0% found this document useful (0 votes)
22 views36 pages

Mini Pro (1) P.JOSHNA PROJECT

project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views36 pages

Mini Pro (1) P.JOSHNA PROJECT

project
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 36

Mini Project Report On

Smart ATM Pin Recovery and Secured


ATM Transactions Based on Fingerprint Identification
Submitted in partial fulfillment of the requirements for the award
of the degree of

BACHELOR OF TECHNOLOGY
In

COMPUTER SCIENCE AND ENGINEERING


Submitted By:

PALAPARTHI.JOSHNA 22UP1A05C9

Project Coordinator
Mrs. K. Sravanthi &

Mrs.AmulyaRachan

Assistant Professor

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

VIGNAN’S INSTITUTE OF MANAGEMENT AND


TECHNOLOGY FOR WOMEN

(Affiliated to JNTUH, Hyderabad, Accredited by NBA)

Kondapur(v), Ghatkesar(M), Medchal-


Malkajgiri(D)- 501301 [2022-2026]
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

CERTIFICATE

This is to certify that the Project work titled “Smart ATM Pin Recovery and Secured ATM Transactions
Based on Fingerprint Identification” submitted by P.JOSHNA ( 22UP1A05C9) of B-Tech in the partial
fulfillment of the requirements for the award of the degree of Bachelor of Technology in Computer Science and
Engineering to the Vignan’s Institute of Management and Technology for Women is a record of bona-fide work
carried out by them under my guidance and supervision. The results embodied in this project report have not been
submitted to any university for the award of any degree and the results are achieved satisfactorily.

Project Coordinator HEAD OF THE DEPARTMENT


Mrs. K. Sravanthi Mrs. M. PARIMALA Mrs. Amulya
Rachana
(Assistant Professor (Associate Professor)

(External Examiner)
DECLARATION

I, hereby declare that the results embodied in this dissertation entitled “Smart ATM Pin Recovery and

Secured ATM Transactions Based on Fingerprint Identification” is carried out by us during the year
2023-2024 in partial fulfillment of the award of Bachelor of Technology in Computer Science and
Engineering from VIGNAN’S INSTITUTE OF MANAGEMENT AND TECHNOLOGY FOR WOMEN
is an authentic record of our work carried under the guidance of Mrs. K. Sravanthi & Mrs. Amulya
Rachana (Assistant Professor), Department of Computer Science and Engineering. We have not submitted
the same to any other university or organization for the award of any other degree.

P.JOSHNA(22UP1A05C9)

ACKNOWLEDGEMENT

We would like to express sincere gratitude to Dr. G. AppaRao Naidu, Principal, Vignan’s
Institute of Management and Technology for Women for his timely suggestions which
helped us to complete the project in time.

We would also like to thank our madam Mrs. M Parimala, Head of the Department,
Computer Science and Engineering, for providing us with constant encouragement and
resources which helped us to complete the project in time.

We would like to thank our project guide, Mrs. K. Sravanthi & Mrs. Amulya Rachana,
Assistant Professor, Computer Science and Engineering, for his timely cooperation and
valuable suggestions throughout the project. We are indebted to his for the opportunity given
to work under his guidance.

Our sincere thanks to all the teaching and non-teaching staff of the Department of Computer
Science and Engineering for their support throughout our project work.

P.JOSHNA (22UP1A05C9)
Abstract

ATM (Automated Teller Machine) is an electronic telecommunication device that is used to perform financial
transaction without need for human clerk or bank teller. ATMs extend traditional banking hours by dispensing cash and
making other transaction available 24 hours a day. In ATM machines , the user is identified by inserting an ATM card
and authentication is provided by the customer entering a PIN. The PIN provided to the customer is compared with
recorded reference PIN number in the bank server. In the existing system, the user has to insert the card and the PIN
number. If the PIN is correct, the system allows for the transaction. Otherwise, the system asks for the PIN again and it
allows maximum of three times to enter it. After 3 trials the ATM card will get blocked. To reactivate the card user need
to visit the bank and do the bank formalities, which is tedious and time consuming job.

