching, in depending on the spectral minutiae features two feature reduction algorithms are given: the
Column Principal Component Analysis and the Line Discrete Fourier Transform feature reductions. It can efficiently
compress the template size with a reduction rate of 94%. Spectral minutiae fingerprint recognition system shows a
matching speed with 125000 comparisons per second on a PC with Intel Pentium D processor 2.80 GHz, 1 GB of RAM.
III. RESARCH BACKGROUND
Crime at ATMs has become a countrywide issue that faces not only customers, but also bank hands and this
financial crime case rise frequently in recent years. A lot of criminals tamper with the ATM terminal and steal customers
card details by unlawful means. Once user bank card is lost and the password is pinched, the user account is exposed to
attack. Traditional ATM systems validate generally b using a card (credit, debit, or smart) and a password or PIN which
no doubt has some defects. The prevailing practises of user authentication, which involves the use of either passwords
and user IDs (identifiers), or identification cards and PINs (personal identification numbers), suffer from several
boundaries. Biometrics can be defined as measurable physiological and behavioural characteristic that can be captured
and subsequently compared with another instance at the time of verification. It is automated methods of recognizing a
person based on a physiological or behavioural characteristic.
IV.
HARDWARE DESIGN
To implement the proposed security for ATM terminals with the use of fingerprint recognition, we use the
different hardware and software platforms. Fig 1 shows the major system modules and their interconnections.
Page | 171
Ojha, International Journal of Advanced Research in Computer Science and Software Engineering 5(6),
June- 2015, pp. 170-175
allow the performance potential to be realized without suffering high costs in the memory system. Speed-critical control
signals are pipelined to allow system regulates functions to be implemented in standard low-power logic, and these
regulates signals facilitate the exploitation of the fast local access modes offered by industry standard dynamic RAMs.
The LPC2148 is interfaced to different modules via GPIO (General Purpose I/O) pins. It receives the fingerprint template
produced by the fingerprint module. It will match the same with the reference template stored at installation of the
system. If the acknowledged template gets matched with the reference one, the person is allowed to access the further
system. In case of successive mismatch of templates, the system will initialize the GSM module to send message to the
enrolled user and simultaneously will raise the alarm through buzzer.
We have used LPC2148 from NXP semiconductors (founded by Philips). It shows features as followsa) 16/32-bit ARM7TDMI-S microcontroller in a tiny LQFP64 package.
b) 240 kB of on-chip static RAM and 512 kB of on-chip flash program memory.
c) In-System/In-Application Programming (ISP/IAP) via on-chip boot-loader software.
d) Two 10-bit A/D converters provide a total of 14 analog inputs, with conversion times as low as 2.44 s per channel.
e) Single 10-bit D/A converter provide variable analog output.
f) Multiple serial interfaces including two UARTs (16C550), two Fast I2C-bus (400 kbit/s), SPI and SSP with buffering
and variable data length capabilities.
g) Vectored interrupt controller with configurable priorities and vector addresses.
h) Up to 45 of 5 V tolerant fast general purpose I/O pins in a tiny LQFP64 package .
4.2 Fingerprint Module
The important module of the system is fingerprint scanner. We used FIM3030 by NITGEN. It has ADSPBF531 as central processing unit with 8 MB of SDRAM and 1 MB offlash ROM. It uses overall supply voltage of 3.3 V.
The communication with the fingerprint module is made through RS-232 via UART0 of LPC2148.
A fingerprint sensor is an electronic device used to capture a digital image of the fingerprint pattern. The
captured image is called a live scan. This live scan is digitally processed to create a biometric template (a collection of
extracted features) which is stored and used for matching. FIM3030 is an evolutionary standalone fingerprint recognition
module consisted of optic sensor OPP03 and processing board. As CPU and highly upgraded algorithm are embedded
into a module, it provides high recognition ratio even to small size, wet, dry, calloused fingerprint. High speed 1: N
identification and 1: N verification. FIM3030 has functions of fingerprint enrolment, identification, partial and entire
deletion and reset in a single board, thereby offering convenient development environment.
Off-line functionality stores logs on the equipment memory (up to 100 fingerprints) and its identified using
search engine from the internal algorithm. Evolutionary standalone fingerprint recognition module FIM3030 is ideal for
on-line applications, because allows ASCII commands to manage the device from the host. On-line functionality,
fingerprints to verify (1:1) or identify (1: N) can be stored on non volatile memory, or be sent by RS-232 port [30].
Page | 172
Ojha, International Journal of Advanced Research in Computer Science and Software Engineering 5(6),
June- 2015, pp. 170-175
Page | 173
Ojha, International Journal of Advanced Research in Computer Science and Software Engineering 5(6),
June- 2015, pp. 170-175
configure the tools to operate in a specific and desired manner. It would be very tedious to have to set these options up
every time the application is being built; therefore they are stored in a project file. Loading the project file into KEIL
informs KEIL which source files are required, where they are, and how to configure the tools in the correct way. KEIL
can then execute each tool with the correct options. Source files are added to the project and the tool options are set as
required. The project can then be saved to preserve the settings. The project is reloaded and the simulator or debugger
started, all the desired windows are opened.
