Biometric ATM Using Constraint Based Finger-Vein Access
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
In the current world of technology, we humans are provided with a sophisticated lifestyle in several cases. Similarly, there exist several ways to duplicate or malfunction someone’s belonging. It is our responsibility to ensure our security, by upgrading ourselves along with various technical advancements. In this paper, the enhancement in ATM security has been proposed. Here, there are three approaches that have been concentrated. I- Personalizing ATM access using the finger-vein authentication. Sensors to capture the finger-vein can be used, since there is no chance of duplicating the vein format of a person. II- Providing enhanced around the clock surveillance system to efficiently utilize the resources. It reduces the effort of human security as the system is equipped with automated door-lock and an alarm system. III- Applying constraints to reduce the utilization time and maintain the sensor performance. Not all the users are intended to use their biometrics as it maybe a waste of time, for a balance enquiry or for lower amount of transactions.
Authors and Affiliations
R. Christinal, S. Pooja, P. Swetha
Power Analysis of Sequential Circuits Using MultiBit Flip Flops
In today's VLSI technology, power is the major issue with shrinking technology. Clock will play important role in the integrated circuits. In this paper, Multi-bit flip flop technique has been introduced to reduce clock...
Performance of Building for Different Orientation of Shear Wall
In this study we have considered shear wall system for the stability of structure against lateral forces. Shear wall is a vertical member which can resist moment, shear and axial load arising due to gravity and lateral...
Achieving High Secure Data Storage in Cloud Computing
Nowadays, cloud computing has attained great prominence due to various reasons for instance, on demand resource sharing and online storage of data. It is a collection of shared pool of information, resources that makes...
Power Factor Correction by Implementation of Reactive Power Compensation Methods of 220 KV Substation MPPTCL Narsinghpur
In an electric power system, which is AC (alternating current) by nature forms the most advantageous, the equipments and other industrial inductive loads draw reactive power and suffer with the problem of power factor i...
Mining Twitter Data of Rural Area Engineering Colleges for Understanding Issues and Problems in Their Educational Experiences
Students’ informal conversations on social media such as Twitter are useful for understand their learning experiences, and feelings. Data from such social media environments can provide valuable information about studen...