CONTENTS

INTRODUCTION
1.1 INTRODUCTION
1.2EXISTING SYSTEM 1.3PROPOSED SYSTEM 1.4LITERATURE REVIEW

6
2. SYSTEM REQUIREMENTS
2.1 SOFTWARE REQUIREMENT
2.2HARDWARE REQUIREMENT 2.3INPUT AND OUTPUT

3. SYSTEM DESIGN
3.1 METHODOLOGY 3.2 RESEARCH

4. UML DIAGRM 4.1USE CASE DIAGRAM 4.2ACTIVITY DIAGRAM 4.3ARCHITECTURE


OF THE MODEL 5. PRESENT ATM
5.1 PRESENT ATM 5.2 IMPLEMENTATION 5.3 FINGER PRINT RECOGNITATION BASED
ON ATM 5.4 ADVANTAGES 5.5 DISADVANTAGES 5.6 REST PASSWORD/PIN

6. MODULES 7. QRCODE 8. RESULT 9. CONCLUSON 10. FUTURE SCOPE 11.


REFERENCE

INTRODUCTION

1.1 INTRODUCTION

PIN based verification is mostly done in the automatic teller machine transactions. Enhancing this security, user
authentication process is an important activity. The major problems include shoulder-surfing attacks, replay attacks,
card cloning, and PIN sharing. Multiple researches have also been conducted to create systems supporting card-less
transactions. These are getting popular, where users can use additional personal devices, such as mobiles phones, to
perform atm transactions. Shoulder-surfing attacks, also known as observation attacks, are most common threat for
ATM authentication.

In this case, the attacker simply views the entry procedure of the PIN by the authorized user to get hold of the secret
information. Credit card and debit card frauds due to identity thefts are increasing every year. Additionally, there are
scamming techniques using fake terminals, credit card cloning, and remote relay which make the process of user
protection harder. The attacker can be standing in queue behind the authenticating person and looking at the PIN entry

7
and execute a shoulder-surfing or observation attack. The attacker may also install a small camera on the top surface of
the ATM terminal to record PIN entries of users at the point-of-service.

The attacker can install a card skimming device on the ATM machine to get hold of the user’s card information. Such
devices fit at the card slot on ATM machines and record the card information as the user slides in their card. The
security level is thus improved by providing a PIN authentication protocol for ATM using mobile applications in smart
phones. Image processing technique is further used for user identity checking process when a maximum of three PIN
attempts is made by the user.

1.2 EXISTING SYSTEM

In our modern world, all the people used to do truncation in banking like deposit money and withdrawing money. For
that, the customers will be standing in queue to withdraw money from bank. All the customers felt like waiting for
withdraw cash. Therefore, that bank introduces ATM (Automated teller machine) to help the customer to withdraw
money quick. In that ATM system, they introduce CARDS (Credit, Debit, master, Visa to the customer to withdraw cash
by using them. Main advantage is quick cash providing by the ATM system. The customer feels happy and they will not
waste time to withdraw cash by standing. but it has the disadvantage like, smart cards and physical keys, can be stolen,
lost, replicated, or left behind; passwords can be shared, forgotten, hacked or accidentally observed by a third party. The
banks required a better system to maintain security for the customer to do the transaction in their banks. To overcome
these problems, the developed this fingerprint based ATM system. Everyone used to do banking like storing cash and
withdrawing cash. The clients will be in line to extract cash from the bank. The clients felt like biding one's time to
withdraw money. That bank proposes an ATM (Automated teller machine) to aid the client extract cash quickly. In such
an ATM, they propose CARDS (Visa, Credit, master, Debit) to the client to extract money through their usage. Major
8
merit is fast money provided by the ATM. The customers feel joyful and they shall not throw away time to take out
money being in queue. Still it has a main limitation like, physical keys and smart cards, may be theft, misplaced,
duplicated, or forgotten; passwords may get distributed, unremembered, hacked or seen by some third party. Banks
needed a good mechanism to manage protection for the clients to make the transaction in the banks. To get rid of issues,
we have brought this fingerprint based ATM system.

