You are on page 1of 24

CHAPTER 1 INTRODUCTION

The rise of technology in India has brought into force many types of equipment that aim at more customer satisfaction. ATM is one such machine which made money transactions easy for customers to bank. The other side of this improvement is the enhancement of the culprits probability to get his unauthentic share. Traditionally, security is handled by requiring the combination of a physical access card and a PIN or other password in order to access a customers account. This model invites fraudulent attempts through stolen cards, badly-chosen or automatically assigned PINs, cards with little or no encryption schemes, employees with access to non-encrypted customer account information and other points of failure. This model proposes an automatic teller machine security model that would combine a physical access card, a PIN, and electronic facial recognition. By forcing the ATM to match a live image of a customers face with an image stored in a bank database that is associated with the account number, the damage to be caused by stolen cards and PINs is effectively neutralized. Only when the PIN matches the account and the live image and stored image match would a user be considered fully verified. The main issues faced in developing such a model are keeping the time elapsed in the verification process to a negligible amount, allowing for an appropriate level of variation in a customers face when compared to the database image, and that credit cards which can be used at ATMs to withdraw funds are generally issued by institutions that do not have in-person contact with the customer, and hence no opportunity to acquire a photo. Because the system would only attempt to match two (and later, a few) discrete images, searching through a large database of possible matching candidates would be unnecessary. The process would effectively become an exercise in pattern matching, which would not require a great deal of time. With appropriate lighting and robust learning software, slight variations could be accounted for in most cases. Further, a positive visual match would cause the live image to be stored in the

database so that future transactions would have a broader base from which to compare if the original account image fails to provide a match thereby decreasing false negatives. When a match is made with the PIN but not the images, the bank could limit transactions in a manner agreed upon by the customer when the account was opened, and could store the image of the user for later examination by bank officials. In regards to bank employees gaining access to customer PINs for use in fraudulent transactions, this system would likewise reduce that threat to exposure to the low limit imposed by the bank and agreed to by the customer on visually unverifiable transactions. In the case of credit card use at ATMs, such a verification system would not currently be feasible without creating an overhaul for the entire credit card issuing industry, but it is possible that positive results (read: significant fraud reduction) achieved by this system might motivate such an overhaul. The last consideration is that consumers may be wary of the privacy concerns raised by maintaining images of customers in a bank database, encrypted or otherwise, due to possible hacking attempts or employee misuse. However, one could argue that having the image compromised by a third party would have far less dire consequences than the account information itself. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is no broad leap to realize that banks already build an archive of their customer images, even if they are not necessarily grouped with account information.

1.1 LITERATURE REVIEW


For most of the past ten years, the majority of ATMs used worldwide ran under IBMs now-defunct OS/2. However, IBM hasnt issued a major update to the operating system in over six years. Movement in the banking world is now going in two directions: Windows and Linux. NCR, a leading world-wide ATM manufacturer, recently announced an agreement to use Windows XP Embedded in its next generation of personalized ATMs (crmdaily.com.) Windows XP Embedded allows OEMs to pick and choose from the thousands of components that make up Windows XP Professional, including integrated multimedia, networking and database management functionality. This makes the use of off-the-shelf facial recognition code
2

