scholarly journals Survey On Biometric Based ATMs

Author(s):  
Anukul Muley ◽  
Akash Bendre ◽  
Priti Maheshwari ◽  
Shanmukh Kumbhar ◽  
Prof. Bhagyashree Dhakulkar

Nowadays Automated Teller Machines (ATMs) are widely used by people. People are dependent upon ATMs to conveniently meet their day-to-day needs. As it is an important factor there comes security. ATMs are electronic machines that are operated by customers to deposit or withdraw cash from banks. It is observed that the number of crimes related to ATMs is increased hence there is a need to provide better security to ATM machines. There are different technologies that are used to provide security to ATM machine which includes – RFID technology, fingerprint, face recognition, iris scan, OTP, reference number, random keypad, etc. In a traditional ATM system card and PIN numbers are used for authentication, where security plays a big concern, such as losing cards, stolen pin numbers, card cloning, shoulder surfing, fake keyboard, skimming, etc. In order to overcome these issues, this paper discusses various systems where ATM cards and pins are replaced by biometrics and how they made ATMs more secure.

Author(s):  
Samuel Selassie Yakohene ◽  
Winfred Yaokumah ◽  
Ernest Barfo Boadi Gyebi

Personal identification number (PIN) is a common user authentication method widely used especially for automated teller machines and point-of-sales devices. The user's PIN entry is susceptible to shoulder-surfing and inference attacks, where the attacker can obtain the PIN by looking over the user's shoulder. The conventional keypad with a fixed layout makes it easy for the attacker to infer the PIN entered by casual observation. This paper proposes a method of authentication to address these challenges. The paper develops a prototype numeric keypad with a layout akin to the conventional keypad, with the keys randomized for each PIN entry. The shuffle algorithm, Durstenfeld shuffle algorithm, is implemented in an application developed using JavaScript, which is a prototype-based object-oriented programming application that conforms to the ECMAScript specification. The prototype is implemented on three computing platforms for evaluation. The test proves the effectiveness of the system to mitigate shoulder-surfing and inference attacks.


2021 ◽  
Author(s):  
Vignesh Kanna P ◽  
Anusuya K.V ◽  
Vaishnavi P

Author(s):  
Arulprakash P ◽  
Vidhya K ◽  
Menaga priya E ◽  
Abinisha R ◽  
Manoj E

People enjoy the convenience of on-line services, but online environments may bring many risks. We propose a virtual password concept involving a small amount of human computing to secure users’ passwords in on-line environments. We adopt user determined randomized linear generation functions to secure users’ passwords based on the fact that a server has more information than any adversary does. We analyze how the proposed scheme defends against phishing, key logger, and shoulder-surfing attacks. To the best of our knowledge, our virtual password mechanism is the first one which is able to defend against all three attacks together. In this work, we discussed how to prevent users’ passwords from being stolen by adversaries. We proposed a virtual password concept involving a small amount of human computing to secure users’ passwords in on-line environments. We also implemented the system to do some tests and survey feedback indicates the feasibility of such a system. In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries in online environments and automated teller machines. We propose differentiated virtual password mechanisms in which a user has the freedom to choose a virtual password scheme ranging from weak security to strong security, where a virtual password requires a small amount of human computing to secure users’ passwords. Among the schemes, we have a default method (i.e., traditional password scheme), system recommended functions, user-specified functions, user-specified programs, and so on. A function/program is used to implement the virtual password concept with a tradeoff of security for complexity requiring a small amount of human computing


2010 ◽  
Vol 69 (3) ◽  
pp. 161-167 ◽  
Author(s):  
Jisien Yang ◽  
Adrian Schwaninger

Configural processing has been considered the major contributor to the face inversion effect (FIE) in face recognition. However, most researchers have only obtained the FIE with one specific ratio of configural alteration. It remains unclear whether the ratio of configural alteration itself can mediate the occurrence of the FIE. We aimed to clarify this issue by manipulating the configural information parametrically using six different ratios, ranging from 4% to 24%. Participants were asked to judge whether a pair of faces were entirely identical or different. The paired faces that were to be compared were presented either simultaneously (Experiment 1) or sequentially (Experiment 2). Both experiments revealed that the FIE was observed only when the ratio of configural alteration was in the intermediate range. These results indicate that even though the FIE has been frequently adopted as an index to examine the underlying mechanism of face processing, the emergence of the FIE is not robust with any configural alteration but dependent on the ratio of configural alteration.


Author(s):  
Chrisanthi Nega

Abstract. Four experiments were conducted investigating the effect of size congruency on facial recognition memory, measured by remember, know and guess responses. Different study times were employed, that is extremely short (300 and 700 ms), short (1,000 ms), and long times (5,000 ms). With the short study time (1,000 ms) size congruency occurred in knowing. With the long study time the effect of size congruency occurred in remembering. These results support the distinctiveness/fluency account of remembering and knowing as well as the memory systems account, since the size congruency effect that occurred in knowing under conditions that facilitated perceptual fluency also occurred independently in remembering under conditions that facilitated elaborative encoding. They do not support the idea that remember and know responses reflect differences in trace strength.


Sign in / Sign up

Export Citation Format

Share Document