You are on page 1of 4

3G Design for ATM Operations Using Universal

Subscriber Identification Module


R.Sudhakar1, Mr.E.Nelson Daniel2
1 2
M.Tech (EST) second year, Assistant Professor-I Department of Electrical and Electronics Engineering
Kalasalingam University
Anand Nagar, KrishnanKoil-626190, INDIA
E-mail: 1rsudhakareee@gmail.com, 2nelsondaniel.e@gmail.com

Abstract—ATM (Automated Teller Machine) systems have personal authenticity and to detect impostors is growing in the
become instant cash providers for people around the globe and present scenario of global security concern. Development of a
have increased in vast numbers in the past few years. At the biometric system for personal identification.
same time, occurrences of robbery have also increased in the Face recognition has been evolving as a convenient
present. The existing security in these systems is lagging behind biometric mode for human authentication for more than last
in providing fool-proof security. This paper presents a secure two decades. Basically Face Recognition is the process
approach in rendering money with the help of a combination of
through which a person is identified by his facial image. With
face recognition and SIM (Subscriber Identity Module)
identification technologies. The system recognizes the face of the the help of this technique it is possible to use the facial image
user with the help of image processing and GSM modem is used of a person to authenticate him into any secure system.
to send SIM identity to the server database. The system is also Wavelet provides powerful signal analysis tools, which is
equipped with voice annunciation to provide a user-friendly widely used in feature extraction, image compression and de-
approach. noising applications. Wavelet decomposition is the most
widely used multi-resolution technique in image processing.
Keywords—ATM, GSM, LPC2148, Face-Recognition, SIM ID, Due to the excellent time-frequency localization
FAR and FRR characteristic, Wavelet transform provide powerful signal
analysis tools [19]. Images have typically locally varying
statistics that result from different combinations of abrupt
features like edges, of textured regions and of relatively low-
I. INTRODUCTION contrast homogeneous regions. While such variability and
Hundreds of new techniques of image recognition have spatial non-stationary defies any single statistical
been developed over the last few years and are waiting for characterization, the multi-resolution components are more
actual applications. Everyday actions are increasingly being easily handled. Wavelet transform can be performed for every
handled electronically, instead of with pencil and paper or scale and translation, resulting in continuous wavelet
face to face. This growth in electronic transactions has transforms (CWT), or only at multiples of scale and
resulted in a greater demand for fast and accurate user translation intervals, resulting in discrete wavelet transform
identification and authentication. Access codes for buildings, (DWT). Since, CWT provides redundant information and
banks accounts and computer systems often use PIN's for requires a lot of computation, generally DWT is preferred.
identification and security clearances. Using the proper PIN Having processed a face and extracted the features, these
gains access, but the user of the PIN is not verified as arrest ored or transmitted as a facial code (face template),
authentic. This paper proposes the advantage of using face which can be as small as 84 bytes (Visionics). For each
recognition technique for verification of genuine user. The representation type, a distance or similarity measure is defined
information related to the customer is given to the bank that allows ‘similar’ faces to be determined. Much of the art in
including his face image, and then bank will provide an SIM biometrics is in the design of a model of the biometric data
ID to the user. The SIM ID acts like atm card for the customer and, given a scheme for extracting the model parameters as a
for money transaction. Hence from this system the card holder representation of the data, in creating a similarity measure that
only can take money from the bank thus enabling reliability correctly discriminates between samples from the same person
among user. This system proposes two approaches. First is to and samples from different people. As with any biometric
provide authentication of the user which is performed by the system, some threshold on similarity must be chosen above
SIM ID and ARM controller. Second approach is recognition which two face images are deemed to be of the same person.
of user identity by face recognition algorithm. Altering the threshold gives different False Accept and
False Rejection Rates trading the one off against the other
depending on the security level required. This is a trade-off
II. SPECIFICATION OF FACE between convenience and security: user-friendly matchers
RECOGNITION have a low false reject rate, while secure matchers have a low
false accept rate.
The importance of utilizing biometrics to establish
principles. The RISC instruction set and related decode
mechanism are much simpler than those of CISC designs.
III. ARM CONTROLLER
ARM architecture has a unique combination of features
The ARM (Advanced RISC Machine) architecture is a
that makes ARM very popular embedded architecture today:
32-bit RISC processor architecture developed by ARM
Limited that is widely used in a number of embedded designs. • ARM cores are simple compared to most other
Because of their power saving features, ARM CPUs are general-purpose processors.
dominant in the mobile electronics market, where low power • A typical ARM chip contains several peripheral
consumption is a critical design goal. Today, the ARM family controllers, a DSP and some amount of on-chip
accounts for approximately 75% of all embedded 32-bit RISC
memory.
CPUs, making it one of the most widely used 32-bit
• ARM ISA and pipeline designs are aimed to
architectures in the world. ARM CPUs are found in all corners
minimizing energy consumption.
of consumer electronics, from portable devices to computer
peripherals. The Fig.1 shows the 32-bit microcontroller • ARM architecture is highly modular: the only
growth. mandatory component of an ARM processor is the
integer pipeline. All other components, including
caches, MMU, FP unit and other co-processors are
optional.