more desirable because it could easily be compiled for the Windows XP environment and the networking and database tools will already be in place. For less powerful ATMs, KAL, a software development company based in Scotland, provides Kalignite CE, which is a modification of the Windows CE platform. This allows developers that target older machines to more easily develop complex user-interaction systems . Many financial institutions are relying on a third choice, Windows NT, because of its stability and maturity as a platform. On an alternative front, the largest bank in the south of Brazil, Banrisul, has installed a custom version of Linux in its set of two thousand ATMs, replacing legacy MS-DOS systems. The ATMs send database requests to bank servers which do the bulk of transaction processing (linux.org.) This model would also work well for the proposed system if the ATMs processors were not powerful enough to quickly perform the facial recognition algorithms. In terms of the improvement of security standards, MasterCard is spearheading an effort to heighten the encryption used at ATMs. For the past few decades, many machines have used the Data Encryption Standard developed by IBM in the mid 1970s that uses a 56-bit key. DES has been shown to be rather easily cracked, however, given proper computing hardware. In recent years, a Triple DES scheme has been put forth that uses three such keys, for an effective 168-bit key length. MasterCard now requires new or relocated ATMs to use the Triple DES scheme, and by April, 2005, both Visa and MasterCard will require that any ATM that supports their cards must use Triple DES. ATM manufacturers are now developing newer models that support Triple DES natively; such redesigns may make them more amenable to also including snapshot cameras and facial recognition software, more so than they would be in regards to retrofitting pre-existing machines . There are hundreds of proposed and actual implementations of facial recognition technology from all manner of vendors for all manner of uses. However, for the model proposed in this paper, we are interested only in the process of facial verification matching a live image to a predefined image to verify a claim of identity not in the process of facial evaluation matching a live image to any image in a database. Further, the environmental conditions under which the verification

takes place the lighting, the imaging system, the image profile, and the processing environment would all be controlled within certain narrow limits, making hugely robust software unnecessary .One leading facial recognition algorithm class is called image template based. This method attempts to capture global features of facial images into facial templates. Neural networks, among other methods, are often used to construct these templates for later matching use. An alternative method, called geometry-based, is to explicitly examine the individual features of a face and the geometrical relationship between those features (Gross.) What must be taken into account, though, are certain key factors that may change across live images: Illumination, expression, and pose (profile.) A study was recently conducted of leading recognition algorithms, notably one developed by two researchers at MIT, Baback Moghaddam and Alex Pentland, and one a commercial product from Identix called FaceIt. The MIT program is based on Principal Feature Analysis, an adaptation of template based recognition. FaceIts approach uses geometry-based local feature analysis. Both algorithms have to be initialized by providing the locations of the eyes in the database image, from which they can create an internal representation of the normalized face. It is this representation to which future live images will be compared. In the study, it was found that both programs handled changes in illumination well. This is important because ATM use occurs day and night, with or without artificial illumination. Likewise, the programs allowed general expression changes while maintaining matching success. However, extreme expressions, such as a scream profile, or squinted eyes, dropped the recognition rates significantly. Lastly, matching profile changes worked reasonably well when the initial training image(s) were frontal, which allowed 70-80% success rates for up to 45 degrees of profile change however, 70-80% success isnt amenable to keeping ATM users content with the system. The natural conclusion to draw, then, is to take a frontal image for the bank database, and to provide a prompt to the user, verbal or otherwise, to face the camera directly when the ATM verification process is to begin, so as to avoid the need to account for profile changes. With this and other accommodations, recognition rates for verification can rise above 90%. Also worth noting is that FaceIts local feature

analysis method handled variations in the test cases slightly better than the PGA system used by the MIT researchers . Another shows more advantages in using local feature analysis systems. For internal representations of faces, LFA stores them topographically; that is, it maintains feature relationships explicitly. Template based systems, such as PGA, do not. The advantages of LFA are that analysis can be done on varying levels of object grouping, and that analysis methods can be independent of the topography. In other words, a system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on, and that as better analysis algorithms are developed, they can fit within the data framework provided by LFA The conclusion to be drawn for this project, then, is that facial verification software is currently up to the task of providing high match rates for use in ATM transactions. What remains is to find an appropriate open-source local feature analysis facial verification program that can be used on a variety of platforms, including embedded processors, and to determine behavior protocols for the match / non-match cases.

