Dire Dawa University: School of Electrical and Computer Engineering
Dire Dawa University: School of Electrical and Computer Engineering
Dire Dawa University: School of Electrical and Computer Engineering
Institute of technology
School of Electrical and Computer Engineering
INDUSTRIAL CONTROL ENGINEERING
Semester project Title: - BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM
WITH GSM FEEDBACK MECHANISM
Project proposal
SUBMITTED BY:
NAME ID/No.
i
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
Table of Contents
ABSTRACT.................................................................................................................................... i
List of figure ................................................................................................................................. iii
List of Table .................................................................................................................................. iv
ACRONYMS ................................................................................................................................. v
CHAPTER ONE ....................................................................................................................... - 1 -
INTRODUCTION ...................................................................................................................... - 1 -
1.1 INTRODUCTION ......................................................................................................................... - 1 -
1.2 BACKGROUND ........................................................................................................................... - 2 -
1.3 STATEMENT OF PROBLEM .................................................................................................... - 3 -
1.4 OBJECTIVE OF THE PROJECTS............................................................................................ - 3 -
1.4.1 GENERAL OBJECTIVE ...................................................................................................... - 3 -
1.4.2. SPECIFIC OBJECTIVE ...................................................................................................... - 3 -
1.5 PROJECT SCOPE ...................................................................................................................... - 4 -
1.6 SIGNIFICANCE OF THE PROJECT ........................................................................................ - 4 -
1.7 ORGANIZTATION OF THE PROJECT.................................................................................... - 4 -
1.8 LIMITATION OF THE PROJECT .............................................................................................. - 5 -
CHAPTER TWO ....................................................................................................................... - 6 -
LITERATURE REVIEW ........................................................................................................... - 6 -
2.1 GENERAL LITERATURE REVIEW .......................................................................................... - 6 -
CHAPTER THREE................................................................................................................... - 8 -
METHODOLOGY AND SYSTEM BLOCK DIAGRAM ...................................................... - 8 -
3.1 METHODS .................................................................................................................................... - 8 -
3.2 OVERVIEW OF SYSTEM BLOCK DIAGRAM ........................................................................ - 9 -
3.3. COMPONENTS Required ....................................................................................................... - 10 -
3.4 OVERALL FLOW CHART OF SYSTEM ................................................................................ - 10 -
CHAPTER FOUR ................................................................................................................... - 12 -
WORK PLAN AND BUDGET .............................................................................................. - 12 -
4.1 Work Plan ................................................................................................................................... - 12 -
4.2 Budget ......................................................................................................................................... - 12 -
REFERENCES ....................................................................................................................... - 13 -
DDIT ECE II
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
List of figure
Figure 1 methods....................................................................................................................................... - 8 -
Figure 2 system block diagram ................................................................................................................. - 9 -
Figure 3 the overall flow chart of the system.......................................................................................... - 11 -
List of Table
Table 1 .................................................................................................................................................... - 12 -
Table 2 .................................................................................................................................................... - 12 -
DDIT ECE IV
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
ACRONYMS
DDIT ECE V
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
CHAPTER ONE
INTRODUCTION
1.1 INTRODUCTION
Biometrics-based authentication offers several advantages over other authentication.
Fingerprint technology in particular, can provide a much more accurate and reliable user
authentication method. Biometrics is a rapidly advancing field that is concerned with identifying
a person based on their physiological characteristics. As the ATM technology is advancing,
fraudsters are devising different skills to beat the security of ATM operations. Various forms of
fraud are perpetuated, ranging from: ATM card theft, skimming, pin theft, card reader techniques,
pin pad techniques, force withdrawals, and etc. Managing the risk associated with ATM fraud as
well as diminishing its impact of fraud is an important issue that faces financial institutions as
fraud techniques have become more advanced with increased occurrences. Considering the
numerous security challenge encountered by ATM and users and given that the existing security
in the ATM system has not been able to address these challenges, there is the need to enhance the
ATM security system to overcome these challenges. This study focuses on how to enhance security
of transactions in ATM system using fingerprint. The aim of this study therefore is to develop
ATM simulator-based fingerprint verification operations in order to reduce frauds associated with
the use of ATM.
1.2 BACKGROUND
Biometric identify people by measuring some aspects of individual anatomy or physiology
(such as your hand geometry or finger print), some deeply Ingrained skill, or other behavioral
characteristics (such your handwritten signature), or something that is a of the two (such as your
voice). Biometric authentication technologies such as face, finger, hand, and iris and speaker
recognition is commercially available today and are already in use. Biometric system is essentially
a pattern recognition system that operates by acquiring biometric data from an individual,
extracting a feature set from the acquire data, and comparing this feature set against the template
set in the database. Depending on the text, a biometric system may operate either in verification
mode or identification mode.
