Full Project – Design and implementation of an iris based ATM system

Full Project – Design and implementation of an iris based ATM system

Click here to Get this Complete Project Chapter 1-5

CHAPTER ONE

INTRODUCTION

1.1     INTRODUCTION

The advent of the Automated teller Machines (ATM) came through with promising features of eliminating the problems in the banking hall especially in queue congestions. ATMs are convenient, allowing consumers to perform quick self-service transactions such as deposits, cash withdrawals, bill payments, and transfers between accounts. Fees are commonly charged for cash withdrawals by the bank where the account is located, by the operator of the ATM, or by both.

Prabhakar et al. (2013) stated that one of these technological advancements in the banking industry is the introduction of Automated Teller Machine (ATM). For many bank customers, ATM has made it possible for them to withdraw cash, deposit cash and transfer funds at their convenience without having to perform such transactions through interactions with the bank staff in the banking halls. The introduction of ATM has brought about considerable improvement in efficiency and business processes in the banking sector, but with its attendant negative consequences occasioned by its use in the perpetration of fraudulent activities by fraudsters.

Unfortunately, things are not always as they seem at the ATM. Several fraudulent means have been identified as the possible ways or methods of perpetrating ATM frauds in the banking industry in Nigeria and these include but not limited to shoulder surfing, phishing and stolen ATM cards. Most ATM scams involve criminal theft of debit card numbers and personal identification numbers (PINs) from the innocent users of these machines. There are several variations of this confidence scheme, but all involve the unknowing cooperation of the cardholders themselves. In the nearest future, ATM will have biometric authentication techniques to verify the owner of ATM card at the time of transaction. Biometrics technologies use biological information like iris prints, facial features, and vocal patterns, and so on to identify people (Lawson, 2018).

Okechukwu et al. (2012), asserted that there are a number of Nigerian laws and regulations that contain provisions designed to curtail cases of ATM fraud in Nigeria. These fraudsters who brazenly engaged in the perpetration of ATM fraud can be held liable under any of these laws. Sometimes, most cases relating to ATM fraud are cases instituted against the banks by their customers alleging the banks’ complicity in the fraud. Since, it is always difficult to establish a case of fraud against the bank, the claimants in such cases often rely on alleged act of negligence on the part of the banks for failing to take necessary measures or steps to prevent the occurrence of such fraud. Some accuse the bank staff of colluding with third parties to perpetrate the fraudulent acts.

According to Esan and Ngwira (2013), a modern ATM is typically made up of the devices like CPU to control the user interface and devices related to transaction, Magnetic or Chip card reader to identify the customer, PIN Pad, Secure crypto-processor generally within a secure cover, Display to be used by the customer for performing the transaction, Function key buttons, Record Printer to provide the customer with a record of their transaction, to store the parts of the machinery requiring restricted access -Vault , Sensors and Indicators, fingerprint technology  scanner and even retina scanner.

Biometrics technologies use biological information like iris prints, facial features, and vocal patterns, and so on to identify people. Biometrics is best defined as measurable physiological and/or behavioral characteristics that can be utilized to verify the identity of an individual. They include fingerprints, iris, retinal and its scanning, hand geometry, voice patterns, facial recognition and other techniques. They are of interest in any area where it is important to verify the true identity of an individuals. Initially, these techniques were employed primarily in specialist high security application, however we are now seeing their use and proposed use in a much broader range of public facing situation.

Jobling and Gill (2014) noted that while the spotlight is shining bright on online fraud and security, community banks know that ATMs are still a prime target for criminals looking to score quick cash. And, with more than 425,000 ATMs currently in use across the country, there are a lot of ready targets for them to hit. In March, credit scoring company FICO reported that the number of debit cards compromised at ATMs and merchant devices in the U.S. rose 10 percent in 2017 over the previous year. In 2016, ATM fraud jumped a full 70 percent over 2015, according to FICO.

Biometrics (or biometric authentication) consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. In computer science, in particular, biometrics is used to identify access management and access control. It is also used to identify individuals in groups that are under surveillance.

According to Flynn (2005), biometrics recognition, or biometrics, refer to the automatic identification of a person based on his/her anatomical (e.g, fingerprint, iris) or behavioral (e.g, signature) characteristics or traits. This method of identification offers several advantages over traditional methods involving ID cards (tokens) or PIN numbers (passwords) for various reasons: (i) the person to be identified is required to be physically present at the point-of-identification; (ii) identification based on biometric techniques obviates the need to remember a password or carry a token.

1.2     BACKGROUND OF STUDY

According to Das and Jhunu, (2011) biometric history indicates that the science did not originate at a single place. People all over the world were using the basics for mainly identifying individuals from each other. The history of biometrics dates back to a long time. Possibly the most primary known instance of biometrics in practice was a form of finger printing being used in china in the 14th century as reported by explorer Joao de Barros. Barros wrote that the Chinese merchants were stamping children’s palm prints and footprints on paper with ink so as to differentiate the young children from one another. This is one of the most primitives known cases of biometrics in use and is still being used today.

People have long recognized that some personal traits are distinct to each individuals and have long identified other people on the basis of their physical characteristics. Such recognition is not limited to faces. For example, friends or relatives talking on the telephone recognize one another’s voices. Scientists know for from a number of archaeological artifacts that ancient civilizations, such as those of Babylonia and China, recognized the individuality of fingerprint impressions. Even today, in countries such as India, where a large segment of the population is illiterate and cannot sign their names, thumbprint impression is considered a legal signature.

