منابع مشابه
Fingerprint Based Biometric ATM Authentication System
Biometrics technology is rapidly progressing and offers attractive opportunities. In recent years, biometric authentication has grown in popularity as a means of personal identification in ATM authentication systems. The prominent biometric methods that may be used for authentication include fingerprint, palmprint, handprint, face recognition, speech recognition, dental and eye biometrics. In t...
متن کاملFingerprint Based ATM Security by using ARM 7
The purpose of this project is to increase the security that customer use the ATM machine. Once user's bank card is lost and the password is stolen, the criminal will draw all cash in the shortest time, which will bring enormous financial losses to customer, so to rectify this problem we are implementing this project. The chip of LPC2148 is used for the core of microprocessor in ARM7, furthermo...
متن کاملATM Terminal Security using Fingerprint Recognition
Identification and verification of a person today is a common thing; which may include door-lock system, safe box and vehicle control or even at accessing bank accounts via ATM, etc which is necessary for securing personal information. The conventional methods like ID card verification or signature does not provide perfection and reliability. The systems employed at these places must be fast en...
متن کاملEnhancing ATM Security using Fingerprint and GSM Technology
There is need for improve security in ATM transactions. Due to tremendous increase in the number criminals and their activities, the ATM has become insecure. ATM systems today use no more than an access card and PIN for identity verification. The Personal Verification Number(PIN) not only give good security. The fingerprint is unique and cannot duplicate by others. This paper combine the pin ve...
متن کاملFingerprint based locking system
Fingerprint recognition technology allows access to only those whose fingerprints that are pre stored in the memory. Stored fingerprints are retained even in the event of complete power failure or battery drain. These eliminates the need for keeping track of keys or remembering a combination password, or PIN. It can only be opened when an authorized user is present, since there are no keys or c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bonfring International Journal of Software Engineering and Soft Computing
سال: 2016
ISSN: 2250-1045,2277-5099
DOI: 10.9756/bijsesc.8273