ATM Security Using Eye and Facial
Recognition System
ARUN KRISHNA K
20042425
CONTENTS
• Introduction
• Face recognition systems
• How do they work
• Methodology
• Techniques and Methods
• 2d Techniques
• 3d Techniques
• Surface-Texture-Analysis
• Iris Recognition
• HOW THE SYSTEM WORKS
• Conclusion
INTRODUCTION
The rise of technology into India has brought into force many type of equipment that
aim at more customer satisfaction. ATM is one such machine which made money
transaction easy for customers to the bank. But it has both advantages and
disadvantages. Current ATMs make use of naught more than an access card and PIN
for uniqueness confirmation. This has ATM Using Face Recognition System
demonstrate the way to a lot of fake attempt and mistreatment through card theft, PIN
theft, stealing and hacking of customers account details and other parts of security. This
process would effectively become details and other part of security. This process would
effectively become an exercise in pattern matching, which would not require a great
deal of time.
FACE RECOGNITION SYSTEMS
FRS is an application that mechanically identifies a person from a
digital image or a video outline from a video source. One of the behaviors
to do this method is by matching chosen facial features from a facial
database and the image. In this system, with appropriate lightning and
robust learning. Further a positive visual match would cause the live
image to be stored in the database so that future transactions would have
broader base from which to compare if the original account image fails to
provide a match –thereby decreasing false negatives.
FACE RECOGNITION SYSTEMS
HOW DO THEY WORK
A database of peoples face is maintained by the system that handles face
detection. There are typically 3 parts related to a face recognition:
• Face-detector
• Eye-localizer
• Face-recognizer
1. Face-detector:The face detector spot the face, eliminating any other
detail, not related to the face (like the backdrop). It identifies the facial
region and leaves the non-facial region in the photo of the person to be
identified.
2. Eye-localizer: It finds the spot of the eyes; so that the position of the
face can be identify better
3. Recognizer: It will check the database to find a match.
METHODOLOGY
The first and foremost important step of this system will be to locate a
powerful open source facial recognition program that uses local feature
analysis and that is targeted at facial verification. Various facial recognition
algorithms be familiar with faces by extracting features, from a snap of the
subject's face. For ex, an algorithm may examine the size, relative position,
in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial
appearances are then used to search for other imagery across matching
features. Other algorithm manages a balcony of face images and then
compresses the images face information and it saves only the data in the
image that is used for face detection.
TECHNIQUES AND METHODS
They are of three types:
 2-D
 3-D
 Surface Texture Analysis
2-D-Technique
The 2-D recognition method was individual of the original techniques
employed. It maintained details of people‟s faces as seen two dimensionally.
Details like width of the nose, width of the eyes, distance between the eyes,
jaw line, cheek bone figure were used for contrast. This type of face
recognition was not too precise. Change in facial expression or difference in
ambient lighting on an appearance that is not directly looking into the
camera did not produce expected results.
3-D-Technique
Progression in face recognition gave origin to the 3-D recognition system.
This stepped up technique, used facial appearance like contours of the eye
sockets, chin, nose, peaks and valley on the visage for identification. The
database will store details of faces also. The advantage of 3- D technique
over 2-D method is that 3-D face identification works fine even if the face is
turned at 90 degree to the camera. It is self-governing of lighting
environment and facial expressions.3-D-Technique
ATM Security Us-WPS Office.pptx
Surface-Texture-Analysis
The most superior method is Surface Texture Analysis (STA). STA does
not examine the entire face but a patch of membrane on it. This patch is
divided into separate blocks. The skin surface, the pore on the skin and
other face characteristics are converted to a code. This code is used for
comparisonSurface-Texture-Analysis
IRIS RECOGNITION
In spite of all these security features; a new technology has been
developed. Bank United of Texas became the first in the United States to
offer iris recognition technology at automatic teller machines, providing the
customers a card less, password-free way to get their money out of an ATM.
there‟s no card to show, there's no fingers to ink, no customer
inconvenience or discomfort. It's just a photograph of a Bank United
customer's eyes. Iris recognition is an automated method of biometric
identification that uses mathematical pattern-recognition techniques on
video images of one or both the issues of an individual‟s eyes whose
complex patterns are unique, stable, and can be seen from some distance.
A key advantage of Iris recognition besides its speed of matching and its
extreme resistance to false matches, is the stability of the Iris as an internal
and protected, yet externally visible organ of an eye. Figure below shows an
schematic diagram of Iris recognition.
Just step up to the camera while your eye is scanned. The iris -- the colored
part of the eye the camera will be checking -- is unique to every person,
more so than fingerprints. And, for the customers who can't remember their
personal identification number or password and scratch it on the back of
their cards or somewhere that a potential thief can find, no more fear of
having an account cleaned out if the card is lost or stolen.
ATM Security Us-WPS Office.pptx
HOW THE SYSTEM WORKS
When a customer puts in a bankcard, a stereo camera locates the face,
find the eye and take a digital image of iris at a distance of up to two to three
feet. The result computerized „iris code‟s compared with one of the
customer will initially provide the bank. ATM won‟t work if the two codes
don‟t match. The camera also does not use any kind of beam. Instead, a
special lens has been developed that will not only blow up the image of the
iris, but provide more detail when it does. Iris scans are more accurate than
other high-tech id system available that scan voices and fingerprints.
Conclusion
We thus develop an ATM model which provides security by using Facial
verification software Adding up facial recognition systems to the identity
confirmation process used in ATMs can reduce forced transactions to a
great extent. Using a 2d and 3d technology for identification is strong and it
is further fortified when another is used at auntheticiation level.
THANK YOU