1.2 OUR METHODOLOGY


The first and most important step of this paper will be to locate a powerful open-source facial recognition program that uses local feature analysis and that is targeted at facial verification. This program should be compilable on multiple systems, including Linux and Windows variants, and should be customizable to the extent of allowing for variations in processing power of the machines onto which it would be deployed. We will then need to familiarize ourselves with the internal workings of the program so that we can learn its strengths and limitations. Simple testing of this program will also need to occur so that we could evaluate its effectiveness. Several sample images will be taken of several individuals to be used as test cases one each for account images, and several each for live images, each of which would vary pose, lighting conditions, and expressions. Once a final program is chosen, we will develop a simple ATM black box program. This program will server as the theoretical ATM with which the facial recognition software will interact. It will take in a name and password, and then look in a folder for an image that is associated with that name. It will then take in an image
5

from a separate folder of live images and use the facial recognition program to generate a match level between the two. Finally it will use the match level to decide whether or not to allow access, at which point it will terminate. All of this will be necessary, of course, because we will not have access to an actual ATM or its software. Both pieces of software will be compiled and run on a Windows XP and a Linux system. Once they are both functioning properly, they will be tweaked as much as possible to increase performance (decreasing the time spent matching) and to decrease memory footprint. Following that, the black boxes will be broken into two components a server and a client to be used in a two-machine network. The client code will act as a user interface, passing all input data to the server code, which will handle the calls to the facial recognition software, further reducing the memory footprint and processor load required on the client end. In this sense, the thin client architecture of many ATMs will be emulated. We will then investigate the process of using the black box program to control a USB camera attached to the computer to avoid the use of the folder of live images. Lastly, it may be possible to add some sort of DES encryption to the client end to encrypt the input data and decrypt the output data from the server knowing that this will increase the processor load, but better allowing us to gauge the time it takes to process.

1.3 BIO-IDENTIFICATION
Bio-identification systems can be divided into two main types: visual and electronic. Visual bio-identification methods include use of photographs, signatures and/or finger or thumb prints on identity cards. These are relatively low cost to implement and administer. Many off-the-shelf identity card issuing systems incorporate inclusion of photographs and signatures. At polling places, polling staff are expected to compare the photographs, signatures and/or finger or thumb prints on the identity cards with the voters. This process has its weaknesses, as signature and finger print comparison is a highly skilled process that polling staff cannot be expected to master, and a person's appearance can often change significantly from that contained in an identity photograph, particularly if the photograph is not updated regularly. Nevertheless this
6

kind of identity system will probably suffice in most cases where the risk of voting fraud is not unacceptably high. If visual bio-identification systems are not considered secure enough, electronic bio-identification systems can be used. Electronic bio-identification systems can include digitised voice, hand print, finger/thumb print, or retinal (eye) images. Using these systems, digital records of a person's voice or physical features are stored on disk or smartcard and compared to the actual features of the person using some form of electronic reader. Access is only provided where there is an exact match. Electronic bio-identification systems are expensive to acquire and administer, and may not be practical for use with the general voting population (although this may change as the relevant technology becomes more widespread and cheaper). However, they are a feasible option for providing security at sensitive locations such as work places and counting centers.

FIG 1.1: Biometrics

CHAPTER 2 ATM SYSTEM

Our ATM system would only attempt to match two (and later, a few) discrete images, searching through a large database of possible matching candidates would be unnecessary. The process would effectively become an exercise in pattern matching, which would not require a great deal of time. With appropriate lighting and robust learning software, slight variations could be accounted for in most cases. Further, a positive visual match would cause the live image to be stored in the database so that future transactions would have a broader base from which to compare if the original account image fails to provide a match thereby decreasing false negatives.

FIG 2.1: Automated teller machine

When a match is made with the PIN but not the images, the bank could limit transactions in a manner agreed upon by the customer when the account was opened, and could store the image of the user for later examination by bank officials. In regards to bank employees gaining access to customer PINs for use in fraudulent

transactions, this system would likewise reduce that threat to exposure to the low limit imposed by the bank and agreed to by the customer on visually unverifiable transactions. In the case of credit card use at ATMs, such a verification system would not currently be feasible without creating an overhaul for the entire credit card issuing industry, but it is possible that positive results (read: significant fraud reduction) achieved by this system might motivate such an overhaul. The last consideration is that consumers may be wary of the privacy concerns raised by maintaining images of customers in a bank database, encrypted or otherwise, due to possible hacking attempts or employee misuse. However, one could argue that having the image compromised by a third party would have far less dire consequences than the account information itself. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is no broad leap to realize that banks already build an archive of their customer images, even if they are not necessarily grouped with account information.

