SlideShare a Scribd company logo
1 of 21
AN ATM WITH AN EYE
THE FUTURE’S
TECHNOLOGY
1
Ch. John Williams
ECE Department
B.Tech IV Year
Outline
 ATM
 ATM WITH AN EYE
 ON THE MOST CUSTOMER IS
 WHERE IT IS USE
 WORKING
 TECHNIQUES
 HOW IT WORK
 FUNCTION
 PROTECTION
 CONCLUSION
 REFERENCES
2
Automated Teller Machine
An automated teller machine (ATM) is :
 Computerize telecommunications
 Made money transactions easy for customers to bank.
 Device that provides the customers of a financial transactions in
a public space without the need for a human clerk or bank teller.
 Security requiring combination Physical access card+
Password(PIN)
3
Personal Identification Number
(Pin)
PIN is one method used by banks and phone companies to
protect your account from unauthorized access
PIN is a confidential code issued to the cardholder to permit
access to that account
PIN should be memorized, secured and not given to anyone, not
even family members or bank employees
4
 The chances of misuse of this much hyped 'insecure' baby
product (ATM) are manifold due to the exponential growth of
'intelligent' criminals day by day.
 There is an urgent need for improving security in banking
region. With the advent of ATM though banking became a lot
easier it even became a lot vulnerable.
 Provide a cordless, password-free way to get their money out of
an ATM
An ATM With An
Eye
5
On Most Modern ATM, The
Customer Is
Identified by inserting a plastic ATM card with a magnetic
stripe or a plastic smartcard with a chip, that contains a unique
card number and some security information, such as an
expiration date or cvvc (cvv). Security is provided by : the
customer entering A personal identification number (PIN).
6
 By forcing the ATM match a live image of a customer’s
face/eye with an image stored in a bank database (associated
with the account number) when the data matches(account
image and stored image) user be considered fully verified
 A system can examine just the eyes, or the eyes nose and
mouth, or ears, nose, mouth and eyebrows, and so on.
Working
7
Techniques
BIOMETRIC IDENTIFICATION TECHNIQUES
 Finger Printing
 Retina Scanning
 Facial Recognition
 Iris Recognition
8
How It Work
A camera based in ash machine will
 Detect the pattern in second
 Compare it with one store in a central computer.
 Or encode on to the cash card.
A sensor system examines the randomly
 Formed features of the iris of the eye
 as unique as a fingerprint.
9
Where It Used
The development of such a system would
 serve to protect consumers
financial institutions alike from fraud
other breaches of security.
FIGURE-3
10
Camera Installation On ATM
Machine
FIGURE-4
11
Portrait camera
Camera Snapshots
Cash slot(Dispenser) camera
FIGURE-5
12
15/03/11 13
Function
13
Iris code generation
FIGURE-6 14
Steps Of Iris Working
15
EYE automatically discover SNMP enabled devices,
application servers and applications. EYE has up-to-date and
accurate end-to-end visibility on what’s happening on your
infrastructure.
Troubleshooting
FIGURE-6
16
Network of troubleshooting
17
Conclusion
We Thus Develop An Atm Model That Is
 More reliable in providing security by using facial recognition
software.
 By keeping the time elapsed in the verification process to a
negligible amount
 Try to maintain the efficiency of this ATM system
18
REFERENCES
[1] www.nationmaster.com
[2] www.google.co.in
[3] www.atmeye.net
[4] Wikipedia
19
20
21
QUERIES??

More Related Content

What's hot

biometric technology
biometric technologybiometric technology
biometric technologyAnmol Bagga
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemPraveena T
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPTsravya raju
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future walletLeelakh Sachdeva
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognitionmahesh123slideshre
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Siya Agarwal
 
eye phone technology
eye phone technologyeye phone technology
eye phone technologyNaga Dinesh
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technologysathyakawthar
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar reportJeevan Kumar D
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology pptDhara k
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentationvishal4799
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-pptRajesh Roky
 

What's hot (20)

Night vision technology
Night vision technologyNight vision technology
Night vision technology
 
biometric technology
biometric technologybiometric technology
biometric technology
 
Deaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition SystemDeaf and Dump Gesture Recognition System
Deaf and Dump Gesture Recognition System
 
BIOMETRIC IDENTIFICATION IN ATM’S PPT
BIOMETRIC IDENTIFICATION IN ATM’S  PPTBIOMETRIC IDENTIFICATION IN ATM’S  PPT
BIOMETRIC IDENTIFICATION IN ATM’S PPT
 
Money pad the future wallet
Money pad the future walletMoney pad the future wallet
Money pad the future wallet
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
An atm with an iris recognition
An atm with an iris recognitionAn atm with an iris recognition
An atm with an iris recognition
 