1.3 PROPOSED SYSTEM

* Usually the user inserts the ATM card in the ATM machine and enters Personal Identification Number
(PIN) for the transactions. If the user forgets the PIN and enters the wrong PIN then the ATM machine will provide two
more attempts to enter the valid PIN. If the user fails to provide the correct PIN after three attempts, the bank server will
block the ATM card of the user. Now user has to visit the bank to reactivate his/her ATM card, which is time consuming.
1.To avoid the user to visit the bank and do the formalities to reactivate his/her ATM card
2.To activate the ATM card of the user at the ATM centre itself with the help of finger print of the user.
3.To alert owner of the ATM card in case of misuse.

sssssssssssssssss

9
1.4 LITERATURE REVIEW.

The proposed methodology is based on identification of fingerprints of the ATM user. The user inserts the ATM card
and enters PIN to perform transactions. If the user enters the invalid PIN three times, an alert message will be displayed
as a pop-up on the ATM machine. The pop-up window displays the message “You have entered the inavlid PIN; please
try again”. After completion of three attempts it displays a pop-up message “Your card is blocked due to multiple
attempts; please give your registered fingerprint to create a new PIN”. User provides the finger impression for
authentication. If fingerprint matches then the bank server will provide flexibility for the user to create his/her new PIN
on the ATM machine itself. The main reason for introducing the Biometric system is to increase the overall security.
From the tests carried out we have been able to prove that the biometric identification for ATM transactions can be
practically implemented in a real time environment. The developed system provides ATM users with the facility to
change the PIN in the ATM machine itself.

SYSTEM REQUIREMENTS

2.1 SOFTWARE SPECIFICATION

OS: Windows 7 & above

Back-end: Python

Front-end: Java

2.2 HARDWARE SPECIFICATION

RAM: 4GB

Fingerprint scanner with USB cable

Processor: Intel core-i5, 64-bit


2.3 INPUT AND OUTPUT

System requirements Input: Image of fingerprint.

Output: Detection of key points.

1. Input image is converted into greyscale image then it is converted into binary image.
10
2. Skeleton image is obtained.

3. Using Harris corner detection algorithm, key points of fingerprint are detected.

4. Using key points, the fingerprints are matched.

The Matching Algorithm plays a key role in fingerprint recognition steps. We are using matching algorithms and the are
SURF (Speeded-Up Robust Features) algorithm and Harris corner detection algorithm.

SYSTEM DESIGN

3.1 METHODOLOGY

The proposed methodology is based on identification of fingerprint of the ATM user. The user inserts the ATM card and
enters PIN to perform transactions. If the user enters the invalid PIN for three times, an alert message will be sent to
registered mobile number and also a pop-up window will open on the ATM machine. The pop-up window displays the
message “You have entered wrong PIN; please give your registered fingerprint to create new PIN”. User provides the
finger impression for authentication.

If fingerprint matches then the bank server will provide flexibility for the user to create his/her new PIN on the ATM
machine itself. After that user will get message that you have successfully got new PIN. Now user can continue
transactions with this new PIN as earlier. Figure 1 shows the activity diagram of proposed system.

