BiometricBasedSmartATMUsingRFID
BiometricBasedSmartATMUsingRFID
net/publication/347173626
CITATIONS READS
21 500
6 authors, including:
All content following this page was uploaded by M.E. Harikumar on 28 April 2023.
Abstract — In the present world, the usage of ATM to TABLE I. T IMELINE OF AN AT M – A BRIEFING
withdraw cash has increased. At the same time, theft and robbery
cases have also been increased that calls for the need for much- Period Development
secured ATM that provides additional features for security. In 1988 – 1994 (The starting
Cash deposit and cash withdrawal
this work, the aim is at security-based smart ATM which period)
functions based on RFID and fingerprint authorization for its
1995 – 1999 (Initial
access. The RFID number and fingerprint details are obtained developments) Mini statements and balance in quiry
from the user after which the recognized card number,
authorization status, and location of access are passed on for 2002 – 2004 (Extended Chequebook request, Fund transfers,
checking its authenticity with the database details. Once the developments) and T ouch screen facilities
information is validated with the retrieved database details then Railway and Airway ticket booking. Bill
the corresponding account holder gets the message if the 2004 – 2006 (Third-party
payment (like electricity, Broadband..).
services) Recharging for mobile phone
authorization is valid or not. The location, time, and date of the
access are also informed to the account holder. Additionally, this
2007 onwards Customized ATM services
enhances the security by placing vibration and flame sensors
which immediately notify in case of fire and breakage. To achieve
complete security, the face of the person accessing the ATM card As there are many ATM centres across India, each centre
is also recorded – using a camera – in the machine with time and must be ensured with security as the number of ATM theft
date of access that could be used in case of suspicion. cases are increasing day by day. As a result, in addition to
security officers at the ATM, more reliable security methods
Keywords—IoT; RFID; esp8266; microcontroller; fingerprint are necessary. Shockingly, nearly 50 theft cases have been
sensor; embedded system; signal processing. reported just between January 2020 and 16 April 2020 at
various ATM centres across India; a few of which also include
I. INT RODUCT ION
uprooting of the ATM [2]. Therefore, this project mainly aims
An Automated Teller Machine (ATM) is a computerized to build a secure, easily accessible, and safe ATM.
machine that provides customers of the banks the facility of
accessing their accounts for dispensing cash and to carry out II. THE EXIST ING SYST EM OF T HE AT M
other financial and non-financial transactions without the need The current ATM system provides two types of services.
to visit the bank branch. ATM’s were first used in London in The former one provides the customer with the cash requested
1967, and after 50 years, these machines were introduced and sends a message with a report of the amount taken and
nationwide. The growth of ATM development is briefed in account balance. The latter one is more advanced to accept the
Table I [1]. deposit from the user, provides credit card payment facilities ,
ATM points are conveniently located at multiple locations. and sends a message to the user about the transaction and
ATM of any bank can be accessed to withdraw cash in 24x7 account information.
hours, 365 days a year. If one is travelling overseas, then the The existing system of ATM has been briefed in Fig. 1. The
card can be used to draw currency of the country an individual input to the ATM is recognized through the input devices such
is travelling to, from the ATM. The use of an ATM is restricted as card reader and keypad. The card reader is an input device
only to the person who knows the PIN (Personal Identificatio n that is used to read data from the card which identifies the
Number). The single most benefit of the ATM is to save time user’s card number. The card is either swiped or pressed on the
in driving down to the branch and one need not has to waste card reader that captures the account information once a
time waiting in the queue to perform transactions. The ATM connection is established with the magnetic strip on the
facilities provide the option of banking instantly for various backside of the ATM card. This information is passed to the
transactions. Apart from cash withdrawal and checking account host server that uses the data to get details about the
balance, modern ATMs are used to open a fixed deposit with a cardholder. To get details from the user, currently have a
bank, recharge mobile, pay income tax, deposit cash, pay the keypad which contains around 48 keys that are interfaced with
insurance premium, apply for a personal loan, transferring the processor. The card is recognized using a Personal
cash, paying the bill, booking railway ticket, etc., Identification Number (PIN). After the PIN is authorized, the
user can choose any service provided by the ATM through the
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1
keypad. To ensure security, every card has a unique PIN and the incidents. It is important to note that the methods for
the PIN is sent to the host processor in the encrypted form. sending messages are cost-efficient in this project. Moreover,
using a camera to capture the face of the user at the ATM helps
reduce unwanted storage space as required by that of CCTV
cameras.