Presentation on security feature of atm (2)
Presentation on security feature of atm (2)Presentation on security feature of atm (2)
Presentation on security feature of atm (2)
 
Smart note-taker
Smart note-takerSmart note-taker
Smart note-taker
 
an atm with an eye
an atm with an eyean atm with an eye
an atm with an eye
 
eye phone technology
eye phone technologyeye phone technology
eye phone technology
 
Iris scanning
Iris scanningIris scanning
Iris scanning
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Palm Vein Technology
Palm Vein TechnologyPalm Vein Technology
Palm Vein Technology
 
Screenless displays seminar report
Screenless displays seminar reportScreenless displays seminar report
Screenless displays seminar report
 
Palm vein technology ppt
Palm vein technology pptPalm vein technology ppt
Palm vein technology ppt
 
Ppt presentation
Ppt presentationPpt presentation
Ppt presentation
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Rainbow technology-ppt
Rainbow technology-pptRainbow technology-ppt
Rainbow technology-ppt
 

Similar to An atm with an eye

anatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptxanatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptxTjMsd
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological InnovationEldad Lieberman
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...IJSRED
 
project_report
project_reportproject_report
project_reportEjaz Navas
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 

Similar to An atm with an eye (20)

anatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptxanatmwithaneye-130613013000-phpapp01 (1).pptx
anatmwithaneye-130613013000-phpapp01 (1).pptx
 
An ATM With Third Eye The Future’s Technological Innovation
 An ATM With Third Eye  The Future’s Technological Innovation An ATM With Third Eye  The Future’s Technological Innovation
An ATM With Third Eye The Future’s Technological Innovation
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
N044057478
N044057478N044057478
N044057478
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
ATM WITH AN EYE
ATM WITH AN EYEATM WITH AN EYE
ATM WITH AN EYE
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
Wireless Serial Data Synchronization for Money Transaction Using Multi Accoun...
 
Atm with an eye
Atm with an eyeAtm with an eye
Atm with an eye
 
H029044050
H029044050H029044050
H029044050
 
ATM (1)
ATM (1)ATM (1)
ATM (1)
 
project_report
project_reportproject_report
project_report
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
D0351022026
D0351022026D0351022026
D0351022026
 

More from John Williams

Employee job retention
Employee job retentionEmployee job retention
Employee job retentionJohn Williams
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedJohn Williams
 
Microwave engineering jwfiles
Microwave engineering jwfilesMicrowave engineering jwfiles
Microwave engineering jwfilesJohn Williams
 
Microcontroller 8051
Microcontroller 8051Microcontroller 8051
Microcontroller 8051John Williams
 
Lut optimization for memory based computation
Lut optimization for memory based computationLut optimization for memory based computation
Lut optimization for memory based computationJohn Williams
 
Llr test english_totalquestions
Llr test english_totalquestionsLlr test english_totalquestions
Llr test english_totalquestionsJohn Williams
 
Lecture notes -_microwaves_jwfiles
Lecture notes -_microwaves_jwfilesLecture notes -_microwaves_jwfiles
Lecture notes -_microwaves_jwfilesJohn Williams
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfilteringJohn Williams
 
Image processing9 segmentation(pointslinesedges)
Image processing9 segmentation(pointslinesedges)Image processing9 segmentation(pointslinesedges)
Image processing9 segmentation(pointslinesedges)John Williams
 
Image trnsformations
Image trnsformationsImage trnsformations
Image trnsformationsJohn Williams
 
Image processing3 imageenhancement(histogramprocessing)
Image processing3 imageenhancement(histogramprocessing)Image processing3 imageenhancement(histogramprocessing)
Image processing3 imageenhancement(histogramprocessing)John Williams
 
morphological image processing
morphological image processingmorphological image processing
morphological image processingJohn Williams
 
Arm teaching material
Arm teaching materialArm teaching material
Arm teaching materialJohn Williams
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recoverJohn Williams
 

More from John Williams (20)

Employee job retention
Employee job retentionEmployee job retention
Employee job retention
 
Moore's law & more
Moore's law & moreMoore's law & more
Moore's law & more
 
Mobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revisedMobile cellular-telecommunication-system-revised
Mobile cellular-telecommunication-system-revised
 
Mnr
MnrMnr
Mnr
 
Microwave engineering jwfiles
Microwave engineering jwfilesMicrowave engineering jwfiles
Microwave engineering jwfiles
 
Microcontroller 8051
Microcontroller 8051Microcontroller 8051
Microcontroller 8051
 