11
RESEARCH

3.2 RESEARCH

The methodology proposed by Webster and Watson (2002) was followed. In the subsequent pages of this chapter, the
steps taken to identify relevant literature is presented, along with the results of this procedure. The purpose of this
research is to present a secured and an energy efficient ATM banking system that is highly secured. At present most of
the ATM systems use triple-data Encryption Standard (DES) but the triple-DES has some drawbacks. It is vulnerable to
differential attacks and also slow in performance. Nawaz (2013). This research presents security in two ways, a design
that considers the fingerprint image for the client side security and also consider the AES algorithm for the secured
communication in between the client and server. Reducing the power consumption of AES (Advanced Encryption
Standard) circuits is a critical

problem when the circuits are used in embedded systems. Many circuit architectures for AES have been proposed
recently and their performances have been evaluated by using ASICof security issues affecting ATM system in banking
sector in Kenya. A survey is administered to a selected sample from Machakos. The term 'survey' is commonly applied
to a research methodology designed to collect data from a specific population, or a sample from that population, and
typically utilizes a questionnaire or an interview as the survey instrument (Robson,
1993)
Research design A descriptive research methodology is used for this research because it portrays accurately that most
ATM users have no confidence in the use of PIN as the only means of identity at the ATM machines, by conducting a
survey and fact finding. We used some survey methods like comparative.

and correlation approach conducting survey on users and also existing literature. This research has some aspects of
qualitative methods where the users opinions and attitude is used to come up with the conclusions about the use of PIN
and biometric at the ATM. Gravetter and Forzano
(2011) explain that descriptive research design involves the measurement of a variable or a set of variables as they
naturally exist. The research is aimed at collecting information from respondents in determining e-learning security
issues. Chandran (2004) notes that descriptive research designs are used in studies that answers the "who",
"what", "when", "where" and "how" questions. This design describe what is prevalent in security challenges in ATM
systems. The use of descriptive research design enabled the description of the identificationmight not be clear, this was
achieved by conducting a field editing where.

clarity is made as the data is being collected. Centralized


editing after the data is colle0cted.
The analysis is done by SPSS and there was need of assigning numerical values to the answers given during data
collection for the sake of coding and classification using tables to tabulate the findings to summarize the survey.
12
UML DIAGRAM

4.1 USE CASE DIAGRAM

13
4.2 ACTIVITY DIAGRAM

14
4.3 ARCHITECTURE OF THE MODEL

15
PRESENT ATM

5.1 PRESENT ATM

A computerized technology that establishes the role of being a monetary medium between the clients and the bank to
maintain the functionality of transactions without the presence of a third party. Some charge cards, be that as it may,
may experience more difficulty. ATMs are highly feasible because it allows the clients to perform any required
transaction without having the obligation to go to the bank.The PIN stands for Personal Identification Number. It is a
combination of four numbers, each one ranging from 0 to 9 amounts to a decade of PINs possible, which is preferably
set by the clients. This PIN remains universal throughout the longevity of the bank account until unless it is not changed
by the client. Since it is modicum in size, it can be swiftly memorized. The hacker has every technological tool at their
disposal to guess the accurate PIN [12][13]. When the client enters the PIN on the ATM screen then it is crossexamined
from the database of the bank organizations. The present ATM works in such a way that the person first enters the ATM.
He/she inserts his/her ATM card into the machine. Then, they enter the ATM PIN for verifying that they are the owner
of the ATM Card. After the verification, they select the type of Accounts from which they want to withdraw money. If
they have sufficient balance in their account, the ATM dispenses the amount and informed them via a Text Message /
Email about the transaction successful and remaining balance

16
17
PREENT ATM FLOWCHART

18
5.2 IMPLEMENTATION

The following are the actors considered


in this implementation:
1. Admin
2. ATM Registration Staff
3. Account Holder/User
1. Admin

19
In this module, the works done are initially login through ID/password. Then banks are added and can view those.
Adding customer details to bank accounts and if there are multiple accounts it maps customer's details.Admin can
deposit an amount to a particular customer account. Admin sends identification number to the customer through Email
ID using SMTP concept. Also Admin approves to ATM Machine Registration. Then loads cash to the ATM machine,
views the service request from the customer.

