Downloads: 124 | Views: 300
Research Paper | Criminology and Forensic Science | India | Volume 2 Issue 2, February 2013 | Popularity: 6.4 / 10
An Approach to Authentication of Fingerprints in ATM
Sri Sachidananda S. Joshi, Bhavana. Desai, J. L. Kalyan
Abstract: This paper mainly deals with the authentication of the user by his fingerprint in ATM. In Conventional ATM system we use a card and a pin associated with it to authenticate ourselves. In traditional method of using card and pin to authenticate the user has many potential disadvantages, one such is the misuse of card by the third person. But by using fingerprint of the user to authenticate him, we can assure 100% security to the user. This paper contains the following modules: registering the user of the system in bank, storing the fingerprints of user with all details of him, scanning and matching of fingerprints in ATM. So this system provides a user a safe and convenient way to access their accounts in ATM without giving any chances to security issues.
Keywords: fingerprint authentication, ATM, fingerprint verification, fingerprint
Edition: Volume 2 Issue 2, February 2013
Pages: 123 - 126
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 143 | Views: 426
Criminology and Forensic Science, Philippines, Volume 9 Issue 1, January 2020
Pages: 776 - 781Bureau of Jail Management and Penology Implementation of the Therapeutic Community Modality Program in the Province of Nueva Ecija: An Assessment
MA. Virginia Cristina Bondad
Downloads: 126 | Views: 311
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 114 - 117Signature Scrutiny System in Banking Application
Bhavana Desai, J. L. Kalyan
Downloads: 108 | Views: 247
Criminology and Forensic Science, India, Volume 9 Issue 8, August 2020
Pages: 1442 - 1446Parental Hormone Helped to Grow the Rapist Mind
Umema Moisin, Adhiraj Sarkar
Downloads: 107 | Views: 289
Criminology and Forensic Science, India, Volume 2 Issue 2, February 2013
Pages: 118 - 122Proposed Approach for Iris Recognition in Security Based Applications
Sri Sachidanand S. Joshi, Bhavana Desai, J. L. Kalyan