Security of ATM Using Digital Image Processing
|
|
- Ilene Hart
- 6 years ago
- Views:
Transcription
1 Security of ATM Using Digital Image Processing Avni Mittal 1, Shubhani 2, Sarika Tyagi 3 Department of Computer Science and Engineering Raj Kumar Goel Institute of Technology for Women Ghaziabad, India 1 avnimittal.rkgitw@gmail.com, 2 shubhi.garg8@gmail.com, 3 sarikatyagi@rkgitw.edu.in Abstract By the birth of the Automatic Teller Machines, banking became a lot easier but with its own troubles of insecurity. ATM systems today use access card and PIN for identity verification. The advance trend of biometric identification techniques, including finger printing, retina scanning, and facial recognition has made a great efforts to save the unsecured situation at the ATM. This paper looked into the development of a system that combines the facial recognition technology into the identity verification process used in ATMs.The development of such a system would help to protect consumers and financial institutions from intruders and identity thieves. This paper proposes an automatic teller machine security model that would combine a physical access card, a PIN, and electronic facial recognition. However, it obvious that man s biometric features cannot be replicated, this proposal will go a long way to solve the problem of Account safety making it possible for the actual account owner. hence by seeing an urgent need for improving security in banking region the proposed software can help. Index Terms ATM, digital image processing, face, PIN, security. 46 I. INTRODUCTION Nowadays people don't even think twice about using ATMs. But how many people actually think about the security risks involved in using them? How many people think about the potentials for fraud and crime that ATMs introduce? The answer is probably not many, since these transactions are so common now. But as the use of ATMs is on the rise, so is the number of crimes involving ATMs. A. PROBLEMS FACED More recently and even more to the point is another story that was written about in the Reno Gazette- Journal on November 6, The headline reads "Reno bank job nets $740,000". The criminals in this story involved one insider who worked for Wells Fargo Armored and ATM Repair Service and four other people. The insider was newly hired by Wells Fargo and was part of a team that delivered the $740,000 to the ATM for storage on October 24, Later that day, the alarm for the ATM was triggered. But when the police came, they didn't see any signs of entry and they left. The alarm was reset by the bank, and the next morning the money was discovered missing. A specific key and combination was needed to gain entry, so the investigation focused on Wells Fargo employees. In the end, the FBI was able to recover little less than half of the money, but there was still $350,000 missing. Since both a specific key and a combination was needed, how did one employee have access to both? What happened to dual access control? Did it fail in this instance? Or was it never in place? Or is dual access control a result of crimes like these? Because ATMs are a part of our daily lives by allowing us access to cash and other financial information, it's important that we understand the security risks and the measures in place to protect our money. Along the same lines, it's important that we understand the security measures around tellers. Afterall, they are the ones who have access to all the account information in the database and access to a potentially large sum of paper money. They have financial histories at their fingertips. They enter in transactions for the customers. Is there some way fraudulent transactions could be entered? Is there any way that money could be skimmed? What measures are in place to protect us from the tellers who are behind the counters? Not only do we have to consider security from the tellers, but security of the tellers. Precisely because they do have access to large sums of cash and financial information, what danger does that put them in? What measures are in place to protect the tellers
2 from bank robbers? These are some of the questions that I would like to address in this paper. II. IMPORTANCE OF SECURITY IN ATM There ATMs make life easy. You can get cash in less than a minute from almost anywhere. However, attacking ATMs is "more lucrative than drugs" according to Diebold's Chuck Somers, who summarizes the three major ATM threats for BankInfoSecurity.com: Physical, or stealing the cash from an ATM Logical, or the installation of malicious software, and Fraud, or using fake cards and stealing card details in skimming scams The threat of getting your card skimmed is the greatest one and continues to increase -- scammers get easy access to cash, and the stakes are low if they get caught. As skimming devices get harder and harder to detect, it's more and more important to bank at ATMs you trust. Machines at bank branches can be attacked, but they're less risky than machines out on the street. If you're cavalier about where you use the ATM, be sure that you regularly check your accounts for unusual activity. Default password disabled to avoid unauthorized c access. Timely reconciliation of cash loading with ATM Till account Surveillance through physical