20
2. ATM Registration Staff

The security of ATM transactions relies mostly on the integrity of the secure cryptoprocessor: the ATM often uses
general commodity components that sometimes are not considered to be "trusted systems". So sensitive data must be
prevented from fraud. To prevent encryption is done which is a cryptographic method.To install an ATM machine,
firstly the bank basic details should be given with ID. Then the registration process is sent to the admin. Once the admin
approves ATM setup/Machine registration then the customer can use the ATM machine.

3. Account Holder/User
When the customer swipe card and enters the PIN number, the system verifies PIN with card number registered, if valid
then the customer home navigates to a different page where it displays multiple accounts bank names, there customer
should choose required bank.There the user can check balance, withdraw, view withdraw amount, view deposit, transfer
amount, view amount transfer details.
If the registered number and entered PIN are invalid, the machine gives three attempts to enter valid PIN. After three
invalid attempts the card will be blocked. Then the user is asked to swipe through the fingerprint scanner, if it is the
correct one then the PIN number is shared through registered Email where he can login and enter the right PIN. Also he
can change PIN number in the ATM machine.

21
5.3 FINGER PRINT RECOGNITION BASED ON ATM SYSTEM

The most widely accepted security measure to be installed in the ATM is of biometric fingerprint technology. It delivers
a much more secure initiative than the existing ATM security.

The quality of this technology to be elegantly aligned with our present lives is quite impressive as it is quite
undemanding to install and to be operated at. Due to this, it is accoladed as one of the most successful authentication
techniques. The fingerprints data are not stored in any database; thus, no misuse of the fingerprint is conceivable. [24]
The unique finger impression ID depends on two fundamental suppositions: - Invariance and Peculiarity Invariance.
Invariance implies the finger impression qualities don't change along with life. Peculiarity: implies the unique mark is
extraordinary and no two people have a similar example of a unique finger impression.

Features of a Fingerprint.

Types of Fingerprints.

22
Unique biometric impression:The unique pattern is the component example of the biometric authentication as follows.
* Step 1) Binarization: It describes the changes from greyscale into binary picture by finalizing the esteem value. *
Step 2) Block Filter: It is the method of diminishing.

the thickness of all ridgelines to a solitary pixel *


width to extricate minutiae viably.
* Step 3) Minutiae Extractruction: Details are inferred following minutiae removal.
* Step 4) Minutiae Matching: It is to compare the data of distinctive finger impressions. The layout of minutiae
coordination is also employed.
* Step 5) Matching Score: It is the relation to calculate the collaborating score of the original fingerprint & template
data.

5.4 ADVANTAGES.
23
Advantages
Fingerprint based ATM System is more secure than ATM card.
User can make transaction using his fingerprint anywhere and at any time he need not have to carry ATM card.

5.5 DISADVANTAGES.

If the User finger pattern has some cut or got damaged the system might not recognize the user.

5.6 RESET PASSWORD / PIN.

We understand that forgetting your passwords for Internet Banking, Mobile Banking, or ATM can be a frustrating
experience. This page will guide you through the process of resetting your passwords in a seamless and secure manner.
Our top priority is to ensure the safety and security of your personal and financial information, which is why we have
implemented strict protocols for resetting passwords. On this page, you will find step-by-step instructions on how to
reset your password for each of our banking services, along with helpful tips to prevent forgetting your password in the
future.

Our team of dedicated customer service representatives is also available 24/7 to assist you with any further inquiries or
concerns. At Federal Bank, we strive to provide our customers with a seamless and hassle-free banking experience, and
we are committed to ensuring the security of your accounts.

MODULES

24
Figures There are three modules in the process of the proposed system. Each process is dependent on the previous
process.
* Bank Account Registration
* Transaction Process
* PIN Re-entry process

Bank Account Registration.