More Related Content

PPTX
Atm with an eye
PPTX
biochip technology
PPTX
Biochips seminar
PPT
ATM Security by using Fingerprint Recognition And GSM
PPT
An atm with an eye
PPTX
Palm vein Technology
PPTX
Palm Vein Technology
PPTX
an atm with an eye
Atm with an eye
biochip technology
Biochips seminar
ATM Security by using Fingerprint Recognition And GSM
An atm with an eye
Palm vein Technology
Palm Vein Technology
an atm with an eye

What's hot (20)

PDF
Computer vision and face recognition using python
PPTX
An eye with an atm
PPT
Handheld Laser Barcode Scanners
PPTX
Biochip
PPT
Pill Camera ppt
DOC
Bio Chip Project Report
DOCX
Biochip report
PPTX
The Biochip Technology
DOC
Biometrics Technology Seminar Report.
PPT
Pill camera presentation
PPT
FOR SCREEN BY ANURAG SINGH (8318130325)
PPT
Face recognition ppt
PPTX
Biometric ATM (1).pptx
PPTX
BIOCHIP TECNOLOGY
PPTX
BIOMETRIC IDENTIFICATION IN ATM’S PPT
PDF
14A81A05A3
PPT
Rainbow technology-ppt
PPTX
Driver fatigue detection system
DOCX
pill camera
DOC
An atm with an eye
Computer vision and face recognition using python
An eye with an atm
Handheld Laser Barcode Scanners
Biochip
Pill Camera ppt
Bio Chip Project Report
Biochip report
The Biochip Technology
Biometrics Technology Seminar Report.
Pill camera presentation
FOR SCREEN BY ANURAG SINGH (8318130325)
Face recognition ppt
Biometric ATM (1).pptx
BIOCHIP TECNOLOGY
BIOMETRIC IDENTIFICATION IN ATM’S PPT
14A81A05A3
Rainbow technology-ppt
Driver fatigue detection system
pill camera
An atm with an eye
Ad

Similar to ATM Security Us-WPS Office.pptx (20)

PDF
ATM SECURITY USING FACE RECOGNITION
PPTX
Face Recognition Technology by Vishal Garg
PPT
Face recognition technology
PPTX
Face recognition technology
PDF
Facial Recognition Mini project 3.pdf
PPTX
Pattern recognition 3d face recognition
DOC
Facerecognition
DOC
Facerecognition
PPTX
Face Recognition Dissertation
PPTX
Pattern recognition facial recognition
PPTX
Movie on face recognition in e attendace
PDF
Best biometric system in market with AI.pdf
PDF
V01 i010407
PPTX
face-recognition-technology-ppt.pptx
PPT
Atm with an eye
PPTX
Face recognition
PPT
Face recognization technology
PPTX
Facial_recognition_systtem.pptx
PPSX
Face recognition technology - BEST PPT
PPT
Facial Recognition System
ATM SECURITY USING FACE RECOGNITION
Face Recognition Technology by Vishal Garg
Face recognition technology
Face recognition technology
Facial Recognition Mini project 3.pdf
Pattern recognition 3d face recognition
Facerecognition
Facerecognition
Face Recognition Dissertation
Pattern recognition facial recognition
Movie on face recognition in e attendace
Best biometric system in market with AI.pdf
V01 i010407
face-recognition-technology-ppt.pptx
Atm with an eye
Face recognition
Face recognization technology
Facial_recognition_systtem.pptx
Face recognition technology - BEST PPT
Facial Recognition System
Ad