2.1 HISTORY
The first ATMs were off-line machines, meaning money was not automatically withdrawn from an account. The bank accounts were not (at that time) connected by a computer network to the ATM. Therefore, banks were at first very exclusive about who they gave ATM privileges to. Giving them only to credit card holders (credit cards were used before ATM cards) with good banking records. In modern ATMs, customers authenticate themselves by using a plastic card with a magnetic stripe, which encodes the customer's account number, and by entering a numeric passcode called a PIN (personal identification number), which in some cases may be changed using the machine. Typically, if the number is entered incorrectly several times in a row, most ATMs will to prevent an unauthorised user from working out the PIN by pure guesswork.

2.2 HARDWARE AND SOFTWARE


ATMs contain secure cryptoprocessors, generally within an IBM PC compatible host computer in a secure enclosure. The security of the machine relies mostly on the

integrity of the secure cryptoprocessor: the host software often runs on a commodity operating system.In-store ATMs typically connect directly to their ATM Transaction Processor via a modem over a dedicated telephone line, although the move towards Internet connections is under way. In addition, ATMs are moving away from custom circuit boards (most of which are based on Intel 8086 architecture) and into full-fledged PCs with commodity operating systems such as Windows 2000 and Linux. An example of this is Banrisul, the largest bank in the South of Brazil, which has replaced the MS-DOS operating systems in its automatic teller machines with Linux. Other platforms include RMX 86, OS/2 and Windows 98 bundled with Java. The newest ATMs use Windows XP or Windows XP embedded.

10

CHAPTER 3 FACIAL RECOGNITION


3.1 INTRODUCTION
The main issues faced in developing such a model are keeping the time elapsed in the verification process to a negligible amount, allowing for an appropriate level of variation in a customers face when compared to the database image, and that credit cards which can be used at ATMs to withdraw funds are generally issued by institutions that do not have in-person contact with the customer, and hence no opportunity to acquire a photo. Because the system would only attempt to match two (and later, a few) discrete images, searching through a large database of possible matching candidates would be unnecessary. The process would effectively become an exercise in pattern matching, which would not require a great deal of time. With appropriate lighting and robust learning software, slight variations could be accounted for in most cases. Further, a positive visual match would cause the live image to be stored in the database so that future transactions would have a broader base from which to compare if the original account image fails to provide a match thereby decreasing false negatives. When a match is made with the PIN but not the images, the bank could limit transactions in a manner agreed upon by the customer when the account was opened, and could store the image of the user for later examination by bank officials. In regards to bank employees gaining access to customer PINs for use in fraudulent transactions, this system would likewise reduce that threat to exposure to the low limit imposed by the bank and agreed to by the customer on visually unverifiable transactions. In the case of credit card use at ATMs, such a verification system would not currently be feasible without creating an overhaul for the entire credit card issuing industry, but it is possible that positive results (read: significant fraud reduction) achieved by this system might motivate such an overhaul. The last consideration is that consumers may be wary of the privacy concerns raised by maintaining images of customers in a bank database, encrypted or

11

otherwise, due to possible hacking attempts or employee misuse. However, one could argue that having the image compromised by a third party would have far less dire consequences than the account information itself. Furthermore, since nearly all ATMs videotape customers engaging in transactions, it is no broad leap to realize that banks already build an archive of their customer images, even if they are not necessarily grouped with account information.