monitoring and CCTV cameras 2 )About Cards Strong algorithms are used in generating PANs Storage of card details is done on protected systems Card details (such as PAN, expiry date) are jealously guarded. While communicating, PAN is masked Strong Encryption is used when transferring files especially, between TPP and Issuer Magnetic stripe type is outlawed in some countries to avoid card cloning. Some restrictions are placed on cards in terms of allowable transactions and withdrawal limit 3) About PIN Where PIN mailers are used, they are not dispatched at the same time with the cards and usually through a different medium. PIN selectable options are used to prevent insider compromise PINs are masked during usage against shoulder surfing. A. Present measures taken for security Considering the volume of transactions being processed by several branches of a commercial bank, proper control in Form the identification and authentication should be in place.several control measures have been put in place to ensure interests of all concerned parties such as issuers, acquirers, third party processors, switching companies and cardholders are protected. Some of the controls in place include: 1) About ATM Well lit up to discourage shady deeds at night Fortified with camera for footage Keypad protector against key logger and shoulder surfing Dual control of physical access to the machine 47 III. DIGITAL IMAGE PROCESSING An image may be defined as a two-dimensional function, f(x, y), where x and y are spatial (plane) coordinates, and the amplitude of at any pair of coordinates (x, y) is called the intensity or gray level of the image at that point. When x, y, and the amplitude values of f are all finite,discrete quantities, we call the image a digital image. The field of digital image processing refersto processing digital images by means of a digital computer. Note that a digital image iscomposed of a finite number of elements, each of which has a particular location and value.these elements are referred to as picture elements, image elements, pels, and pixels. Pixel is theterm most widely used to denote the elements of a digital image. Vision is the most advanced of our senses, so it is not surprising that images playthe single most important role in human perception.
3 However, unlike humans, who are limited to the visual band of the electromagnetic (EM) spectrum, imaging machines cover almost the entireem spectrum, ranging from gamma to radio waves. They can operate on images generated bysources that humans are not accustomed to associating with images. These include ultra-sound,electron microscopy, and computer-generated images. Thus, digital image processingencompasses a wide and varied field of applications. There is no general agreement amongauthors regarding where image processing stops and other related areas, such as image analysisand computer vision, start. Sometimes a distinction is made by defining image processing as adiscipline in which both the input and output of a process are images. We believe this to be alimiting and somewhat artificial boundary. federal, state and local governments, in the military, and in commercial applications. Enterprise-wide network security infrastructures, government IDs, secure electronic banking, investing and other financial transactions, retail sales, law enforcement, and health and social services are already benefiting from these technologies. A. How Biometric System Works? In biometrics a series of steps are followed to get the aimed goal, the steps are as shown in the figure below : Sensor : A sensor collects data and converts the information to a digital format. Signal processing algorithms : This is where quality control activities and development of the template takes place. Data Storage : Keeps information that new biometric templates will be compared to. Matching algorithm : Compares the new template to other templates in the data storage. Decision process: Uses the results from the matching component to make a system level decision. B. Types of Biometrics 1) Finger scan: Finger-scan biometrics is based on the distinctive characteristics of the human fingerprint. Fingerprints are used in forensic applications: large- scale, one-tomany searches on databases of up to millions of fingerprints 48 IV. Fig-1 Steps of DIP BIOMETRICS The Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Biometric-based solutions are able to provide for confidential financial transactions and personal data privacy. The need for biometrics can be found in 2) Retina scan: Retina scan requires the user to situate his or her eye with ½ inch of the capture device and hold still while the reader ascertains the patterns. Retina scan is designed to use in military facilities, logical security applications such as network access or PC logic 3) Iris scan : The iris has colored streaks and lines that radiate out from the pupil of the eye. The iris provides the most comprehensive biometric data after DNA. The iris has more unique information than this. 4) Hand Geometry :This is one of the first succesful commercial biometric products.a person places their hand on a device and the system takes a picture of the hand using mirrors,then measures digits of the hand and compares to those collected at enrollment.