Verification mode: In the verification mode, the system validates a person’s identity by
comparing the capture biometric data with his/her own biometric templates stored system database.
In such a system, an individual who desires to be recognized claims an identity, usually through a
PIN, a user name, a smart card etc…, and the system conducts a one-to-one comparison to
determine the claim whether the claim is true or wrong.
Identification mode: In this mode the system recognizes an individual by searching the
templates of all the user in the database for a match. As a result, the system conducts a one to many
comparisons to establish an individual identity without the subject having to claim an identity for
instance “whose biometric data is this?”. Identification is a critical component in negative
recognition application where the system establishes whether the person is who implicitly or
explicitly denies to be. The purpose of negative recognition is to prevent single person from using
multiple identities. Identification may be used in positive recognition for convenience that the user
is not required to claim an identity while traditional method of personal recognition such as
passwords, PINs, keys, and tokens may work for positive recognition can only be established
through biometrics.
This project organized in five chapters based on their specific content those are explained each and
every as shown below statements.
First, in chapter one, there are different topics which deal with introduction, statement of the
problem, objectives of the project, general objective of the project and specific objectives of the
project, significant of the project, scope of the project, limitation of the project and project
organization. Next, chapter two deals with literature review of the project, that means how the
project was look like previous done by different person to modify our new project. Then, Chapter
three focused system design and hardware description of the project especially block diagram,
flow chart, working principle and material description. And chapter four about budget and work
plan.
CHAPTER TWO
LITERATURE REVIEW
Madu, C.N., & Madu, A.A. (2002) pointed out that the concern of customers about security
and privacy, while using this service, is a major cause of their dissatisfaction. [2] Most finger print
scan technologies are based minutiae. Samir Nanavati states that most finger scan technologies are
based on minutiae matching but that pattern matching is a leading alternative. This technology
bases its feature extraction and template generation on a series of ridges, as opposed to discrete
point. The use of many ridges reduces dependence on minutiae points, which tend to be affected
by wear and tear. The downside of pattern matching is that it is more sensitive to the placement of
the finger during verification and the created template is several times larger in byte size. Finger
scan technology is proven and capable of high levels of accuracy. This is a long history of
fingerprint identification, classification and analysis. This along with distinctive features of
fingerprints has set the finger scan apart from other biometric technologies.
There are physiological characteristics more distinctive than the fingerprint such as iris and
retina, but automated identification technology capable of leveraging these characteristics have
been developed only over the past some years. The technology has grown smaller, more capable
and with many solutions available. Devices slightly thicker than a coin and an inch square in size
are able to capture and process images. Additionally, some may see the large number of finger
scan solutions available today as disadvantages and as advantage by ensuring marketplace
completion which has resulted in in a number of robust solutions for desktop, laptop, tablet,
physical access and point of sale environments. Biometric data are separate and distinct from
personal information. Biometric templates cannot be reverse engineered to recreate personal
information and they cannot be stolen and used to access personal information.
CHAPTER THREE
METHODOLOGY AND SYSTEM BLOCK DIAGRAM
3.1 METHODS
Among the methods that we for our project include the following.
Figure 1 methods
1. PIC18f8722 microcontroller
2 unipolar stepper motor
3 power supply unit
4 LCD display
5 finger print module
6 key pad
7 crystal oscillator
The functional flow diagram shows the working of the whole security system. Firstly, the user
will fingerprint scanning; if it matches then only the user can proceed further. Enter the ATM pin
the system would allow customer to enter password (PIN) for accessing ATM machine, if the pin
does not match with the stored consecutively for three times, then it sends the message notification
to the bank security department or to the user the alert notification and the pin number.
DDIT ECE - 10 -
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
DDIT ECE - 11 -
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
CHAPTER FOUR
4.2 Budget
Table 2
DDIT ECE - 12 -
BIOMETRIC FINGERPRINT BASED ATM MACHINE SYSTEM 2021G.C
REFERENCES
[1] Shahan, Timothy A. and Christopher A. Podlesnik. "Divided Attention Performance and the
Matching Law". Learning & Behavior 34.3 (2006): 255-261. Web.
[2] Madu, C.N., & Madu, A.A. (2002). Dimensions of e-quality. International Journal of Quality
[3] ESaatci, V Tavsanogh. Fingerprint image enhancement using CNN gabor-Cpe filter[C].
Proceedings of the 7th IEEE International Workshop on Cellular Neural Networks and their
Applications 2002: 377-382.
DDIT ECE - 13 -