Advance Security System for ATM

Published on April 2017 | Categories: Documents | Downloads: 31 | Comments: 0 | Views: 357
of 4
Download PDF   Embed   Report

Comments

Content

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
Volume 4, Issue 4, April 2015

Advance Security System for ATM
Aman Kumar
Department of Computer science & engineering
Galgotias College of Engineering & Technology Greater Noida (U.P)

Abstract- In present time ATM (Automatic Teller
Machine) robbery is the common thing, because we have
not strong security and rule or regulation to withdrawl
the cash from ATM with help of ATM card. We
generate many problem during robbery of ATM like
police not reach in correct time , no information or no
alert, weak wall of ATM room and so own . In this
paper I have provide the solution of robbery of ATM to
used various technology, rules and regulation. This is
common weakness in ATM security facility, remove this
problem we used following technology to improve
security system .This technology work in main three
steps or phases, in first phase user need to swap the
ATM and used palm for scanning after successfully
swap machine will generate voice you can enter for 2nd
phase and palm will save in that transaction database.
When you go for 2nd phase then need to scan the retina
and then go for phase 3rd. there will final ATM. In
performing the transaction gate will closed. The wall of
phases will of strong fiber that can not cut by any Gas.
When he wants to come out then need to press a button
that button connected through gate then gate will open.
The final phase has Gas that can power for
unconscious.And all CCTV cameras monitored by near
police station. When any thief does robbery in ATM
then alarm generate in police station and Gas will leak in
near ATM. Then in this situation all information like,
robbery time, date, CCTV data, voice data will stored in
server. The server monitored by state level.
This paper shows only how three phases will work and
generate alarm in near police station & send police in
robbery situations.
Keywords- Biometric System, Security System
Architecture, Retina & Palm Scanner, Automatic Alarm
Generation, Software Architecture.

1. INTRIODUCTION
The ATM robbery is the common problem. This
technology has solution to remove it in sequential
manner. In present time we have thousands number of
robbery attacks. It is detail which is registered, if we
calculate then it will much then imagination.

Figure1. ATM robbery in per year.
This technology is responsible to call for police in
robbery situation and try to catch the thief using some
unconscious by using Gas. It works with many
technologies, but basically it has three phases for
operating procedure. This system contains in a single
room but we divide three phase or boundaries between
ATM working procedures. The first phase contains
verification of user and valid ATM pin, account number.
When user do swap of ATM card then he give response
for valid ATM card else he generate message this card in
invalid. If you used card more than three times then
system do not response, or system layer will close it will
open when you will press button new card.
After successfully of first phase you go in second phase,
it used the palm and retina scanner after scan the door
will open. If he is new user then save in data base if he is
old user then match profile in data base if user is
successfully match then open gate for third phase, You
have to take a photo with help of face recognizer than go
in finally ATM machine, please insert your ATM pin
perform transaction and come out with press a button
that located near 3rd phase.The boundary walls of ATM
will strong metal that can not cut by help of any gas.
And when thief broke any part of ATM then alarm
generate. And send all information near police station.
The police station will connect through GPS.

2. BIOMETRIC SYSTEM
The biometric system has responsibility to measure the
psychological and behavioral characteristics of human.

www.ijsret.org

426

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
Volume 4, Issue 4, April 2015

We used two type of biometric system in this
technology, first is retina scanner and palm scanner.

Figure.3 Architecture of Security system

Figure 2. Biometric system classification
The biometric system data collected on main server it
also give facility to match input in valid state. When
user will give input as eyes then sensor scan eye and
match from existing database if old user then match
confirm else store new identity of that user. In case of
palm scanning user need to put your palm in system after
putting the pal it will scan the palm with help of sensor
that send the data in main user.