• ARM architecture provides a high performance for


embedded applications.

IV. GSM SIM READER

GSM (Global System for Mobile Communication) is a


digital mobile telephone system that is widely used in Europe
and other parts of the world. GSM uses a variation of Time
Division Multiple Access (TDMA) and is the most widely
used of the three digital Wireless telephone technologies
(TDMA, GSM, and CDMA). GSM digitizes and compress
Fig.1 32 bit Microcontroller Market data, then sends it down a channel with two other streams of
user data, each in its own time slot. It operates at either the
The use of RISC processors over CISC processors in 900 MHZ or 1,800 MHZ frequency band.
embedded systems today is wide spread and seems to be the
trend of the future. This is because when it comes to GSM together with other technologies is part of evolution
embedded systems, RISC has many advantages over CISC of wireless mobile telecommunication that includes High-
both in hardware and software implementation of these Speed circuit-switched Data(HSCSD) , General Packet Ratio
embedded systems. System(GPRS) , Enhanced Data rate for GSM Evolution
(EDGE), and Universal Mobile Telecommunication
Some of these benefits of RISC are: Service(UMTS).

One of the key features of GSM is the Subscriber Identity


• Very fast responses to non-deterministic events
Module, commonly known as a SIM card. The SIM is a
• Simpler assembler coding
detachable smart card containing the user's subscription
• High throughput information.
• Low power consumption
GSM networks are most popular and widespread wireless
ARM architecture is developed to utilize the benefits of communication media across the world, having a wide
CISC and RISC by improving the code density and reducing customer base in Europe and Asia-Pacific and command more
the power consumption. ARM Limited has incorporated a than 50 percent of mobile customers. The advancement of
novel mechanism, called the Thumb architecture. The Thumb GSM networks increases rapid growth of its users and
instruction set is a 16-bit compressed form of the original 32- services. Being an advance technology it becomes favorites
bit ARM instruction set, and employs dynamic decompression for the criminals. These things created worldwide market for
hardware in the instruction pipeline. The ARM architecture is the analysis and monitoring of GSM network.
based on Reduced Instruction Set Computer (RISC)
• GSM 900 uses the circa 900Mhz band
• The frequency band used is 890-915MHz (mobile C. Voice Annunciator
transmit) and 935-960MHz (base transmit). The annunciator is used for providing user friendly setup
for physically handicapped persons in case of blind. The voice
• To allow maximum number of users access, each annunciator produces the voice which enhances the user to
band is subdivided into 124 carrier frequencies make the transaction effortless.
spaced 200 kHz apart, using FDMA techniques.
• Each of these carrier frequencies is further D. Alarm
subdivided into time slots using TDMA If the face which given as an input to the controller is
• TDMA (Time Division Multiple Access) has 8 time mismatched with the data base images then unauthenticated
slots (i.e. transmitting for one eighth of the time). mode is activated and ARM controller activated the alarm
• Hence, one radio channel can support 8 'full rate' signal for alarm unit.
traffic.
E.Data Transfer unit
• A more economical 'half rate' scheme with 16 traffic
Data transfer unit transfers the user information from
channels is being introduced.
external world to the ARM controller. The information’s are
• TDMA provides each user with the carrier frequency stored temporarily in this unit and it acts like mediator for
for approximately 0.577ms. effective function of all units such as providing input for voice
• There is also an extension band of 15 MHz in both annunciator and alarm unit.
directions.
• The peak power of mobile stations depends on the
class of mobile.
• Precautions are required to avoid Interference with
other users. Power control - 15 steps of 2dB - is
provided. The transmitter must be ramped up and
down in level in a controlled fashion at the beginning
and end of each time slot.
• Careful filtering is also applied.
• Frequency hopping may he optionally employed in
order to avoid 'deadspots' and to minimize
interference from other signals. The hopping rate is
one hop per TDMA frame (4.6µs), or 217 hops per
second.
• The method of modulation used Is Gaussian
Minimum Shift Keying (GMSK), with a BT value
of 0.3 at a gross data rate of 270 kb/s.
• Phase and frequency synchronization must allow for
Doppler shift for vehicle speeds up to 250km/h as
well as for frequency standard drift, and timing
advance to compensate for propagation delay due to
round trips for paths, in cells up to 35km radius. Fig.2 Block Diagram

