On Research Paper

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 20

IMPROVING ATM SECURITY VIA

FACE RECOGNITION

Submitted to : Submitted by :
Prof. Nitin Kumar Hisham K-11716501
Lovely Professional University, Roll No: B67
Punjab
Section : EM010
INTRODUCTION
• Most bank customers tend to use Automated Teller Machines (ATMs) and
Internet portals to conduct their banking transactions.
• Unlike every other device, though, ATMs suffer from multiple user-caused
problems as well.
• Card and/or cash forgetting (CCF) is a common concern between these
problems.
• The key goal of my work is to develop an optimized ATM camera
computer vision system for facial detection and recognition so as to
prevent needless losses incurred by CCF, ATM robberies and fraud
activities by wrong individuals.
ATM SECURITY USING FACE RECOGNITION
• A facial recognition system is a computer application for automatically
identifying or verifying a person from a digital image or a video frame from a
video source.
• For verification in the ATM system, the proposed paper uses facial
recognition techniques.
• The first step is authentication, which is where the machine compares the
actual person to who the person claims they are, and offers a yes or no
answer.
• The next step is defining which is where the program compares the given
person to the other users in the database and provides a ranking list of
matches
• This Biometric Methodology sets out an analysis framework with PCA
algorithms for each type of biometric device.
SHORT TERM FACE RECOGNITION
FOR ATM USERS
• The limited time frame of ATM usage and extreme motion artifacts make this
problem very different from an ordinary face authentication or face
recognition problem.
• Under demanding conditions of real ATM use I test the proposed method.
• The experimental results on multiple databases indicate that our proposed
system is promising to reduce card / cash forgetting problems and enhance
user experience with ATM
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
• The face image is divided into several regions from which the distributions of
the LBP ( local binary patterns ) feature are extracted and concatenated into
an enhanced vector to be used as a face descriptor.
• Four parameters of LBP are:
1. Radius
2. Neighbors
3. Grid X
4. Grid Y
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
1. Algorithm training:
• we will use a file containing the facial photographs of the individuals we want
to remember.
• You will need to set an ID for each image, and the algorithm can use this
information to identify an input image and send you an result.
• Pictures of the same person must have the same identification.
2.Applying the LBP operation:
• The LBPH's first analytical step is to construct an intermediate image that
best represents the original one, emphasizing the facial features.
• To do so, the algorithm uses a concept of a sliding window, based on the
parameters radius and neighbors.
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
• The image below shows this procedure:

• We have a new image at the end of this procedure (LBP


procedure), which reflects the characteristics of the original
image better.
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS

The LBP procedure was expanded to use a different number of radius


and neighbors, it is called Circular LBP.
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
3.Extracting the Histograms:
• Now we can use the image created in the last step to divide the image
into multiple grids using the Grid X and Grid Y parameters, as can be
seen in the following image:
FACE DESCRIPTION WITH LOCAL BINARY PATTERNS
4.Performing the face recognition:
• The algorithm is already trained in this phase. Each histogram
generated from the training dataset is used to represent every image.
• And we only need to compare two histograms and return the image to
the nearest histogram to find the picture that matches the input picture.
• To compare the histograms we can use different approaches (calculate
the distance between two histograms), for example: euclidean
distance, chi-square, absolute value, etc. In this case, based on the
following formula, we can use the Euclidean distance (which is very
known):
ADVANTAGES
• ATM authentication model that will improve efficiency incorporates
a physical access token, a PIN and facial recognition to enhance
ATM transaction usability.

• Identifying a legitimate or invalid customer, and preventing access


to the ATM by the wrong person.

• Wrong person wearing a mask and getting some item that wasn't
cashed and blocked.
ARCHITECTURE DIAGRAM
• The architecture of the inputs is the relation
between the consumer and the information system.
• It requires the creation of data preparation
requirements and procedures and those steps are
required to place transaction data in a functional
way for analysis
• The following issues were considered by Input
Design:
• What data should be sent as input?
• How will data be coded or arranged?
• Dialog to direct the feedback of the administrative
staff.
• Methods to prepare validations of inputs and steps
to follow when error occurs.
OUTPUT DESIGN
• Efficient and clever performance architecture strengthens the
interaction with the device and enables consumer decision-
making.

• The production type of an information system will accomplish one


or more of the following goals.
> Provide information on previous events, current
conditions or future predictions.
> Signal important events, opportunities problems, or
warnings.
> Trigger an action & Confirm an action
MODULE DESCIPTION
• Preprocessing:conducted histogram equalisation after cropping out
the face area in order to prevent adjustments in lighting.
• Then an ellipse-shaped mask is used to eliminate certain corner
regions like the collar to reduce these regions' unwanted effects.

• Function extraction: The Local Binary Pattern (LBP) operator is used


for our face description after the preprocessing step.
• LBP is one of the highest performing texture descriptors and has been
commonly used in a number of applications.
MODULE DESCIPTION
• Verification system: Used to check the identification of the face
and body of the user and compare the reference collection, it
provides accurate results to make the right judgement and verifies
the accurate user or incorrect user using the frontal images taken
by an embedded ATM device.

• Object Detection: Using OpenCV's built-in haar cascade profile


face detector, this module is used to detect the user may be
wearing mask and have some object(strike, shot, knife). User
wears broad mask incase use optimum angle of rotation to
optimise the identification of the nose.
SECURITY MEASURES OF ATMS

• Measuring the identification of the face and body using the


facial photographs collected by an integrated ATM camera.

• Its unexpectedly find the incorrect person blocking the card and
raising the alarm.

• Virtual keyboard

• Alarm sensor
VIRTUAL KEYBOARD
• Virtual keyboards can be categorized by the following aspects:
• Physical keyboards with distinct keys that include electronically
changable displays that are integrated into the keypads.
• Digital keyboards with keyboard templates or sensing areas for
touch screen.
• Human hand and finger movements are observed optically.
• Online virtual keyboards for various languages that don't need to
alter OS settings
CONCLUSION
• To avoid atm robberies and provide safety for atm, it
will be even harder than design to secure such a
complex system.

• And now people just begin to discuss some issues of


ATM Security. It gives us some experience in
implementing ATM network security services.
REFERENCE
 Article ‘ OpenVC face recognition’ by Adrian Rosebrock.
 K. J. Peter, G. Nagarajan, G. G. S. Glory, V. V. S. Devi, S.
Arguman and K. S. Kannan, Improving ATM Securityvia Face
Recognition.
 E. Derman, Y. K. Gec¸ici and A. A. Salah, Short Term Face
Recognition for Automatic Teller Machine (ATM) Users.
 A. Ross and A. Jain, Information Fusion in Biometri.
 Article ‘Face Recognition: Understanding LBPH Algorithm’ by
Kelvin Salton do Padro.
THANK YOU

You might also like