Initially the users should register in the bank with the mobile application by installing in smart phones. The user should
submit his personal details such as user name, password, date of birth, address, email id, mobile number, International
Mobile Station Equipment Identity (IMEl) number, user image. The user's mobile IMEI number is automatically
detected and sends to the bank while completing the registration process. The IMEI is registered so as to validate the
user mobile identity each time he tries to access the ATM machine. Thus the bank database stores all the necessary
details about each user. The image provided by the user will be cropped using HAAR technique.

HAAR Technique.

25
HAAR is a technique which is used to recognize the face region in an image. A window is moved over the given image
to detect only the face region. The input image is divided into two images namely positive image (image with face) and
negative image (image without face). Having more number of positive and negative images will normally cause a more
accurate classifier.

MOVING WINDOW

Transaction Process.

The user, along with the personal mobile approaches the ATM to perform a secure transaction. The ATM screen displays
a " Touch to begin " information screen by default.
The user touches the screen to initiate the transaction. At this point, the ATM sends an ATM_TRAN_REQ message to
the bank's secure server. The structure of the message is defined as.
26
ATM_TRAN_REQ—
→ Req_ID,Loc_ID]

Here the Req_ID is a request identifier which is generated by the ATM for this current transaction request. The Loc ID
is the unique and verified identifier for the particular ATM point-of-service assigned by the bank. Upon receiving the
ATM_TRAN_REQ message from the ATM, the bank generates a transaction identifier, Tran ID, for this particular ATM
transaction request. The bank then generates an one-time-password for the transaction to be made at the ATM.
Finally, the bank creates a record, REC, for the received ATM TRAN REQ message, and stores it on the local database.
REC→ [Req ID,Loc ID,Tran ID, Validity, OTP,TS,IsUsed] Here, TS is the timestamp at which the ATM TRAN REQ
message was received by the bank from the ATM. The bank can specify a time limit for OTP. The bank stores the
Validity for the maximum period of time within which the PIN template has to be used. Additionally, the IsUsed flag is
set to FALSE and is saved to keep track if the particular transaction request has been successfully completed or not.
Next, the bank server responds to the transaction request made by the ATM using an ATM TRAN RES message. The
structure of the message is defined as:

ATM TRAN RES→ [Tran ID, Validity, OTP ]


Here, the Tran ID is the identifier generated by the bank for this particular transaction request. The bank also sends the
Validity token, a timer for the maximum allowed time limit for the particular OTP and transaction request for the
current user. Once the ATM receives the ATM TRAN RES message, it extracts the Tran ID, and generates a quick
response (QR) code. The QR code is generated from the following context: QR Code→ [Loc ID,Req ID,Tran ID].

Here, the Loc ID, Req ID, and Tran ID are the location, request, and transaction identifiers respectively. The QR code is
then displayed on the ATM screen.

PIN Re-Entry Process.


27
Given that the user received a success status in the
USR_TRAN_RES message, the One Time Password(OTP) is then displayed on the user's mobile. The user then enters
the OTP on the ATM's input screen. The ATM machine gets the user's OTP input on the screen. The OTP which the
ATM received earlier in the ATM TRAN RES message is then used by the ATM to authenticate the user credentials and
completes the transaction.

After the pin validation by the ATM machine, if it is successful that user should be asked to enter the transaction
amount. Once the transaction successful the user will get the SMS alert about remaining balance. If the transaction
amount exceeds than the available balance, the ATM machine will shows the error message. Then the current available
balance is sent to the user's mobile.

If the user wrongly enters the PIN he/she will be given three attempts for properly entering the pin. The user image will
be captured and send to the bank server, after three consecutive unsuccessful attempts. The bank server will check the
user image by searching in the bank account holder's image database. If the user identity is matched then the user will
get the pin Re-entry option again. If the Identity is not matched, the user account will be blocked.

28
QRCODE

QR code (abbreviated from Quick Response Code) is the trademark for a type of matrix barcode (or two-dimensional
barcode). A barcode is a machine-readable optical label that contains information about the item to which it is attached.
A QR code uses four standardized encoding modes (numeric, alphanumeric, byte / binary, and kanji) to efficiently store
data extensions may also be used. A QR code consists of black modules (square dots) arranged in a square grid on a
white background, which can be read by an imaging device (such as a camera, scanner, etc.) and processed using
ReedSolomon. error correction until the image can be appropriately interpreted.