5.2 Simulator & Debugger
The simulator/ debugger in KEIL can perform a very detailed simulation of a micro controller along with
external signals. It is possible to view the precise execution time of a single assembly instruction, or a single line of C
code, all the way up to the entire application, simply by entering the crystal frequency. A window can be opened for each
peripheral on the device, showing the state of the peripheral. This enables quick trouble shooting of mis-configured
peripherals. Breakpoints may be set on either assembly instructions or lines of C code, and execution may be stepped
through one instruction or C line at a time. The contents of all the memory areas may be viewed along with ability to find
specific variables. In addition the registers may be viewed allowing a detailed view of what the microcontroller is doing
at any point in time.
5.3 Embedded C Language
The KeilVision4 platform put forward the options for assembly language and high level language
programming. C language being the most convenient language to access different port pins of LPC2148, we programmed
the algorithm to control the FIM3030 fingerprint module through host controller LPC2148 in C language. The program
follows the control actions as shown in the flowchart. The program segments to access UART, LCD, RTC, ADC, DAC,
are included by linking through UART0.h, LCD.h, RTC.h, ADC.h, DAC.h header files respectively.
5.4 Flash Programming Utility
For downloading the application program into Flash ROM, this utility tool is necessary. The program code
generated in C language after processing produces object code in hex form. It is referred as .hex file. To dump this hex
code in the flash ROM of the controller the facility is provided with Keil version 4. For programming with older
versions, the same task is completed with the help of software called Flash Magic.
VI. CONCLUSION
This type of ATM prototype can be efficiently used with fingerprint recognition. Since, password protection is
not bypassed in our system, the fingerprint recognition done after it yielded fast response and is found to be of ease for
use. Fingerprint images cannot be recreated from templates; hence no one can misuse the system. LPC2148 and
FIM3030 provide low power consumption platform. Speed of execution can be enhanced with the use of more
sophisticated microcontroller.
The security options were increased for the most part for the stability and dependableness of owner recognition. The
whole system was built on the technology of embedded system that makes the system additional safe, reliable and
straightforward to use. The same hardware platform can be used with IRIS scanner to put forward another potential
biometric security to the ATMs.
REFERENCES
[1]
Anil K. Jain and Arun Ross, Multibiometric Systems, Communications Of The ACM, January 2004/Vol. 47,
No. 1, pp. 34-40
[2]
Moses Okechukwu Onyesolu, Ignatius Majesty Ezeani, ATM Security Using Fingerprint Biometric Identifer:
An Investigative Study, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol.
3, No.4, 2012, pp. 68-72
[3]
Anil K. Jain, Jianjiang Feng, Karthik Nandakumar, Fingerprint Matching, IEEE Computer Society 2010, pp.
36-44, 0018-9162/10
[4]
Virginia Epsinosa-Duro, Minutiae Detection Algorithm for Fingerprint Recognition, IEEE AESS Systems
Magazine, March 2002, pp. 7-10
[5]
ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C]. Proceedings of the 7th
IEEE International Workshop on Cellular Neural Networks and their Applications 2002: 377-382.
[6]
Gu J, Zhou J, Zhang D.A combination model for orientation field of fingerprints. Pattern Recognition, 2004, 37:
543-553.
[7]
Cheng J, Tian J. Fingerprint enhancement with dyadic scale-space. Pattern Recognition Letters, 2004, 25(11):
1273-1284.
[8]
Chen H, Tian J. A fingerprint matching algorithm with registration pattern inspection. Journal of Software,
2005,16(6): 1046-105.
[9]
Smits G FJordaan E M.Improved SVMRegression using Mixtures of Kernels[A]. Proceedings of the 2002
International Joint Conferenceon Neural Networks[C]. Hawaii: IEEE. 2002. 2785-2.
[10]
FU Zhenghua, LI Yongjun, Tian Mi(2007). "The embedded monitoring system based ARM". JOURNAL OF
7INSTRUMENT TECHNOLOGY, Vol. 07, No. Ipp. 01-2.
2015, IJARCSSE All Rights Reserved
Page | 174
[11]
[12]
[13]
Ojha, International Journal of Advanced Research in Computer Science and Software Engineering 5(6),
June- 2015, pp. 170-175
Jun Zhou, Guangda Sua, Chun hongJiang. A face and fingerprint identity authentication system based on multiroute detection. Neurocomputing 70 (2007)922-931.
Yuliang He, Jie Tian, Xiping Luo, Tanghui Zhang. Image enhancement and minutiae matching in fingerprint
verification. Pattern Recognition Letters 24 (2003)1349-1360. [10] Wei Wang, Jianwei Li, Feifei Huang,
Hailiang Feng. Design and implementation of Log-Gabor filter in fingerprint image enhancement. Pattern
Recognition Letters 29 (2008)301-308.
Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation[J].
IEEE Transactions on Pattern Analysis and Machine intelligence. 1998, 20(8): 777-789.
Page | 175