3.2 METHODOLOGY
The first and most important step of this project will be to locate a powerful open source facial recognition program that uses local feature analysis and that is targeted at facial verification. This program should be compilable on multiple systems, including Linux and Windows variants, and should be customizable to the extent of allowing for variations in processing power of the machines onto which it would be deployed. We will then need to familiarize ourselves with the internal workings of the program so that we can learn its strengths and limitations. Simple testing of this program will also need to occur so that we could evaluate its effectiveness. Several sample images will be taken of several individuals to be used as test cases one each for account images, and several each for live images, each of which would vary pose, lighting conditions, and expressions. Once a final program is chosen, we will develop a simple ATM black box program. This program will server as the theoretical ATM with which the facial recognition software will interact. It will take in a name and password, and then look in a folder for an image that is associated with that name. It will then take in an image from a separate folder of live images and use the facial recognition program to generate a match level between the two. Finally it will use the match level to decide whether or not to allow access, at which point it will terminate. All of this will be necessary, of course, because we will not have access to an actual ATM or its software. Both pieces of software will be compiled and run on a Windows XP and a Linux system. Once they are both functioning properly, they will be tweaked as much as possible to increase performance (decreasing the time spent matching) and to decrease memory footprint.
12

Following that, the black boxes will be broken into two components a server and a client to be used in a two-machine network. The client code will act as a user interface, passing all input data to the server code, which will handle the calls to the facial recognition software, further reducing the memory footprint and processor load required on the client end. In this sense, the thin client architecture of many ATMs will be emulated. We will then investigate the process of using the black box program to control a USB camera attached to the computer to avoid the use of the folder of live images. Lastly, it may be possible to add some sort of DES encryption to the client end to encrypt the input data and decrypt the output data from the server knowing that this will increase the processor load, but better allowing us to gauge the time it takes to process.

3.3 A Facial Recognition Example


Cognitec Corporations FaceVACS-Entry technology facial recognition scanner show cases a facial recognition example. Here the technology is usedfor allowing this flight attendant airport access and verification. Notice the distance (2 ft) from the machine to the use.

FIG 3.1: Cognitech FaceVAc

13

CHAPTER 4 EYE RECOGNITION


Privacy of personal data is an illusion in today complex society. With only passwords, or Social Security Numbers as identity or security measures every one is vulnerable to invasion of privacy or break of security. Traditional means of identification are easily compromise and enyone can use this information to assume another identity. Sensitive personal and corporate information can be assessed and even criminal activities can be performed using another name. Eye pattern recognition system provides a barrier to and virtually eliminates fraudulent authentication and identity privacy and safety controls privileged access or authorised entry to sensitive sites, data or material. Iris recognition technology can provide protection and security. This technology offers the potential to unlock major business opportunities by providing high confidence customer validation. Unlike other measurable human features in the face, hand, voice or finger print, the patterns in the iris do not change overtime and research show the matching accuracy of iris recognition systems is greater than that of DNA testing. Positive identifications can be made through glasses, contact lenses and most sunglasses. Automated recognition of people by the pattern of their eyes offers major advantages over conventional identification techniques. Iris recognition system also require very little co-operation from the subject, operate at a comfortable distance and are virtually impossible to deceive. Iris recognition combines research in computer vision, pattern recognition and the man-machine interface. The purpose is real-time, high confidence recognition of a persons identity by mathematical analysis of the random patterns that are visible with in the iris. Since the iris is a protected internal organ whose random texture is stable throughout life, it can serve as a living password that one need not remember but always carries.

14

4.1 IRIS RECOGNITION


Iris scans analyze the features that exist in the colored tissue surrounding the pupil of an eye the iris. It involves a user, as close as a couple of inches and up to 2 feet away, looking into a device where their iris is scanned and compared. The comparison is conducted at more than 200 points and checked for similar rings, furrows and freckles of the eye. The main advantage of iris scanning involves the extreme accuracy of the technology. Since no two irises are alike, identification and verification are done with confidence. Iris scanning also involves non-invasive technology; an ease of use since irises cannot be stolen, unlike keys, access cards, and password systems; and eliminates the frustration for users to have to remember passwords. In addition, and unlike the other techniques learned thus far, will recognize a fake eye from a real one by varying the light shone into the eye and watching for pupil dilation. The main challenge of iris scanning involves its high cost. Over time, this should come down in price. Additional challenges involve the potential difficulty in getting someone to hold their head in the right spot for a scan, bad readings due to poor conditions such as lighting, surface positioning if behind a curved, wet, or reflecting surface; and the possibility of obscured irises due to eyelashes or drooping yelids. The future of iris scanning appears to be very bright as the ease of use and accuracy of the technology will open the doors for iris scanning in correctional facilities ,county jails, airports, banks, and police stations around the country. It is very possible that in the near future everyday people will use iris scanners on a daily basis for entering the office and logging onto corporate networks. Parole officers can use the technology for verifying their paroles; government officials can use it to prevent welfare recipients from using different names and receiving twice the allotted welfare; and ordinary people can use it as a means of an electronic signature for online purchases and business documents.