3. SECURITY SYSTEM ARCHITECTURE
The total structure of security system will dependent on
various technology and many approach. All steps will
connect with phase by phase, the overall structure of
security system will make in a complete room.
The room will divide into three phases and each phase
has the some operating part.Three phases will pack by
strong metal that can not cut by any type of Gas. In both
phase the faint (unconscious) Gas will present.
It connection will attached from breaking any module of
ATM then faint gas will open.
Suppose that thief want to lose Gas without faint of any
person then he break any part of ATM security then
remove this type of situations then Gas will leak when
number of any object will present in ATM inside
portion.
If two peoples want to go inside the ATM than only two
can go, the second people follow same instruction or
procedure. The connection of CCTV pack in strong
metal can that have sensor that can measure any
brokenness in CCTV then alarm will generate. You can
see overall structure of security system in following
diagram.

Figure .4 Block diagram of security system
The architecture of the security system has some steps
like.
3.1 ATM card detector
3.2 Architecture of Retina and palm scanner
3.3 Face recognizer
3.4 Automatic Faint gas leakage system
3.5 Automatic pressure detector sensor during robbery
3.6 Architecture of wall and CCTV
3.7 Alarm generation process
3.8 Information storage and data base architecture
3.1 ATM card detector
This is the starting process when user wants to use the
ATM. and he wants to go in 2nd phase then need to swap
his ATM card in device.
If card is valid then first gate will automatic open, else
card is not valid then give response that your card is
invalid please contact your related branch.
If any thief wants to go inside without ATM and break
anything related to security system then alarm will
generate.

www.ijsret.org

427

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
Volume 4, Issue 4, April 2015

and marks which can be used when comparing one palm
to another.

Figure 4. Flow chart of ATM card detector
Figure.6 palm scanning process
3.2 Architecture of Retina & Palm scanner
A retina scan is a biometric technique that uses the
unique patterns on a person's retina blood vessels. It is
not to be confused with another ocular-based
technology, iris recognition, commonly called an "iris
scanner."The human retina is a thin tissue composed
of neural cells that is located in the posterior portion of
the eye. Because of the complex structure of
the capillaries that supply the retina with blood, each
person's retina is unique. The network of blood
vessels in the retina is not entirely genetically
determined and thus even identical twins do not share a
similar pattern.A retinal scan is performed by casting an
unperceived beam of low-energy infrared light into a
person’s eye as they look through the scanner's eyepiece.
This beam of light traces a standardized path on the
retina. Because retinal blood vessels absorb light more
readily than the surrounding tissue, the amount of
reflection varies during the scan. The pattern of
variations is digitized and stored in a database.

3.3 Face Recognizer
A facial recognition system is a computer application for
automatically identifying or Verifying a person froma di
gital image or a video frame from a video source.
One of the ways to do this is by comparing
selected facial features from the image and a
facial database.It is typically used in security
systems and can be compared to other biometrics such
as fingerprint or eye iris recognition systems.
3.4 Automatic Faint Gas leakage system
This system will work when the any authorization
process will detect or pressure detector detects more
pressure in wall. The gas leakage system will set up in
each phases, when any person will try to access the
authentication to without permission than faint gas will
leakage. The wall have pressure detector. All sensors
will connect through a circuit, and circuit has
responsibility to send message through wireless
communication protocol.
3.5 Automatic Pressure detector during robbery
The pressure detector is the type of sensor that will have
responsibility to detect the object or feel object to any
pressure of objects. This will activate when any
unauthorized person want to access the ATM. This
sensor will operate with some power supply and when
any person will break or destroy all parts to relate the
ATM then alarm will generate.

Figure.5 Retina Scanning.
A palm print refers to an image acquired of the palm
region of the hand. It can be either an online image (i.e.
taken by a scanner or CCD) or offline image where the
image is taken with ink and paper.The palm itself
consists of principal lines, wrinkles (secondary lines),
and epidermal ridges. It differs to a fingerprint in that it
also contains other information such as texture, indents

3.6 Architecture of wall and CCTV
The architecture of wall has better responsibility to
maintain the robbery problem by any unauthorized
person. The wall will make in any strong metal that will
not cut by any gas. And each phase has one CCTV and
all CCTV will connect in particular base station. Any

www.ijsret.org

428

International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882
Volume 4, Issue 4, April 2015

emergency situations authorized person can see all detail
through CCTV data base.
3.7 alarm Generation process
The process of alarm generation will occur when
pressure detector sensor will activate, and send signal in
near police station. The police station has software that
will install in each police station. This software will
connect through GPS and GPS send signal to search near
police station. It has many modules like user can search
or see the alarm generation detail, time, date, location
and other things.
3.8 Information storage and data base architecture
The all information related to the ATM robbery will
store in central server. The server can manage by any
software company. The all information will stored in
form of row and column, and information can access
through used the SQL query command. The near police
station will connect through internet and all data will
stored in server through online procedure.