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1
GPS RFID
VIBRATIO N
SENSO R FLAME SENSO R MIT APP INVENTO R
Image detection
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1
The start-up icon of the developed mobile application has this case, the ATM displays it as an invalid user. The second
been shown in Fig. 4. The home page and its orientation of the case happens when the user accesses the system using a valid
application can be seen as shown in Fig.5. When a transaction card and give in the corresponding valid fingerprint for the
or an attempt for a transaction is made, the respective values card. In this case, the access is granted and the values of the
get updated in the firebase (the database used) which is RFID card number, location, and time of access are updated in
retrieved through the developed android application Fig.4. the Firebase and they are retrieved through the application. A
Following this, the respective values for RFID card number, message is sent to the registered phone number of t he
user ID, location of the access, access status, flame, and cardholder of the respective card stating that “the access is
vibration sensor status are updated in the application replacing authorized” along with GPS coordinates of the ATM where the
the text of the corresponding labels. Each label stands for one card was accessed and other credentials as shown in Fig.6 and
ATM. Fig. 7.
The third case happens when the access for the system is
given by a valid card but it is given an invalid fingerprint for
the respective card. The access is not granted in this case as the
system expects the corresponding fingerprint for the card
registered previously. The values for the RFID card number,
location, and time of access are updated in the Firebase and are
retrieved through the application. The response in the Firebase
Fig. 5. Home page of the application. & IDE has been shown in Fig. 8 for the denied case. A
message is sent to the registered phone number of the
Four possible cases can happen in the system developed in cardholder stating that the “access is denied” along with the
real-time working as shown in Table II. The first case happens GPS coordinates of the ATM where the card has been tried for
when a user uses or tries to access through an invalid card. In access and other credentials like time, date, etc. as in the Fig. 9.
Fig. 6. Firebase & IDE display for an authorized case. T he authorization has been indicated with the red colour circles on both platforms.
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1
Fig. 10. T ext message received by the police station and fire station.
Fig. 8. Firebase data for access denied case indicated by a red circle.
Fig. 9. T ext message received by the cardholder in a denied case. Fig. 12. Capturing the user’s face while accessing the AT M.
The fourth case is to ensure safety at the ATM by placing To keep track of people entering the ATM, a signal
flame and vibration sensors. In case, if someone tries to break processing technique for capturing the face of that person is
or damage the ATM, a message is sent to the police station used. The image of the CCTV placed in the ATM takes more
about the action with the GPS location of the ATM as shown in storage space. To reduce storage space, the python was used
Fig. 10. In case of fire, a message is sent to the fire station with for tracking the images of the faces of various people who use
the ATM. The camera fitted in the ATM tracks the people who
orized licensed use limited to: AMRITA VISHWA VIDYAPEETHAM AMRITA SCHOOL OF ENGINEERING. Downloaded on February 22,2021 at 08:55:10 UTC from IEEE Xplore. Restrictions ap
Proceedings of the Third International Conference on Smart Systems and Inventive Technology (ICSSIT 2020)
IEEE Xplore Part Number: CFP20P17-ART; ISBN: 978-1-7281-5821-1
are using the ATM. To implement this, the “OpenCV” module increased, to ensure security towards this issue in the proposed
in python is used. Haar feature-based Cascade classifier is used system, extra tiers of safety measure like face detection, iris
in the code which uses object detection algorithm to identify scanner, OTP generation can be added.