Recently uploaded (20)

PPTX
transformers as a tool for understanding advance algorithms in deep learning
PDF
American Journal of Multidisciplinary Research and Review
PDF
Delhi c@ll girl# cute girls in delhi with travel girls in delhi call now
PDF
Book Trusted Companions in Delhi – 24/7 Available Delhi Personal Meeting Ser...
PPTX
ch20 Database System Architecture by Rizvee
PPTX
ifsm.pptx, institutional food service management
PPTX
inbound2857676998455010149.pptxmmmmmmmmm
PPTX
DATA ANALYTICS COURSE IN PITAMPURA.pptx
PDF
Buddhism presentation about world religion
PDF
General category merit rank list for neet pg
PPTX
Stats annual compiled ipd opd ot br 2024
PDF
book-34714 (2).pdfhjkkljgfdssawtjiiiiiujj
PPTX
Capstone Presentation a.pptx on data sci
PPTX
inbound6529290805104538764.pptxmmmmmmmmm
PDF
REPORT CARD OF GRADE 2 2025-2026 MATATAG
PDF
Concepts of Database Management, 10th Edition by Lisa Friedrichsen Test Bank.pdf
PDF
technical specifications solar ear 2025.
PPT
Classification methods in data analytics.ppt
PDF
9 FinOps Tools That Simplify Cloud Cost Reporting.pdf
PPTX
1.Introduction to orthodonti hhhgghhcs.pptx
transformers as a tool for understanding advance algorithms in deep learning
American Journal of Multidisciplinary Research and Review
Delhi c@ll girl# cute girls in delhi with travel girls in delhi call now
Book Trusted Companions in Delhi – 24/7 Available Delhi Personal Meeting Ser...
ch20 Database System Architecture by Rizvee
ifsm.pptx, institutional food service management
inbound2857676998455010149.pptxmmmmmmmmm
DATA ANALYTICS COURSE IN PITAMPURA.pptx
Buddhism presentation about world religion
General category merit rank list for neet pg
Stats annual compiled ipd opd ot br 2024
book-34714 (2).pdfhjkkljgfdssawtjiiiiiujj
Capstone Presentation a.pptx on data sci
inbound6529290805104538764.pptxmmmmmmmmm
REPORT CARD OF GRADE 2 2025-2026 MATATAG
Concepts of Database Management, 10th Edition by Lisa Friedrichsen Test Bank.pdf
technical specifications solar ear 2025.
Classification methods in data analytics.ppt
9 FinOps Tools That Simplify Cloud Cost Reporting.pdf
1.Introduction to orthodonti hhhgghhcs.pptx