4.2 An Iris Scanning Example


Corporations such as Iridian Technologies have taken advantage of iris scanning with the development of their very own proprietary architecture and camera software. The Iridian iris recognition technology reaches the marketplace in
15

cooperation with iris-enabled camera manufacturers and distribution with licensees such as Panasonic, Oki, and LG. Iridian Technology Iris Scanners , Windows based Workstation iris scanner, Physical access reader, ATM machine, where an iris is used in place of a PIN number.

FIG 4.1: Iris scanners

4.3 HOW IRIS SCANNING WORKS


When a customer puts in a bankcard, a stereo camera locates the face, finds the eye and takes a digital image of the iris at a distance of up to three feet. The resulting computerized "iris code" is compared with one the customer will initially provide the bank. The ATM won't work if the two codes don't match. The entire process takes less than two seconds. The system works equally well with customers wearing glasses or contact lenses and at night. No special lighting is needed. The camera also does not use any kind of beam. Instead, a special lens has been developed that will not only blow up the image of the iris, but provide more detail when it does. Iris scans are much more accurate than other high-tech ID systems available that scan voices, faces and fingerprints. Scientists have identified 250 features unique to each person's iris -- compared with about 40 for fingerprints -- and it remains constant through a person's life, unlike a voice or a face. Fingerprint and hand patterns can be changed through alteration or injury. The iris is the best part of the eye to use as a identifier because there are no

16

known diseases of the iris and eye surgery is not performed on the iris. Iris identification is the most secure, robust and stable form of identification known to man. It is far safer, faster, more secure and accurate than DNA testing. Even identical twins do not have identical irises. The iris remains the same from 18 months after birth until five minutes after death. When the system is fully operational, a bank customer will have an iris record made for comparison when an account is opened. The bank will have the option of identifying either the left or right eye or both. It requires no intervention by the customer. They will simply get a letter telling them they no longer have to use the PIN number. And, scam artists beware, a picture of the card holder won't pass muster. The first thing the camera will check is whether the eye is pulsating. If we don't see blood flowing through your eye, you're either dead or it's a picture.

FIG 4.2: iris recognition system

17

4.4 Retinal Scanning


Retinal scanning devices are the most accurate physical biometric available today since there is no known way to replicate a retina. Similar to iris scanning, retinal scanning analyzes the layer of blood vessels at the back of the eye. The scanning involves using a low-intensity light source and an optical coupler That reads the patterns of a persons retina. Still relatively new and primarily used For high-risk security areas, its popularity is gaining acceptance. Retinal scanning has a user look through a small opening in the device at a small green light. The user must keep their head still and eye focused on the light for several seconds during which time the device will verify his or her identity. This process takes about 10 to 15 seconds total. Besides being the most accurate biometric technique available, retinal scanning provides for several additional advantages. The first advantage is the capability of providing viewing assistance to those who are visually impaired (Figure H); a second advantage is providing a piece of mind in knowing the technology is 100% accurate, and the final advantage of the technology being seen as a great long term cost alternative to some other biometric techniques. Besides cost, several challenges to this technology exist. They include the invasive screening process and user discomfort. For example, it requires a user to stand within inches of a device to get an accurate reading, it requires a user to remove glasses if they wear them, it requires a user to place their eye close to the retinal scanning device, and it requires a user to focus on a certain point for a certain period of time. The future of retinal scanning appears bright. However, it needs to be more refined, non-intrusive, and cost effective for acceptance. I think over time you will see a decrease in the costs and more marketing of the products and technology.