objects in an image or a video. When the program is executed,
the camera searches for a face with the help of the facial VI. REFERENCES
features using the classifier. Once the face is recognized, it is [1] Hota, Jyotiranjan. (2013). Growth of AT M Industry in India. CSI
flipped, reshaped and highlighted. A rectangular box is drawn Communications. 36. 23-25.
around the face and is pushed to the database. The capturing of [2] T he T imes of India, “Atm Crimes”. Available:
the face of the user is shown in Fig.11 and the location where https://timesofindia.indiatimes.com/topic/Atm-Crimes [Accessed: May
08,2020].
all the users’ images are saved is shown in Fig.12. Thus, these
specifications pave the way for an ATM system to be effective, [3] Christiawan, B. A. Sahar, A. F. Rahardian and E. Muchtar, "Fingershield
AT M – AT M Security System using Fingerprint Authentication,"
secure, and easily accessible. International Symposium on Electronics and Smart Devices (ISESD),
Bandung, 2018, pp. 1-6.J. Clerk Maxwell, A Treatise on Electricity and
V. CONCLUSION Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68 -73.
Thus this proposed system used the RFID card and the [4] S. Hazra, "Smart ATM Service," 2019 Devices for Integrated Circuit
(DevIC), Kalyani, India, 2019, pp. 226- 230.
user’s fingerprint for authorization. In the case of multiple
[5] S. Sankhwar and D. Pandey, "A Safeguard against AT M Fraud," 2016
accounts, different RFID cards can be used for each bank IEEE 6th International Conference on Advanced Computing (IACC) ,
accounts. The card closest to the proximity of the card reader Bhimavaram, 2016, pp. 701-705, doi: 10.1109/IACC.2016.135.
will be considered for the current operation. It enhances the [6] K. Archana, P. B. Reddy and A. Govardhan, "T o enhance the security
security by sending messages to the cardholders for the card for AT M with the help of sensor and controllers, "2017 International
holder’s register number about the location, date, and time Conference on Energy, Communication, Data Analytics and Soft
Computing (ICECDS), Chennai, 2017, pp. 1012-1015, doi:
through the GPS, regardless of if the transaction is valid or 10.1109/ICECDS.2017.8389590.
not. Also, a camera that is set regularly checks who is trying to [7] V. M. E. Jacintha, S. J. Rani, J. G. Beula and J. J. Johnsly, "An extensive
access the card in the ATM that helps in cases of fraud. It resolution of AT M security systems," 2017 T hird International
prevents accidents and robbery as the sensors that are fit Conference on Science T echnology Engineering & Management
(ICONST EM), Chennai, 2017, pp.934-938, doi:
immediately alert the respective departments. The effective 10.1109/ICONST EM.2017.8261340.
results for the prototype verify the proposed system for smart [8] Rhydo Labz. R30X Series Fingerprint Identification Module User
ATM. Manual. Available: https://www.rhydolabz.com/documents/finger-print-
The proposed system is just a prototype of an ATM system module.pdf. [Accessed: May 08,2020].
in which money transferring facilities can be added to be [9] P. A. Paresh and Dr. Latha Parameswaran, “Vision-based algorithm for
implemented at the ATM. In addition to sending the user the fire detection in smart buildings”, in Lecture Notes in Computational
GPS location of the ATM, the amount of cash withdrawn, the Vision and Biomechanics, vol. 30, Springer Netherlands, 2019, pp.
1029-1038.
image of the face of the user can also be sent. To increase the
[10] V. Ashokan and Murthy, O. V. R., “Comparative evaluation of
security against the theft and accidents at the ATM, more classifiers for abnormal event detection in ATMs”, in 2017 International
accurate sensors for fire detection and damage detection can be Conference on Intelligent Computing, Instrumentation and Control
inserted [9], [10]. Since the fraud in fingerprint recognition has T echnologies, ICICICT 2017, 2018, vol. 2018-January, pp. 1330-1333.