ATM Security Us-WPS Office.pptx

  • 1. ATM Security Using Eye and Facial Recognition System ARUN KRISHNA K 20042425
  • 2. CONTENTS • Introduction • Face recognition systems • How do they work • Methodology • Techniques and Methods • 2d Techniques • 3d Techniques • Surface-Texture-Analysis • Iris Recognition
  • 3. • HOW THE SYSTEM WORKS • Conclusion
  • 4. INTRODUCTION The rise of technology into India has brought into force many type of equipment that aim at more customer satisfaction. ATM is one such machine which made money transaction easy for customers to the bank. But it has both advantages and disadvantages. Current ATMs make use of naught more than an access card and PIN for uniqueness confirmation. This has ATM Using Face Recognition System demonstrate the way to a lot of fake attempt and mistreatment through card theft, PIN theft, stealing and hacking of customers account details and other parts of security. This process would effectively become details and other part of security. This process would effectively become an exercise in pattern matching, which would not require a great deal of time.
  • 5. FACE RECOGNITION SYSTEMS FRS is an application that mechanically identifies a person from a digital image or a video outline from a video source. One of the behaviors to do this method is by matching chosen facial features from a facial database and the image. In this system, with appropriate lightning and robust learning. Further a positive visual match would cause the live image to be stored in the database so that future transactions would have broader base from which to compare if the original account image fails to provide a match –thereby decreasing false negatives.
  • 7. HOW DO THEY WORK A database of peoples face is maintained by the system that handles face detection. There are typically 3 parts related to a face recognition: • Face-detector • Eye-localizer • Face-recognizer
  • 8. 1. Face-detector:The face detector spot the face, eliminating any other detail, not related to the face (like the backdrop). It identifies the facial region and leaves the non-facial region in the photo of the person to be identified. 2. Eye-localizer: It finds the spot of the eyes; so that the position of the face can be identify better 3. Recognizer: It will check the database to find a match.
  • 9. METHODOLOGY The first and foremost important step of this system will be to locate a powerful open source facial recognition program that uses local feature analysis and that is targeted at facial verification. Various facial recognition algorithms be familiar with faces by extracting features, from a snap of the subject's face. For ex, an algorithm may examine the size, relative position, in addition to/or outline of the nose, eyes, cheekbone and jaw. These facial appearances are then used to search for other imagery across matching features. Other algorithm manages a balcony of face images and then compresses the images face information and it saves only the data in the image that is used for face detection.
  • 10. TECHNIQUES AND METHODS They are of three types:  2-D  3-D  Surface Texture Analysis
  • 11. 2-D-Technique The 2-D recognition method was individual of the original techniques employed. It maintained details of people‟s faces as seen two dimensionally. Details like width of the nose, width of the eyes, distance between the eyes, jaw line, cheek bone figure were used for contrast. This type of face recognition was not too precise. Change in facial expression or difference in ambient lighting on an appearance that is not directly looking into the camera did not produce expected results.
  • 12. 3-D-Technique Progression in face recognition gave origin to the 3-D recognition system. This stepped up technique, used facial appearance like contours of the eye sockets, chin, nose, peaks and valley on the visage for identification. The database will store details of faces also. The advantage of 3- D technique over 2-D method is that 3-D face identification works fine even if the face is turned at 90 degree to the camera. It is self-governing of lighting environment and facial expressions.3-D-Technique
  • 14. Surface-Texture-Analysis The most superior method is Surface Texture Analysis (STA). STA does not examine the entire face but a patch of membrane on it. This patch is divided into separate blocks. The skin surface, the pore on the skin and other face characteristics are converted to a code. This code is used for comparisonSurface-Texture-Analysis
  • 15. IRIS RECOGNITION In spite of all these security features; a new technology has been developed. Bank United of Texas became the first in the United States to offer iris recognition technology at automatic teller machines, providing the customers a card less, password-free way to get their money out of an ATM. there‟s no card to show, there's no fingers to ink, no customer inconvenience or discomfort. It's just a photograph of a Bank United customer's eyes. Iris recognition is an automated method of biometric identification that uses mathematical pattern-recognition techniques on video images of one or both the issues of an individual‟s eyes whose complex patterns are unique, stable, and can be seen from some distance. A key advantage of Iris recognition besides its speed of matching and its extreme resistance to false matches, is the stability of the Iris as an internal and protected, yet externally visible organ of an eye. Figure below shows an schematic diagram of Iris recognition.
  • 16. Just step up to the camera while your eye is scanned. The iris -- the colored part of the eye the camera will be checking -- is unique to every person, more so than fingerprints. And, for the customers who can't remember their personal identification number or password and scratch it on the back of their cards or somewhere that a potential thief can find, no more fear of having an account cleaned out if the card is lost or stolen.
  • 18. HOW THE SYSTEM WORKS When a customer puts in a bankcard, a stereo camera locates the face, find the eye and take a digital image of iris at a distance of up to two to three feet. The result computerized „iris code‟s compared with one of the customer will initially provide the bank. ATM won‟t work if the two codes don‟t match. The camera also does not use any kind of beam. Instead, a special lens has been developed that will not only blow up the image of the iris, but provide more detail when it does. Iris scans are more accurate than other high-tech id system available that scan voices and fingerprints.
  • 19. Conclusion We thus develop an ATM model which provides security by using Facial verification software Adding up facial recognition systems to the identity confirmation process used in ATMs can reduce forced transactions to a great extent. Using a 2d and 3d technology for identification is strong and it is further fortified when another is used at auntheticiation level.