Lut optimization for memory based computation
Lut optimization for memory based computationLut optimization for memory based computation
Lut optimization for memory based computation
 
Llr test english_totalquestions
Llr test english_totalquestionsLlr test english_totalquestions
Llr test english_totalquestions
 
Lecture1
Lecture1Lecture1
Lecture1
 
Lecture notes -_microwaves_jwfiles
Lecture notes -_microwaves_jwfilesLecture notes -_microwaves_jwfiles
Lecture notes -_microwaves_jwfiles
 
Image processing spatialfiltering
Image processing spatialfilteringImage processing spatialfiltering
Image processing spatialfiltering
 
Image processing9 segmentation(pointslinesedges)
Image processing9 segmentation(pointslinesedges)Image processing9 segmentation(pointslinesedges)
Image processing9 segmentation(pointslinesedges)
 
Image trnsformations
Image trnsformationsImage trnsformations
Image trnsformations
 
Image processing3 imageenhancement(histogramprocessing)
Image processing3 imageenhancement(histogramprocessing)Image processing3 imageenhancement(histogramprocessing)
Image processing3 imageenhancement(histogramprocessing)
 
Friday xpress
Friday xpressFriday xpress
Friday xpress
 
Fft
FftFft
Fft
 
morphological image processing
morphological image processingmorphological image processing
morphological image processing
 
Arm teaching material
Arm teaching materialArm teaching material
Arm teaching material
 
4 things you_cannot_recover
4 things you_cannot_recover4 things you_cannot_recover
4 things you_cannot_recover
 
Lect21 Engin112
Lect21 Engin112Lect21 Engin112
Lect21 Engin112
 

Recently uploaded

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 

Recently uploaded (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 

An atm with an eye

  • 1. AN ATM WITH AN EYE THE FUTURE’S TECHNOLOGY 1 Ch. John Williams ECE Department B.Tech IV Year
  • 2. Outline  ATM  ATM WITH AN EYE  ON THE MOST CUSTOMER IS  WHERE IT IS USE  WORKING  TECHNIQUES  HOW IT WORK  FUNCTION  PROTECTION  CONCLUSION  REFERENCES 2
  • 3. Automated Teller Machine An automated teller machine (ATM) is :  Computerize telecommunications  Made money transactions easy for customers to bank.  Device that provides the customers of a financial transactions in a public space without the need for a human clerk or bank teller.  Security requiring combination Physical access card+ Password(PIN) 3
  • 4. Personal Identification Number (Pin) PIN is one method used by banks and phone companies to protect your account from unauthorized access PIN is a confidential code issued to the cardholder to permit access to that account PIN should be memorized, secured and not given to anyone, not even family members or bank employees 4
  • 5.  The chances of misuse of this much hyped 'insecure' baby product (ATM) are manifold due to the exponential growth of 'intelligent' criminals day by day.  There is an urgent need for improving security in banking region. With the advent of ATM though banking became a lot easier it even became a lot vulnerable.  Provide a cordless, password-free way to get their money out of an ATM An ATM With An Eye 5
  • 6. On Most Modern ATM, The Customer Is Identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or cvvc (cvv). Security is provided by : the customer entering A personal identification number (PIN). 6
  • 7.  By forcing the ATM match a live image of a customer’s face/eye with an image stored in a bank database (associated with the account number) when the data matches(account image and stored image) user be considered fully verified  A system can examine just the eyes, or the eyes nose and mouth, or ears, nose, mouth and eyebrows, and so on. Working 7
  • 8. Techniques BIOMETRIC IDENTIFICATION TECHNIQUES  Finger Printing  Retina Scanning  Facial Recognition  Iris Recognition 8
  • 9. How It Work A camera based in ash machine will  Detect the pattern in second  Compare it with one store in a central computer.  Or encode on to the cash card. A sensor system examines the randomly  Formed features of the iris of the eye  as unique as a fingerprint. 9
  • 10. Where It Used The development of such a system would  serve to protect consumers financial institutions alike from fraud other breaches of security. FIGURE-3 10
  • 11. Camera Installation On ATM Machine FIGURE-4 11
  • 12. Portrait camera Camera Snapshots Cash slot(Dispenser) camera FIGURE-5 12
  • 15. Steps Of Iris Working 15
  • 16. EYE automatically discover SNMP enabled devices, application servers and applications. EYE has up-to-date and accurate end-to-end visibility on what’s happening on your infrastructure. Troubleshooting FIGURE-6 16
  • 18. Conclusion We Thus Develop An Atm Model That Is  More reliable in providing security by using facial recognition software.  By keeping the time elapsed in the verification process to a negligible amount  Try to maintain the efficiency of this ATM system 18
  • 20. 20