1.

2.

3.

4.

5.

4. LIMITATIONS
There are some limitations of the security system of
ATM
1. When any situations the internet lost then we
can not send the message.
2. This used different system like retina, palm, face
recognizer then it is costly.
3. The internet connection can be destroyed by
storm, airthquicks, and flood problem.
4. The maintenance of this system is complex.
5. Suppose any person is bother to police station
then he can tease with any part of security
system.

6.

7.

5. FUTURE WORK
The security system of ATM safety has very techniques
to maintain the robbery problem. In future thesecurity
system will advance. We can enhance the security
system to safety of ATM by robbery problem. We have
strong internet communication in future and solution all
problem regarding the folds, airthquicks and others.
In future we will enhance the weakness of retina scan,
palm scanner and others. The main things are that police
must become more faithful for people security. And
follow the rule and regulations related to this system to
improve security of this approach.

REFERENCES

www.ijsret.org

8.

9.

S.S, Das and J. Debbarma, “Designing a
Biometric Strategy (Fingerprint) Measure for
Enhancing ATM Security in Indian e-banking
System”, International Journal of Information
and Communication Technology Research,
vol.1, no. , pp.197-203, 2011.
N.K. Ratha, S. Chikkerur, J.H. Connell and
R.M.
Bolle.
“Generating
Cancelable
Fingerprint Templates”, IEEE Transaction on
Pattern Analysis and Machine Intelligence, vol.
29, no. 4, 2007.
“Credit Card Fraud Detection Using Hidden
Markov Model” Abhinav Shrivastava, Amlan
Kundu, Shamik Sural, Senior Member, IEEE,
and Arun K. Majumdar, Senior Member, IEEE
Transactions, VOL 5, No. 1, Jan-Mar 2008.
“Statistics for General and On-Line Card
Fraud,”
http://www.
epaynews.com/statistics/fraud.html.
Jain, A.K.; Ross, A.; Prabhakar, S., "An
introduction to biometric recognition," Circuits
and Systems for Video Technology, IEEE
Transactions on, Vol. 14, no. 1, pp. 4,20, Jan.
2004 doi: 10.1109/TCSVT.2003.818349.
Mr. John Mashurano1, Mr. Wang liqiang2,
“ATM Systems Authentication Based On
Fingerprint
Using
ARM
Cortex-M3”
International Journal of Engineering Research &
Technology (IJERT) Vol. 2 Issue 3, March 2013 ISSN: 2278-0181 1 www.ijert.org
IJERTIJERT.
Lasisi, H.; Ajisafe, A.A., "Development of stripe
biometric based fingerprint authentications
systems in Automated Teller Machines,"
Advances in Computational Tools for
Engineering Applications (ACTEA), 2012 2nd
International Conference on , vol., no.,
pp.172,175,
12-15
Dec.
2012
doi:
10.1109/ICTEA.2012.6462860.
Al-Najjar, Y.; Sheta, A., "Minutiae extraction
for fingerprint recognition," Systems, Signals
and Devices, 2008. IEEE SSD 2008. 5th
International Multi-Conference on, vol., no.,
pp.1,
5,
20-22
July
2008
doi:
10.1109/ssd.2008.4632892.
Patiyoot, D.; Shepherd, S.J., “Security issues for
wireless ATM network,” Universal Personal
Communications, 1998. ICUP’98. IEEE 1998
International Conference on, vol.2, no., 5-9 Oct
1998 doi: 10.1109/ICUPC.1998.733713.

429

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close