V. PROJECT DESCRIPTION Project paper present a new system which is advantage


compare to the existing system. If the user enters the ATM
A.SIM Scanning Device room the SIM belonging to the customer is inserted in to the
Scanning device consists of GSM MODEM which acts scanning device. The scanning device tracks the user
like a scanner for tracking the SIM ID. This ID consists of information, data transfer unit transfers the data to the ARM
user information from which controller verifies the originality controller and controller searches for the desired customer
of the user. information on the database if the information provided by the
customer matches with the database the customer is allowed
for the money transaction with the help of voice annunciator.
B. Web Camera Information provided by the customer from SIM ID is
Camera is used for capturing the face image of the user mismatched with database then data transfer unit signal the
hence by using suitable algorithm the match of images is alarm unit and money transaction is banned.
performed by ARM controller.
VI. RESULT
REFERENCES

[1] M. Ejiri, T. Uno, M. Mese and S. Ikeda, “A Process for Detecting


Defects in Complicated Patterns,” Computer Graphics and Image
Processing, Vol.2, No.3-4, 1973, pp. 326-339.
[2] Hiroshi Sako and Takafumi Miyatake “Image-Recognition
Technologies towards Advanced Automated Teller Machines” Central
Research Laboratory, Hitachi, Ltd.
[3] Keränen, H., Pohjanheimo, L., Ailisto, H. (2005) Tag Manager: a
Mobile Phone Platform for Physical Selection Services in International
conference on Pervasive Services.
[4] H. Sako, M. Whitehouse, A. Smith and A. Sutherland, “Real-Time
Facial-Feature Tracking Based on Matching Techniques and its
Applications” Proc. of International Conference on Pattern Recognition
(ICPR '94), 1994, pp. 320-324.
[5] P. J. Phillips, A. Martin C. L. Wilson and M. Przybocki, “An
Introduction to Evaluating Biometric Systems,” IEEE Computer,
Vol.33, No.2, Feb. 2000, pp. 56-63.
[6] S. Pankanti, R. M. Bolle and A. Jain, “Biometrics: The Future of
Identification,” IEEE Computer, Vol.33, No.2, Feb. 2000, pp. 46-49.
[7] H. Sako, M. Seki, N. Furukawa, H. Ikeda and A. Imaizumi, “Form
Reading based on Form-type Identification and Form-data
Recognition,” Proc. of International Conference on Document Analysis
and Recognition (ICDAR 2003), 2003, pp. 926-930.

Fig.3 Face recognition success

Fig.4 VB banking operation page

VII. CONCLUSION
Implementing face recognition technique in the banking
domain verify the originality of the user identity and only
authenticated user is allowed to use the SIM ID based
automated teller machine.
In the future, we plan to increase the robustness of the
proposed method, especially to improve comfort ability of
face recognition

You might also like