In 1882, Alphonse Bertillon, chief of the criminal identification division of the police department in Paris, France, developed a detailed method of identification based on certain bodily measurements, physical descriptions, and photographs. The Bertillon System of Anthropometric Identification gained wide acceptance before fingerprint identification superseded it. Biometric characteristics such as signatures, fingerprints, and DNA samples have legal status throughout the world. In most countries these characteristics can be used as evidence in a court of law to establish proof of identity. Researchers have developed elaborate systems of rules, based on indexing characteristics, for the appropriate use of this biometrics in establishing identity. These rules are used to help decide whether a pair of biometric measurements belongs to the same person and for determining whether a pair of biometric measurements belongs to the same person and for determining whether a particular person is already included in a biometric database (Stewart, 2010).

The cost of implementation is the single most important factor in the widespread adoption of biometrics. Some biometrics sensors, such as microphones for speech input, are already inexpensive. Other types of sensors, such as digital cameras for facial imaging, are becoming more common. Still others, such as fingerprint sensors, remain extremely expensive. The cost of storing biometric templates and of the computing power required to process and match biometric measurements continues to decrease with advances in technology. Another factor that could affect the adoption of biometrics is the negative perception of biometrics as related to privacy. If that negative perception diminishes sufficiently, the public may accept biometrics as an effective means of privacy protection and as a means of protection from fraud.

According to Hong (2008), the concept of biometrics probably began with the human use of facial features to identify other people. Modern biometrics, however, started in the 1880s when Alphonse Bertillon, chief of the criminal identification, division of the police department in Paris, France, developed a method of identification based on a number of bodily measurements. One of the most well-known biometric characteristics is the fingerprint. British scientist Sir Francis Galton proposed the use of fingerprints for identification purposes in the late 19th century. He wrote a detailed study of fingerprints in which he presented a new classification system using prints of all ten figures, which is the basis of identification systems still in use. British Police Official Sir Richard Edward Henry introduced fingerprinting in the 1890s as a means of identifying criminals. Automatic fingerprint-based identifications systems have been commercially available since the early 1960s. Until the 1990s these systems were used primarily by the police and in certain security applications.

Biometrics technologies measure a particular set of a person’s vital statistics in order to determine identity. In the most contemporary computer science applications, the term “life measurements” adapts a slightly different role.

Biometrics in the high technology sector refers to a particular class of identification technologies. These technologies use an individual’s unique biological traits to determine one’s identity (Mccoy and Rick 2006).

While biometric systems, particularly automatic fingerprint identification systems (AFIS), has been widely used in forensics for criminal identification, progress in biometric sensors and matching algorithms have led to the deployment of biometric authentication in a large number of civilian and government applications. Biometrics is being used for physical access control, computer log-in, welfare disbursement, international border crossing and national ID cards. It can be used to verify a customer during transactions conducted via telephone and Internet (electronics commerce and electronic banking). In automobiles, biometrics is being adopted to replace keys for keyless entry and keyless ignition. Due to increased security threats, the ICAO (International Civil Aviation Organization) has approved the use of e-passports (passports with an embedded chip containing the holder’s facial image and other traits), Hong (2008).

As the industry grows however, so does the public concern over privacy issues. Laws and regulations continue to be drafted and standards are beginning to be developed. While no other biometric has yet reached the breadth of use of iris some are beginning to be used legal and business areas.

1.3     STATEMENT OF PROBLEM

Over the years, customers have been mostly looking on trusting the services of the ATM Machine while attempting to meet their banking needs. Using an ATM, customers will access their bank accounts so as to create money withdrawals, debit card cash advances, and check their account balances further. Despite the many benefits of ATM system, ATM fraud has recently become a lot of widespread. Fraud technique like card theft, shoulders surfing (spying of transaction pin and Card CVC and number etc. has been on the trend recently especially with the advent of the widespread activities of youth involvement in internet fraudsters (yahoo-yahoo). So as to extend the amount of security in ATM system, use of biometric technique helps for easy verification and thus it is against this backdrop that this study was carried out on seeking security measures for the ATM operation.

1.4     AIM AND OBJECTIVES

The main aim of this project is to provide iris biometry as authorized identity in banking operation and to propose a more secure ATM system.

The objectives of this study are stated as follow:

  • To provide an authentication system on ATM operation for withdrawal after the entry of a correct pin.
  • To provide second level authentication system in a scenario where customer specified withdrawal limit.
  • To provide authentication and verification process on the existing ATM machine to make a successful and secure transaction.
  • To aid the attempts of curbing skimming activities in the ATM
  • To design a more secured transaction process for financial institutions

1.5     SCOPE OF STUDY

This study covers the investigation on potential long lasting solution to ATM fraudulent activity problems in Nigeria using the Iris biometric technology.

1.6     SIGNIFICANCE OF THE STUDY

The significance of this study will be important to banks, security agencies and researchers because the system provides an advanced security system in the functioning of the ATM transactions and thus the issues of stolen or hacked debit card will be drastically reduced

1.6     LIMITATION OF THE STUDY

There was no enough time allocated for the careful execution of the project as well as unavailability of an Automated Teller Machine (ATM) and Iris scanner to practically test the implementation of the designed system.

1.7    DEFINITION OF TERMS

Computer: This is a machine that performs tasks, such as calculations or electronic communication, under the control of a set of instructions called a program.

Database: This is any collection of data organized for storage in a computer memory and designed for easy access by authorized users.

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

 

Full Project – Design and implementation of an iris based ATM system