4 C.. Facial Scan Masked The first and most important step of this project will be to locate a powerful open-source facial recognition program that uses local feature analysis and that is targeted at facial verification. This program should be compliable on multiple systems, including Linux and Windows variants, and should be customizable to the extent of allowing for variations in processing power of the machines onto which it would be deployed. We will then need to familiarize ourselves with the internal workings of the program so that we can learn its strengths and limitations. Simple testing of this program will also need to occur so that we could evaluate its effectiveness. Several sample images will be taken of several individuals to be used as test cases one each for account images, and several each for live images, each of which would vary pose, lighting conditions, and expressions. Once a final program is chosen, we will develop a simple ATM black box program. This program will serve as the theoretical ATM with which the facial recognition software will interact. It will take in a name and password, and then look in a folder for an image that is associated with that name. It will then take in an image from a separate folder of live images and use the facial recognition program to generate a match level between the two. Finally it will use the match level to decide whether or not to allow access, at which point it will terminate. All of this will be necessary, of course, because we will not have access to an actual ATM or its software. Both pieces of software will be compiled and run on a Windows XP and a Linux system. Once they are both functioning properly, they will be tweaked as much as possible to increase performance (decreasing the time spent matching) and to decrease memory footprint. 49 V. PROPOSED WORK Locate a powerful open-source facial recognition program that uses local feature analysis and that is targeted at facial verification. (should be compliable on multiple systems, including Linux and Windows variants, and should be customizable to the extent of allowing for variations in processing power of the machines onto which it would be deployed) then we need to familiarize ourselves with the internal workings of the program so that we can learn its strengths and limitations. Simple testing of this program will also need to occur so that we could evaluate its effectiveness. Once a final program is chosen, we will develop a simple ATM black box program. 1) DATA ACQUISITION: Several sample images will be taken of several individuals to be used as test cases one each for account images, and several each for live images, each of which would vary pose, lighting conditions, and expressions. 2) INPUT : It will take in a name and password, and then look in a folder for an image that is associated with that name. It will then take in an image from a separate folder of live images and use the facial recognition program to generate a match level between the two. 3) FACE IMAGE CLASSIFICATION : Finally it will use the match level to decide whether or not to allow access, at which point it will terminate. Fig-2 Use of DIP in ATM A. DATA ACQUISITION The input can be recorded video of the speaker or a still image. A sample of 1 sec duration consists of a 25 frame video sequence. More than one camera can be used to produce a 3D representation of the face and to protect against the usage of photographs to gain unauthorized access B. INPUT PROCESSING A pre-processing module locates the eye position and takes care of the surrounding lighting condition and colour variance. First the presence of faces or face in a scene must be detected. Once the face is detected, it must be localized and Normalization process
5 VI. 50 may be required to bring the dimensions of the live facial sample in alignment with the one on the template. C. FACE IMAGE CLASSIFICATION The appearance of the face can change considerably during speech and due to facial expressions. In particular the mouth is subjected to fundamental changes but is also very important source for discriminating faces. So an approach to person s recognition is developed based on patiotemporal modeling of features extracted from talking face. Models are trained specific to a person s speech articulate and the way that the person speaks. D. DECISION MAKING Face recognition starts with a picture, attempting to find a person in the image.the face recognition system locates the head and finally the eyes of the individual. A matrix is then developed based on the characteristics of the Individual s face. The method of defining the matrix varies according to the algorithm This matrix is then compared to matrices that are in a database and a similarity score is generated for each comparison RELIABILITY AND ADVANTAGES A. RELIABILITY It requires no physical interaction on behalf of the user. It is accurate and allows for high enrollment and verification rates. It does not require an expert to interpret the comparison result. It can use your existing hardware infrastructure, existing cameras and image capture Devices will work with no problems It is the only biometric that allow you to perform passive identification. B. ADVANTAGES The avantages are as follows- 1) Deliver a practical and workable solution that addresses the requirements of the regulatory authorities. 2) Limit the financial risks given that they were forced to take responsibility for financial loss [rather than being allowed to pass this on to the account-holder] 3) Provide a framework that still allowed for high withdrawal limits to cater for the demands of a cashfocused customer base 4) Take societal responsibility to reduce rising levels of crime that were associated with cash-card transactions 5) Increase customer satisfaction 6) Different charges for transactions given that the transaction takes place in a more secure manner 7) Higher withdrawal and transaction limits 8) Peace of mind given the higher level of security applied to the account VII. CONCLUSION We thus develop an ATM model that is more reliable in providing security by using facial recognition software. By keeping the time elapsed in the verification process to a negligible amount we even try to maintain the efficiency of this ATM system to a greater degree. Biometrics as means of identifying and authenticating account owners at the Automated Teller Machines gives the needed and much anticipated solution to the problem of illegal transactions. In this paper, we have tried to proffer a solution to the much dreaded issue of fraudulent transactions through Automated Teller Machine by biometrics that can be made possible only when the account holder is physically present. Thus, it eliminates cases of illegal transactions at the ATM points without the knowledge of the authentic owner. Using a biometric feature for identification is strong and it is further fortified when another is used at authentication level. VIII. REFERENCES [1] Adeoti, J. (2011). Automated Teller Machine (ATM) frauds in Nigeria: the way out. [2] Adini (2010). Nigerian banks look to biometric ATM machines to reduce fraud. [3] Identifiers for Digital Identity Management [4] Bhargav-Spantzel A., Squicciarini A., Bertino E.Kong X & Zhang W.(2010). Biometrics- Based. [5] Consultative Group for International Agricultural Research, CGIAR (2009). Network user
6 identification and authentication good practice guide. [6] Das, S. & Debbarma, J.(2011). Designing a biometric strategy (fingerprint) measure for enhancing ATM security in India e-banking system. International Journal of Information and Communication Technology Research vol 1 no 5 p [7] Devinaga, R. (2010). ATM risk management and controls. European journal of economic, finance and administrative sciences. ISSN issue 21.. [8] George Webster (2010). Biometric ATM gives cash via facial recognition scan. [9] Heather Crawford (2011). Applying Usable Security Principles to Authentication. [10] Jacobs, B. & Poll, E. (2010) Biometrics and Smart Cards in Identity Management [11] Researchers at MIT, Baback Moghaddam and Alex Pentland, and one a commercial product from Identix called FaceIt [12] PROVIDING Security for ATM s Using Digital Image Processing for Abnormal Incident detection G.Himaja, B.Rambabu, B.Malakonda Reddy [13] Facial Verification Technology for Use In Atm Transactions Aru, Okereke Eze, Ihekweaba Gozie. 51
User Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationSecond Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security
Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationNon-Contact Vein Recognition Biometrics
Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationA Proposal for Security Oversight at Automated Teller Machine System
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationInternational Journal of Advance Research in Engineering, Science & Technology NEW GENERATION ATM WITH FACE AUTHENTICATION
Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 6, Issue 3, March-2019 NEW GENERATION ATM WITH FACE
More informationINTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationTools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)
Tools for Iris Recognition Engines Martin George CEO Smart Sensors Limited (UK) About Smart Sensors Limited Owns and develops Intellectual Property for image recognition, identification and analytics applications
More informationChallenges and Potential Research Areas In Biometrics
Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationDOI: /IJCSC Page 210
Video Based Face Detection and Tracking for Forensic Applications Ritika Lohiya, Pooja Shah Assistant professor at Silver Oak College of engineering and technology, Assistant Professor at Nirma University
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationFace Recognition Based Attendance System with Student Monitoring Using RFID Technology
Face Recognition Based Attendance System with Student Monitoring Using RFID Technology Abhishek N1, Mamatha B R2, Ranjitha M3, Shilpa Bai B4 1,2,3,4 Dept of ECE, SJBIT, Bangalore, Karnataka, India Abstract:
More informationBIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the
More informationNotes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.
Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit
More informationIntellectual Bank Safekeeping System
Intellectual Bank Safekeeping System Joshua Bapu.J Assistant Professor Dr.Sivanthi Aditanar College of Engineering, Tiruchendur, Tamilnadu, India S.R.Aryalekshmi Dr.Sivanthi Aditanar College of Engineering
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationBackground. Computer Vision & Digital Image Processing. Improved Bartlane transmitted image. Example Bartlane transmitted image
Background Computer Vision & Digital Image Processing Introduction to Digital Image Processing Interest comes from two primary backgrounds Improvement of pictorial information for human perception How
More informationFacial Image Recognition Model (The Latest trend)
Facial Image Recognition Model (The Latest trend) Dilawar Govt Girls College, Bhodia Khera: Deptt of Computer Science Fatehabad, Haryana Kuldeep Kumar CDLU, Sirsa: Department of Computer Science Sikander,
More informationUser Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno
CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...
More informationOUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS
1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION
More informationIMAGE PROCESSING PAPER PRESENTATION ON IMAGE PROCESSING
IMAGE PROCESSING PAPER PRESENTATION ON IMAGE PROCESSING PRESENTED BY S PRADEEP K SUNIL KUMAR III BTECH-II SEM, III BTECH-II SEM, C.S.E. C.S.E. pradeep585singana@gmail.com sunilkumar5b9@gmail.com CONTACT:
More informationImproved Human Identification using Finger Vein Images
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationBiometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh
Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division
More informationUNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT
UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information
More informationA Novel Approach For Recognition Of Human Face Automatically Using Neural Network Method
Volume 2, Issue 1, January 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A Novel Approach For Recognition
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationStudent Attendance Monitoring System Via Face Detection and Recognition System
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationA Novel Approach for Human Identification Finger Vein Images
39 A Novel Approach for Human Identification Finger Vein Images 1 Vandana Gajare 2 S. V. Patil 1,2 J.T. Mahajan College of Engineering Faizpur (Maharashtra) Abstract - Finger vein is a unique physiological
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationAuthenticated Automated Teller Machine Using Raspberry Pi
Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationAUTOMATIC SPEECH RECOGNITION FOR NUMERIC DIGITS USING TIME NORMALIZATION AND ENERGY ENVELOPES
AUTOMATIC SPEECH RECOGNITION FOR NUMERIC DIGITS USING TIME NORMALIZATION AND ENERGY ENVELOPES N. Sunil 1, K. Sahithya Reddy 2, U.N.D.L.mounika 3 1 ECE, Gurunanak Institute of Technology, (India) 2 ECE,
More informationThe total manufacturing cost is estimated to be around INR. 12
Intelligent Integrated Home Security System Using Raspberry Pi Pallavi Mitra Department of Electronics and Communication Engineering,National Institute of Technology,Durgapur E-mail: pallavi08091992@gmail.com
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK USE OF AUTOMOTIVE SECURITY SYSTEM IN REAL TIME DECLINE OF CAR THEFT MR. R. A. MUKKAWAR,
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationModern Biometric Technologies: Technical Issues and Research Opportunities
Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric
More informationIntelligent Identification System Research
2016 International Conference on Manufacturing Construction and Energy Engineering (MCEE) ISBN: 978-1-60595-374-8 Intelligent Identification System Research Zi-Min Wang and Bai-Qing He Abstract: From the
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationA Study for Choosing The Best Pixel Surveying Method by Using Pixel Decision Structures in Satellite Images
A Study for Choosing The est Pixel Surveying Method by Using Pixel Decision Structures in Satellite Images Seyyed Emad MUSAVI and Amir AUHAMZEH Key words: pixel processing, pixel surveying, image processing,
More informationFACE RECOGNITION BY PIXEL INTENSITY
FACE RECOGNITION BY PIXEL INTENSITY Preksha jain & Rishi gupta Computer Science & Engg. Semester-7 th All Saints College Of Technology, Gandhinagar Bhopal. Email Id-Priky0889@yahoo.com Abstract Face Recognition
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationStudy and Analysis on Biometrics and Face Recognition Methods
37 Study and Analysis on Biometrics and Face Recognition Methods Anjani Kumar Singha Department of Computer Science and Engineering Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand Anshu Singla Department
More informationABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA
ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,
More informationEC-433 Digital Image Processing
EC-433 Digital Image Processing Lecture 2 Digital Image Fundamentals Dr. Arslan Shaukat 1 Fundamental Steps in DIP Image Acquisition An image is captured by a sensor (such as a monochrome or color TV camera)
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More informationChen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.
-2009 2009-12-1515 Face Recognition (Wen-Shiung Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室 wschen@ncnu.edu.tw 1 OUTLINE Introduction Biometric Recognition
More informationISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique
TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...
More informationABSTRACT I. INTRODUCTION II. LITERATURE SURVEY
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 3 ISSN : 2456-3307 IRIS Biometric Recognition for Person Identification
More informationImage to Sound Conversion
Volume 1, Issue 6, November 2013 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com Image to Sound Conversion Jaiprakash
More informationFingerprinting. Forensic Science
Fingerprinting Forensic Science Even with the recent advancements made in the field of DNA analysis, the science of fingerprinting, dactylography,, is still commonly used as a form of identification, whether
More informationBiometrics redefining the phrase 'don't shoot until you see the whites of their eyes'
Army Technology Market & Customer Insight Log In Request Demo About Market & Customer Insight Biometrics redefining the phrase 'don't shoot until you see the whites of their eyes' 11 January 2012 Dr Gareth
More informationNational Policing Improvement Agency. National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality
National Policing Improvement Agency Meeting the challenges of 21 st century crime and criminality Michael Hallowes Detective Chief Superintendent Head of Strategic Operations National Policing Improvement
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationIMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE
IMPORTANT: PLEASE DO NOT USE THIS DOCUMENT WITHOUT READING THIS PAGE This document is designed to be a template for a document you can provide to your employees who will be using TimeIPS in your business
More informationCHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP
7 October 2016 Australian Securities Exchange Limited Sydney CHARTER PACIFIC SIGNS SHARE PURCHASE AGREEMENT TO ACQUIRE 100% OF THE MICROLATCH GROUP The Directors of Charter Pacific Corporation Limited
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationDevelopment and Integration of Artificial Intelligence Technologies for Innovation Acceleration
Development and Integration of Artificial Intelligence Technologies for Innovation Acceleration Research Supervisor: Minoru Etoh (Professor, Open and Transdisciplinary Research Initiatives, Osaka University)
More informationFACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES
International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper FACE VERIFICATION SYSTEM
More informationRise of Robotics. According to the National Information Systems Security Glossary, information security is
Harris1 Demonte Harris Dr. Philip Lunsford ICTN4040 04/11/16 Rise of Robotics Security, a key aspect of assuring that important things are kept safe, is evolving daily. According to the National Information
More informationIdentity Management and its impact on the Digital Economy
Identity Management and its impact on the Digital Economy Alejandro Barros 1, Alejandro Pareja 2 October 2016 Contents Introduction... 2 Identity Management... 3 Enrolment in the National Identity System...
More informationAlternative Face Recognition Using Neural Network
International Journal of Computer (IJC) ISSN 2307-4523 (Print & Online) Global Society of Scientific Research and Researchers http://ijcjournal.org/ Alternative Face Recognition Using Neural Network Mr.
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationSecurity System Using Biometric Technology: Design and Implementation of Voice Recognition System (VRS)
Proceedings of the International Conference on Computer and Communication Engineering 2008 May 13-15, 2008 Kuala Lumpur, Malaysia Security System Using Biometric Technology: Design and Implementation of
More informationA Driver Assaulting Event Detection Using Intel Real-Sense Camera
, pp.285-294 http//dx.doi.org/10.14257/ijca.2017.10.2.23 A Driver Assaulting Event Detection Using Intel Real-Sense Camera Jae-Gon Yoo 1, Dong-Kyun Kim 2, Seung Joo Choi 3, Handong Lee 4 and Jong-Bae Kim
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationNew Export Requirements for Emerging and Foundational Technologies
NEWS New Export Requirements for Emerging and Foundational Technologies 12.09.2018 The U.S. is adopting a major change in the export control laws. Under the recently enacted Export Control Reform Act of
More information3D Face Recognition in Biometrics
3D Face Recognition in Biometrics CHAO LI, ARMANDO BARRETO Electrical & Computer Engineering Department Florida International University 10555 West Flagler ST. EAS 3970 33174 USA {cli007, barretoa}@fiu.edu
More informationThe 2019 Biometric Technology Rally
DHS SCIENCE AND TECHNOLOGY The 2019 Biometric Technology Rally Kickoff Webinar, November 5, 2018 Arun Vemury -- DHS S&T Jake Hasselgren, John Howard, and Yevgeniy Sirotin -- The Maryland Test Facility
More informationInternational Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)
Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.
More informationRECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA
Bulletin of the Transilvania University of Braşov Series VII: Social Sciences Law Vol. 7 (56) No. 1-2014 RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA I. ARON 1 A. CTIN. MANEA
More informationBiometrics Acceptance - Perceptions of Use of Biometrics
Association for Information Systems AIS Electronic Library (AISeL) ACIS 2004 Proceedings Australasian (ACIS) December 2004 Biometrics Acceptance - Perceptions of Use of Biometrics Angela Chau University
More informationChapter 2: Digital Image Fundamentals. Digital image processing is based on. Mathematical and probabilistic models Human intuition and analysis
Chapter 2: Digital Image Fundamentals Digital image processing is based on Mathematical and probabilistic models Human intuition and analysis 2.1 Visual Perception How images are formed in the eye? Eye
More informationMake Your Local Government A Lean, Green, Constituent-Centric Machine
Make Your Local Government A Lean, Green, Constituent-Centric Machine Best Practices for Local Government Entities WEBINAR SUMMARY Make Your Local Government A Lean, Green, Constituent-Centric Machine
More informationTECHNICAL DOCUMENTATION
TECHNICAL DOCUMENTATION NEED HELP? Call us on +44 (0) 121 231 3215 TABLE OF CONTENTS Document Control and Authority...3 Introduction...4 Camera Image Creation Pipeline...5 Photo Metadata...6 Sensor Identification
More informationBiometrics in a Glimpse
Biometrics in a Glimpse Shireen Y. Elhabian and Aly A. Farag Computer Vision and Image Processing Laboratory Department of Electrical and Computer Engineering University of Louisville Louisville, Kentucky
More informationFace Recognition User Manual
Face Recognition User Manual Page 1 of 29 Face Recognition User Manual I-CUBE (Integrated, Intelligent, Imaging) Document Configuration Document Name: Face Recognition User Manual Document Number: I-Cube-001.doc
More informationFSI Machine Vision Training Programs
FSI Machine Vision Training Programs Table of Contents Introduction to Machine Vision (Course # MVC-101) Machine Vision and NeuroCheck overview (Seminar # MVC-102) Machine Vision, EyeVision and EyeSpector
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationFingerprint Analysis. Bud & Patti Bertino
Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints
More informationSTUDY NOTES UNIT I IMAGE PERCEPTION AND SAMPLING. Elements of Digital Image Processing Systems. Elements of Visual Perception structure of human eye
DIGITAL IMAGE PROCESSING STUDY NOTES UNIT I IMAGE PERCEPTION AND SAMPLING Elements of Digital Image Processing Systems Elements of Visual Perception structure of human eye light, luminance, brightness
More informationISSN: Page 511. International Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 2, Mar Apr 2017
RESEARCH ARTICLE OPEN ACCESS Ensuring Multitier ATM with AADHAAR Details by Using Bioinformatics V.Ajantha Devi [1], R.Archana [2] Assistant professor, Research Scholar Department of Computer Science Sri
More informationOBJECTIVE OF THE BOOK ORGANIZATION OF THE BOOK
xv Preface Advancement in technology leads to wide spread use of mounting cameras to capture video imagery. Such surveillance cameras are predominant in commercial institutions through recording the cameras
More informationSST Expert Testimony Common Questions and Answers
SST Expert Testimony Common Questions and Answers This document is a collection of questions that have commonly been asked about the ShotSpotter system during court testimony and deposition. If possible,
More information3 I, Kent Gibson, state the following, of which I have personal knowledge:
1 Regarding an antique Tintype Photograph Thought to contain the image of JESSE JAMES. FORENSIC DECLARATION of Photographic Authenticity Via Face Recognition 2 Analysis requested by: Justin Whiting DECLARATION
More informationFace Recognition: Identifying Facial Expressions Using Back Propagation
Face Recognition: Identifying Facial Expressions Using Back Propagation Manisha Agrawal 1, Tarun Goyal 2 and Harvendra Kumar 3 1 B.Tech CSE Final Year Student, SLSET, Kichha, Distt: U. S, Nagar, Uttarakhand,
More informationFacial Recognition application in computer system
Faculty of Information Technology Department of Computer Science Second Semester Project Progress Report 2013/2014 Facial Recognition application in computer system Birzeit University Prepared by: Karima
More informationDORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM
DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and
More informationMy fingers are all mine: Five reasons why using biometrics may not be a good idea
My fingers are all mine: Five reasons why using biometrics may not be a good idea Siraj A. Shaikh 1, Christos K. Dimitriadis 2 1 Department of Information Systems, Cranfield University, Defence Academy,
More information