The required data are then extracted from patterns that are present in both horizontal and vertical components of the
image. At this point, the user is able to see the QR code displayed on the ATM screen. The user then uses his personal
mobile device which consists of the SEPIA application to scan the QR code. Upon a successful QR code scan, the Loc
ID, Req ID, and Tran ID are transferred to the user's device from the ATM screen.
Once the user scans the QR code on the ATM screen, a USR_TRAN_REQ message is created and sent to the bank
server over secure communication channel.

The structure of the USR_TRAN_REQ message is as follows:


USR_TRAN_REQ→ [Username, Password, Loc ID, Req ID,
Tran ID].In this message, the Loc ID, Req ID, and Tran ID had been obtained from the QR scan, and the username and
password are the user's personal SEPIA service settings which have been previously saved on the bank's website. The
bank's cloud-based server receives the USR_TRAN_REQ message from the user's personal mobile.
SOUECE CODE.

//create ATMExample class to implement the ATM functionality


public class ATMExample
{
//main method starts
public static void main(String args[] )
{
//declare and initialize balance, withdraw, and deposit int
balance = 100000, withdraw, deposit;

//create scanner class object to get choice of user


Scanner sc = new Scanner(System.in);

while(true)
29
{
System.out.println("Automated Teller Machine");
System.out.println("Choose 1 for Withdraw");
System.out.println("Choose 2 for Deposit");
System.out.println("Choose 3 for Check Balance");
System.out.println("Choose 4 for EXIT");
System.out.print("Choose the operation you want to perform:");
//get choice from user int
choice = sc.nextInt();
switch(choice)
{ case
1:
System.out.print("Enter money to be withdrawn:");

//get the withdrawl money from user withdraw


= sc.nextInt();

//check whether the balance is greater than or equal to the withdrawal amount
if(balance >= withdraw)
{
//remove the withdrawl amount from the total balance balance
= balance - withdraw;
System.out.println("Please collect your money");
} else
{
//show custom error message
System.out.println("Insufficient Balance");
}
System.out.println(""); break;

case
2:

System.out.print("Enter money to be deposited:");

//get deposite amount from te user deposit


= sc.nextInt();

//add the deposit amount to the total balanace


balance = balance + deposit;
System.out.println("Your Money has been successfully depsited");
System.out.println("");
break; case 3:
//displaying the total balance of the user
System.out.println("Balance : "+balance);
30
System.out.println("");
break; case 4:
//exit from the menu
System.exit(0);
}
}
} }

OUT PUT

Choose 4 for EXIT

Choose the operation you want to perform:2

Enter money to be deposited: 5000

Your Money has been successfully depsited

Automated Teller Machine

Choose 1 for Withdraw Choose 2 for Deposit

Choose 3 for Check Balance

Choose 4 for EXI

31
Choose the operation you want to perform:3

Balance : 55000

Automated Teller Machine

Choose 1 for Withdraw Choose 2 for Deposit

Choose 3 for Check Balance

Choose 4 for EXIT

Choose the operation you want to perform:-

C: \Users \ajeet\OneDrive \Desktop programs> javac ATMExample. java

C: \Users \ajeet\OneDrive \Desktop programs> java ATMExample

Automated Teller Machine


Choose 1 for Withdraw Choose 2 for Deposit

Choose 3 for Check Balance

Choose 4 for EXIT

Choose the operation you want to perform:1

Enter money to be withdrawn: 50000

Please collect your money

Automated Teller Machine

Choose 1 for Withdraw Choose 2 for Deposit

Choose 3 for Check Balance

Choose 4 for EXIT

Choose the operation you want to perform: 2

32
SOUECE CODE.

import java.util.Scanner; public

class ATM_Transaction

{ public static void main(String args[]