4.5 Retinal Scanning Examples


Corporations like Microvision have capitalized on retinal technology and

specifically in offering it as an alternative to helping those who are visually impaired Through a small device called Nomad , people will be able to read information from a small, wearable computer that projects an image over their normal vision. The display is a red, transparent computer screen, but, in fact, is no screen at all. The device
18

shoots a tiny laser beam that draws patterns onto the retina so that only the wearer sees the images.

FIG 4.3 :Retinal tech

To illustrate the retinal scanning process, Retinal Tech Corporation offers a retinal scanning device (Figure J) that scans a persons retina in four distinct and different phases (Figure K). This technology is designed to be extremely versatile for attachment to a door for physical access, incorporation into a wand, kiosk, or ATM machine, and for connection to a computer. It also works outdoors, in low lighting, and is hands free.

FIG 4.4: Retinal scanning process

19

CHAPTER 5 ADVANTAGES
1.Biometric devices offer improved convenience and security .It provide good security mechanism than all other security methods.

2.In public locations such as banks and airports a large number of people transit every day including known criminals. face recognition systems attached to video surveillance systems are supposed to help catch them.

3.Iris identification is the most secure, robust and stable. keeping our private information confidential and provides security from ATM thefts.

20

CHAPTER 6 APPLICATIONS

Iris based identification and verification technology has gained acceptance in a number of different areas. Application of iris recognition technology can he limited only by imagination. The important applications are those following:

1. ATM's and iris recognition


In U.S many banks incorporated iris recognition technology into ATM's for the purpose of controlling access to one's bank accounts. After enrolling once (a "30 second" process), the customer need only approach the ATM, follow the instruction to look at the camera, and be recognized within 2-4 seconds. The benefits of such a system are that the customer who chooses to use bank's ATM with iris recognition will have a quicker, more secure transaction.

2.Tracking Prisoner Movement


The exceptionally high levels of accuracy provided by iris recognition technology broadens its applicability in high risk, high-security installations. Iris scan has implemented their devices with great success in prisons in Pennsylvania and Florida. By this any prison transfer or release is authorized through biometric identification. Such devices greatly ease logistical and staffing problems.

Applications of this type are well suited to iris recognition technology. First, being fairly large, iris recognition physical security devices are easily integrated into the mountable, sturdy apparatuses needed or access control, The technology's phenomenal accuracy can be relied upon to prevent unauthorized release or transfer and to identify repeat offenders re-entering prison under a different identity.

3. Computer login
The iris as a living password.

21

4.National Border Controls


The iris as a living password.

5.Telephone call charging without cash, cards or PFN numbers,Ticket less air travel. 6. Premises access control (home, office, laboratory etc.). 7. Driving licenses and other personal certificates. 8. Internet security, control of access to privileged information.

22

CONCLUSION
We thus develop an ATM model that is more reliable in providing security by using facial recognition software. By keeping the time elapsed in the verification process to a negligible amount we even try to maintain the efficiency of this ATM system to a greater degree.

23

REFERENCES
1.Bone, Mike, Wayman, Dr. James L., and Blackburn, Duane. Evaluating Facial Recognition Technology for Drug Control Applications. 2.Gross, Ralph, Shi, Jianbo, and Cohn, Jeffrey F. Quo vadis Face Recognition. 3.Penev, Penio S., and Atick, Joseph J. Local Feature Analysis: A General Statistical Theory for Object Representation. 4.Wrolstad, Jay. NCR To Deploy New Microsoft OS in ATMs. 5.Woodward, John. Biometrics: A look at Facial Recognition. 6.Penman, Richard. The Role of Facial Recognition: Biometrics in the Security Industry.

24

You might also like