BIOMETRIC AUTHENTICATION OF AN AUTOMATED TELLER MACHINE USING FINGERPRINT AND PASSWORD


BIOMETRIC AUTHENTICATION OF AN AUTOMATED TELLER MACHINE USING FINGERPRINT AND PASSWORD

TABLE OF CONTENTS

TABLE PAGE

COVER PAGE i

THESIS PAGE ii

DECLARATION iii

CERTIFICATION iv

ACKNOWLEDGEMENT v

ABSTRACTvi

TABLE OF CONTENT vii

LIST OF TABLE viii

LIST OF FIGURE ix

CHAPTER ONE: INTRODUCTION

1.0 Introduction 1

1.1 Background of Study 1

1.2 Statement of the Problem 4

1.3 Aim and Objectives of studies 4

1.4 Significance of Study 5

1.5 Scope of the Study 6

1.6 Limitations of study 6

 Definition of Terms 7

CHAPTER TWO: LITERATURE REVIEW

2.0 Introduction 9

2.1 Review of literature 10

2.2 The Automated Teller Machine 13

2.3 Types of ATM Fraud 15

2.4 Categories of Biometric 16

2.5 Types of Biometric 17

2.5.1 Fingerprint 17

2.5.2 Voice 18

2.5.3 Facial 19

2.5.4 Retina 21

2.6 Biometric Accuracy Criteria 22

2.7 Summary of Review 23

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.0 Introduction 25

3.1 Analysis of Existing System 26

3.2 Limitation of the Existing System 26

3.3 Justification of the New System 27

3.4 Methodology 27

3.5 Data collection 29

3.6 Proposed New System 30

3.7 Components of the New System 34

3.8 Representation of the System 35

3.8.1 Use case Diagram 35

3.8.2 Activity Diagram 36

3.8.3 Flow Chart Diagram 37

CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING

4.0 Introduction 40

4.1 Choice of programming language 40

4.1.1 Visual Basic 2010 40

4.1.1 Microsoft .Net Framework 41

4.1.2 Microsoft Server 2008 42

4.2 System Main Menu and Implementation 43

4.3 Implementation of the Subsystem 46

4.3.1 Account Holder Information 46

4.3.2 Card Holder Information 46

4.3.3 Alternate ATM user Detail 47

4.3.4 ATM Card form 48

4.4 Query Subsystem Implementation 52

4.5 System Testing and Integration 54

4.5.1 Testing 54

4.5.2 Integration 54

4.6 The Test Data 55

4.6.1 Hardware Requirement For the System 56

4.6.2 Software Requirement for the System 56

4.6.3 System Documentation 57

4.6.4  Software Maintenance 57

CHAPTER FIVE: SUMMARY, RECOMMENDATION AND CONCLUSION

5.0 Summary 58

5.1 Findings and Discussion 58

5.2 Suggestion for Future Work 59

5.4: Recommendation 49

5.3: Conclusion 60

REFERENCE 61

APPENDIX 63

LIST OF TABLES

TABLE         PAGE

Table 3.1 Analysis of Questionnaire 29

Table 3.2  Account Holder Information 33

Table 3.3 Card Holder Information 33

Table 3.4 Alternate User information 34

LIST OF FIGURE

FIGURE PAGE

Figure 2.1 Types of Finger Print 18

Figure 2.2 Sample of a voice Pattern 19

Figure 2.3 Sample of a Facial Recognition Pattern 21

Figure 2.4 Sample of Retina Images 22

Figure 3.1 Diagram of a client Server Architecture 28

Figure 3.2 Pie Chart Showing Result of the Questionnaire 29

Figure 3.3 Numeric Input Diagram 32

Figure 3.4 Biometric Input 32

Figure 3.5 Use Case Diagram of an ATM Processes 36

Figure 3.6 Activity Diagram 37

Figure 3.7 Flow chart Diagram 38

Figure 4.1 Start Page 43

Figure 4.2AdminLogin Interface 44

Figure 4.3 New account opening Form 45

Figure 4.4 Account Holder Information 46

Figure 4.5card holder Information 47

Figure 4.6Alternate User Detail 48

Figure 4.7 ATM Card Form 49

Figure 4.8 Insertion of ATM Card 50

Figure 4.9 Insertion of Password 51

Figure 4.10 Insertion of Finger Print 51

Figure 4.11 Admin Login 52

Figure 4.12 Incorrect password 53

Figure 4.13Test Data 55

CHAPTER ONE

INTRODUCTION

1.1   Background to the Study

In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is not always efficient. In view of this and the fast wind of  IT sweeping through Nigeria, had lead the bank to the utilization of an electronic device known as Automatic Teller Machine (ATM) for performing transaction without the physical presence of a bank delegate. Automated teller machine is a mechanical device that has its roots embedded in the accounts and records of a banking institution. It is a machine that allows the bank customers to carry out banking transactions like deposits, transfers, balance enquiries, mini statement, withdrawal and fast cash e.t.c. The ATM has gained wide utilization due to the 24 hours service it provides to customers. Khatmode R. K. et al,(2014).

Nearly 10 years since its introduction in Nigeria, the ATM has become the favored channel of financial transaction by most Nigerians. However, the expanding and wide acceptance of the ATM by the member of the public has led to a need to further build and enhance the security and integrity of the system. Utilization of ATM (Automatic Teller Machine) is helpful for monetary transaction. ATM transaction is initiated by inserting the ATM card and typing the PIN (Personal Identification Number) of that specific card. Despite the fact that bank allows their customers to choose their PIN, this system is not safe to use because anybody can access the system if they have the card and PIN number. The system looks at the code against a stored list of approved authorized passwords and users. PIN typically in a form of four digit combination of numbers that is entered via the ATM panel. If the code is genuine, the system permits access at the security level approved for the owner of the account. The strength of PIN as a security system is weakened and the likelihood of the code leaking to other people is high. In recent time, due to fraudsters advancements and technological improvement it is now possible to fix ATM Card scanners in ATM Machine to acquire encoded information from ATM Card, which is again used to create a copy of the ATM card and to make fraudulent transactions. This is the primary impediment of the current system. Conventional ATM systems authentication method has some limitations. Using ATM card and password cannot;

1. Verify the client's identity exactly.

2. Protect the card user against theft.

3. It is easy for fraudsters to get the PIN and perform fraudulent transactions.

4. Protect customers from Vulnerabilities and the increasing wave of criminal activities occurring at Automated Teller Machines (ATMs.)

 This has called for a more secure method of authentication at the ATM terminals. Biometrics based authentication is a potential technique in increasing ATM security. Among all the biometrics, fingerprint based identification is one of the most mature and proven technique. Biometric is a Greek Words, Bio means life and metric means measuring some objects that have life. Biometric measures both physiological and behavioral characteristics. These characteristics are finger prints, Voice patterns, hand measurements, irises and others (although this project will be limited to fingerprints alone). These characteristics are used to identify an individual, they are connected to an individual and cannot be forgotten, stolen, shared or easily hacked like passwords. 

Finger Print technology is the initial biometric science that uses unique features of the fingerprint to identify or verify the identity of an individual. Finger Print technology is the most deployed technology among other biometric characteristics and it application ranges from physical access to logical access. Each and every human have unique characteristics and patterns. A Finger Print pattern or sample consists of lines and spaces and these lines are referred to as Ridges while the spaces between these ridges are called valleys. These ridges and valleys are matched for verification and authorization. These unique finger print traits are referred to as “minutiae” and comparisons are made on these traits. There has been a significant surge in the use of Biometric based user authentication system in recent years because Bio-metric authentication offers several advantages over other authentication methods. The advantages that Biometrics presents are that the information is unique for each individual and that:

1. It can identify the individual in spite of variations in the time. 

2. It provides strong authentication

3. It can be easily implemented on existing system.

4. There are very less chances of two people having same fingerprint. 

Fingerprint is currently being used as variables of security during voting, operation of bank account among others. It is also used for controlling access to highly secured places like offices, equipment rooms, control centers and so on.The proposed system will be self manipulative, simple, fast and yet much more secure. It will provide a secure online transaction to protect the user against ATM Card frauds.

1.2 Statement of the Problem

The existing system is plagued with the following problems;

1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.

2. Passwords and PINs can be illicitly acquired by direct covert observation.

3. Easily guessed PIN's and passwords e.g. birthday, 1234 etc.

4. Malware can be placed at the ATM terminal by fraudsters to capture magnetic stripe data and PIN codes from the private memory space of transaction processing application installed on the ATM.

1.3      Aim and Objectives of the Study

The aim of this project is to design an ATM simulator that will combine PIN (Personal Authentication Number) verification system with finger print biometric system for more reliable authentication. The system is designed with the following objectives.

1. To explore the problem associated with the existing password Based system and pose the possible solutions

2. To develop a payment system simulator  with secure authentication using combination of biometric technology and Password (PIN)

3. To implement the system with various customer biometric and PIN data and test its functionality and robustness.

1.4     Significance of the Study

In present age, security has become an essential and fundamental tool of every organization. If we talk about money it comes with great importance. In the banking system, it is also a very confidential issue. The principle motivation behind ATM machine is to safeguard cash and ensure easy and fast accessibility to cash. But as of late a few security issues have emerge concerning the ATM. The significance of this project is the huge benefit it is going to be to the bank worker, the bank management and the customer at large. For  the bank management it will reduce the huge amount of cash lost to ATM fraud every year. The time spent by bank workers to resolve cases of ATM fraud too will be reduced thus affording them time for more pressing issues. Most bank provide the single (PIN) password authentication to their customers for ATM transactions but now a days it is no longer enough to guide the data  and proof the identity of the customer. It is so easy for fraudsters to obtain the PIN and perform fraudulent operation on ATM. To guide against this type of frauds bank can utilize dual user verification system so that banking operations becomes more secure. 

Furthermore, there is a sense of mistrust with PINs and Bank customers may feel that it is unsafe because they are worried that in the event that they lose their card that someone may find it and some way or the other is able to determine their PIN and steal their money from the ATM. In other to eliminate this threat, this project will focus on a consolidated strategy i.e. costumers insert their card & PIN, if costumers insert valid PIN then access is grant to another security approved process i.e. biometric fingerprint. Utilizing legitimate PIN & biometric fingerprint costumer can perform ATM transaction process i.e. deposits, transfers, balance enquiries, mini statement, Fast cash & withdrawal etc. By using fingerprint recognition combined with the old PIN method, customers are more comfortable with the idea of saving their money with the bank because they understand that if they lose their ATM card, no one can replicate their fingerprint and take their money. In banking system Biometrics holds the guarantee of quick, easy to utilize, precise, reliable, and less expensive authentication.

1.5 Scope of the Study

The scope of this project describe the simulation of an automated teller machine with the capability of the combination of both biometric (fingerprint) and password (PIN) based authentication with a view to provide a more secure Online banking transaction on ATM: Only banking system is captured. The biometric authentication system will consists of five main components. These are: sensor, feature extractor, fingerprint/template database, and matcher and decision module. 

1.6     Limitations of the Study

Benefits and Limitations are two side of one coin. Biometric ATM is useful for every aspect, but its limitations are given below:-

⦁ It depends on user acceptability.

⦁ Obtaining a clean image upon which to perform matching may be difficult due to Fingerprint worn out or cut due to hard labor work or age.

⦁ The requirement of biometric devices in ATM Machines will improve the cost of ATM Machine.

⦁ Since the simulated system will be design using Visual Basic.Net, it won’t be able to run on any other operating system beside Microsoft window operating system.

⦁ Due to the two step authentication process, the time it takes to perform a transaction will be increased.

⦁ Distinctiveness.: while a biometric trait is expected to vary significantly across individuals, there may be large inter-class similarities in the feature sets used to represent these traits.

1.7     Definition Of Terms

1. Biometric

Biometric is the science and technology of measuring and statistically analyzing biological data

2. Simulation

Simulation is the imitation of the operation of real world process or system over time

3. ATM

Automated Teller Machine is an electronic banking outlet which allows customers of various banking institutions complete basic transaction without the aid of a bank representative, teller or without being physically present at the bank.

4. PIN

Personal Identification Number(PIN)   a secret numeric password shared between a user and the system, that can authenticate the user to the system.

5. Authentication 

This is the process of identifying an individual usually based on a username and password with the aim of granting access to a system

6. Verification

Verification is the process of determining whether an individual is who he/she claims to be

7. Debit

This refers to the money paid out of a customer’s bank account. It is an entry recorded on the left side of a ledger.

8.

9. Credit

This refers to the money paid into a customers bank account, it is an entry recorded on the right side of a ledger.

10. ATM Card

ATM card is a small plastic card design with a magnetic strip or chip base, which can be assign by banks to their customer to provide an authorize access to his/her account using an electronic card payment system (i..e ATM, POS etc). Each card contains some features like a card number which contain the bank code, the customer name and the expiry date. It contains some security features which normally inculcated in the chip base or magnetic strip portion.  The bank code uniquely identifies the bank within the consortium. The card number determines the account that the card can access as the card is being linked to the customer’s account.

11. Interface

This is a point where two system or subjects  meet and interact or communicate it can either be a GUI (Graphical User Interface) or a CLI (Command Line Interface).

12. Client

Client is any device or process that request for service from a server.

13. Server

Server is any device or process that responds to request from a client.

.


TYPE IN YOUR TOPIC AND CLICK SEARCH.






RESEARCHWAP.COM

Researchwap.com is an online repository for free project topics and research materials, articles and custom writing of research works. We’re an online resource centre that provides a vast database for students to access numerous research project topics and materials. Researchwap.com guides and assist Postgraduate, Undergraduate and Final Year Students with well researched and quality project topics, topic ideas, research guides and project materials. We’re reliable and trustworthy, and we really understand what is called “time factor”, that is why we’ve simplified the process so that students can get their research projects ready on time. Our platform provides more educational services, such as hiring a writer, research analysis, and software for computer science research and we also seriously adhere to a timely delivery.

TESTIMONIES FROM OUR CLIENTS


Please feel free to carefully review some written and captured responses from our satisfied clients.

  • "Exceptionally outstanding. Highly recommend for all who wish to have effective and excellent project defence. Easily Accessable, Affordable, Effective and effective."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I saw this website on facebook page and I did not even bother since I was in a hurry to complete my project. But I am totally amazed that when I visited the website and saw the topic I was looking for and I decided to give a try and now I have received it within an hour after ordering the material. Am grateful guys!"

    Hilary Yusuf, United States International University Africa, Nairobi, Kenya.
  • "Researchwap.com is a website I recommend to all student and researchers within and outside the country. The web owners are doing great job and I appreciate them for that. Once again, thank you very much "researchwap.com" and God bless you and your business! ."

    Debby Henry George, Massachusetts Institute of Technology (MIT), Cambridge, USA.
  • "I love what you guys are doing, your material guided me well through my research. Thank you for helping me achieve academic success."

    Sampson, University of Nigeria, Nsukka.
  • "researchwap.com is God-sent! I got good grades in my seminar and project with the help of your service, thank you soooooo much."

    Cynthia, Akwa Ibom State University .
  • "Great User Experience, Nice flows and Superb functionalities.The app is indeed a great tech innovation for greasing the wheels of final year, research and other pedagogical related project works. A trial would definitely convince you."

    Lamilare Valentine, Kwame Nkrumah University, Kumasi, Ghana.
  • "Sorry, it was in my spam folder all along, I should have looked it up properly first. Please keep up the good work, your team is quite commited. Am grateful...I will certainly refer my friends too."

    Elizabeth, Obafemi Awolowo University
  • "Am happy the defense went well, thanks to your articles. I may not be able to express how grateful I am for all your assistance, but on my honour, I owe you guys a good number of referrals. Thank you once again."

    Ali Olanrewaju, Lagos State University.
  • "My Dear Researchwap, initially I never believed one can actually do honest business transactions with Nigerians online until i stumbled into your website. You have broken a new legacy of record as far as am concerned. Keep up the good work!"

    Willie Ekereobong, University of Port Harcourt.
  • "WOW, SO IT'S TRUE??!! I can't believe I got this quality work for just 3k...I thought it was scam ooo. I wouldn't mind if it goes for over 5k, its worth it. Thank you!"

    Theressa, Igbinedion University.
  • "I did not see my project topic on your website so I decided to call your customer care number, the attention I got was epic! I got help from the beginning to the end of my project in just 3 days, they even taught me how to defend my project and I got a 'B' at the end. Thank you so much researchwap.com, infact, I owe my graduating well today to you guys...."

    Joseph, Abia state Polytechnic.
  • "My friend told me about ResearchWap website, I doubted her until I saw her receive her full project in less than 15 miniutes, I tried mine too and got it same, right now, am telling everyone in my school about researchwap.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work"

    Christiana, Landmark University .
  • "I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!."

    Musa, Federal University of Technology Minna
  • "I was scared at first when I saw your website but I decided to risk my last 3k and surprisingly I got my complete project in my email box instantly. This is so nice!!!."

    Ali Obafemi, Ibrahim Badamasi Babangida University, Niger State.
  • To contribute to our success story, send us a feedback or please kindly call 2348037664978.
    Then your comment and contact will be published here also with your consent.

    Thank you for choosing researchwap.com.