{ int balance = 5000, withdraw,

deposit; Scanner s = new

Scanner(System.in); while(true)

System.out.println("Automated Teller Machine");

System.out.println("Choose 1 for Withdraw");

System.out.println("Choose 2 for Deposit");

System.out.println("Choose 3 for Check Balance");


33
System.out.println("Choose 4 for EXIT");

System.out.print("Choose the operation you want to perform:");

int n = s.nextInt(); switch(n) { case 1:

System.out.print("Enter money to be withdrawn:");

withdraw = s.nextInt(); if(balance >= withdraw)

{ balance = balance -

withdraw;

System.out.println("Please collect your money");

} else

System.out.println("Insufficient Balance");

System.out.println("");

break; case 2:

System.out.print("Enter money to be deposited:");

deposit = s.nextInt(); balance = balance +

deposit;

System.out.println("Your Money has been successfully depsited");

System.out.println(""); break; case 3:

System.out.println("Balance : "+balance);

System.out.println(""); break;

case 4:

System.exit(0);

34
}

OUTPUT

$ javac ATM_Transaction.java
$ java ATM_Transaction

Automated Teller Machine


Choose 1 for Withdraw
Choose 2 for Deposit
Choose 3 for Check Balance
Choose 4 for EXIT
Choose the operation you want to perform:1
Enter money to be withdrawn:2000
Please collect your money

Automated Teller Machine


Choose 1 for Withdraw
Choose 2 for Deposit
Choose 3 for Check Balance
Choose 4 for EXIT
Choose the operation you want to perform:3
Balance : 3000

Automated Teller Machine


Choose 1 for Withdraw
Choose 2 for Deposit
Choose 3 for Check Balance
Choose 4 for EXIT
Choose the operation you want to perform:4

`
35
RESULT

The proposed ATM security system provides a mechanism for recovery of ATM PIN by using fingerprint identification.
The developed system is able to authenticate the user based on fingerprint identification. The system is able to send an
alert message to ATM card owner for entering the wrong PIN. The alert message is also sent to the owner of the card
upon successful creation of new PIN.

From the tests carried out we have been able to prove that, the biometric identification for ATM transactions can be
practically implemented in a real time environment. The developed system provides ATM users with the facility to
change the PIN in the ATM machine itself.

CONCLUSION

The proposed ATM security system provides a mechanism for recovery of ATM PIN by using fingerprint identification.
The developed system is able to authenticate the user based on fingerprint identification. The system is able to send an
alert message to ATM card owner for entering the wrong PIN. The alert message is also sent to the owner of the card
upon successful creation of new PIN.

From the tests carried out we have been able to prove that, the biometric identification for ATM transactions can be
practically implemented in a real time environment. The developed system provides ATM users with the facility to
change the PIN in the ATM machine itself.

FUTURE SCOPE

Bank can provide helpline number to block the ATM card. In case if the ATM card is being misused, user will get the
message of transaction which is performed through his/her card. By referring that message, user can call to helpline
number to block the ATM card through the registered mobile number.

36
REFERENCE

1. Alhassan M.E,Ganiyur S.O,Muhammad-Bello B.L,” An enhanced ATM security system using second level
authentication”,International journal of computer application(0975-8887),vol 111-no 5,feb 2015.

2. A.Gera,N.sethi, “A revived survey of various credit card fraud detection techniques,” International
Journal of Computer Science and Mobile Computing, vol. 3, no. 4, pp. 780 – 791, April 2014

3. G. Stanley, “Card-less financial transaction,” Apr. 21 2014, US Patent App. 14/257,588.

4. Gajjala Askok,Sai Venupradhap, Sivakumar, “Design and Implementation of security based ATM theft
Monitoring System”, International Journal of Engineering Inventions , vol 3,2013.

37

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy