Preview

ATM FRAUD

Best Essays
Open Document
Open Document
3353 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ATM FRAUD
American Journal of Engineering Research (AJER)

2013

American Journal of Engineering Research (AJER) e-ISSN : 2320-0847 p-ISSN : 2320-0936
Volume-02, Issue-05, pp-188-193 www.ajer.us Research Paper

Open Access

Facial Verification Technology for Use In Atm Transactions
Aru, Okereke Eze, Ihekweaba Gozie
Department of Computer Engineering Michael Okpara University of Agriculture, Umudike, Umuahia, Abia
State, Nigeria Opara, F.K.
Department of Electrical/Electronics Engineering Federal University of Technology, Owerri, Imo State, Nigeria

Abstract: There is an urgent need for improving security in banking region. With the birth of the Automatic
Teller Machines, banking became a lot easier though with its own troubles of insecurity. Due to tremendous increase in the number of criminals and their activities, the ATM has become insecure. ATM systems today use no more than an access card and PIN for identity verification. The recent progress in biometric identification techniques, including finger printing, retina scanning, and facial recognition has made a great efforts to rescue the unsafe situation at the ATM. This research looked into the development of a system that integrates facial recognition technology into the identity verification process used in ATMs. An ATM model that is more reliable in providing security by using facial recognition software is proposed .The development of such a system would serve to protect consumers and financial institutions alike from intruders and identity thieves. This paper proposes an automatic teller machine security model that would combine a physical access card, a PIN, and electronic facial recognition that will go as far as withholding the fraudster‟s card. If this technology becomes widely used, faces would be protected as well as PINs. However, it obvious that man‟s biometric features cannot be replicated, this proposal will go a long way to solve the problem of Account safety making it



References: Adeoti, J. (2011). Automated Teller Machine (ATM) frauds in Nigeria: the way out. Adini (2010). Nigerian banks look to biometric ATM machines to reduce fraud. Bhargav-Spantzel A., Squicciarini A., Bertino E.Kong X & Zhang W.(2010). Biometrics-Based Identifiers for Digital Identity Management. Consultative Group for International Agricultural Research, CGIAR (2009). Network user identification and authentication good practice guide. Das, S. & Debbarma, J.(2011). Designing a biometric strategy (fingerprint) measure for enhancing ATM security in India eBanking system. International Journal of Information and Communication Technology Research vol 1 no 5 p 197-203. Devinaga, R. (2010). ATM risk management and controls. European journal of economic, finance and administrative sciences. George Webster (2010). Biometric ATM gives cash via facial recognition scan. Http://edition.cnn.com. accessed October 10, 2012. Heather Crawford (2011). Applying Usable Security Principles to Authentication. Jacobs, B. & Poll, E. (2010) Biometrics and Smart Cards in Identity Management. Mohammed, L. (2010). Use of biometrics to tackle ATM fraud.

You May Also Find These Documents Helpful

  • Better Essays

    Use Cases

    • 1184 Words
    • 5 Pages

    In this use case the basic flow of events consists of the following: (1) the use case begins when bank customer inserts their bank card; (2) Use Case: Validate User is performed; (3) The ATM displays the different alternatives that are available on this unit. In this case the Bank Customer always selects “Withdraw Cash”; (4) the ATM prompts for an account; (5) the bank customer selects an account; (6) the ATM prompts for an amount: (7) the bank customer enters an amount;(8) card id, pin, amount and account is sent to Bank as a transaction. The Bank Consortium replies with a go/no go reply telling if the transaction is ok; (9) then money is dispensed; (10) the bank card is returned; (11) the receipt is printed; and finally (12) the use case ends successfully.…

    • 1184 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    yehudit erlbaum word 2

    • 261 Words
    • 1 Page

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and with new hairstyles (Allensmith).…

    • 261 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Use Case

    • 846 Words
    • 4 Pages

    When a customer inserts their ATM card into the card reader of the ATM machine, a session will started to read customer card. If it can’t read the card due numerous reasons, then the system will eject the card and error message will display on screen. If the system successful read the card, it will ask the customer to enter his/her PIN, if the pin match with server database a system main menu will display. The main menu consists of multiple types of transaction such as withdrawal, deposit, transfer, or account balance. In an event of invalid pin was entering, system will ask customer to try again. It will allow customer three times to enter the right pin. If customer did not enter the correct pin for the fourth times, a screen will display to ask customer to talk to bank representative. The system will keep customer ATM card. Otherwise when the customer is through with his/her transactions, the card is ejected from the machine and session ends.…

    • 846 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Biometric Devices Paper

    • 301 Words
    • 2 Pages

    Nadeer, Aisha Sati and Jonathon Richard White. Biometric Security. Chicago: Windy City Press, 2014. Print.…

    • 301 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Biometrics technologies are becoming a revolutionary role in which we identify individuals, and protect personal and national assets. This automated process of verifying a human being based on physiological or behavioral characteristics. Biometrics is increasingly being taken into consideration in solutions to improve our Homeland Security, effectively securing the United States national borders, law enforcement, corporate offices, and congressional offices. As well as, incorporating biometrics in an effort to prevent identity when using travel document, visas and other financial transactions.…

    • 537 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Huopio, Simo 1998; Biometric Identification, Network Security 1998: Biometric Identification; Helsinki University of Technology; http://www.tml.tkk.fi/Opinnot/Tik-110.501/1998/papers/12biometric retrieved 07/15/06…

    • 2093 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Criminology in the Future

    • 590 Words
    • 3 Pages

    Everyone wanted security in life. Whether faced with threat or danger, people could use protection in any given situation. New technologies created to ease the worries of an individual. An example was biometrics. The tools refer to automatic identification or verification of living persons using his or her enduring physical or behavioral characteristics (Johnson, p. 92, 2004). Examples of applications were fingerprints and facial traits.…

    • 590 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Credit Card Fraud

    • 729 Words
    • 3 Pages

    The raised letters and numbers on the plastic cards are now rarely used or even read. This then gave rise to “skimming” devices that could be used by some unscrupulous persons to electronically scan and save the information from many customers' cards. Techniques such as "skimming," in which criminals capture card information and personal-identification numbers, have existed for years, often on a small scale. A growing security concern with Skimming devices is the possible release of the user’s personal information or location to unauthorized parties. So, what is now needed is a way to increase the security of payment card use at merchant locations.…

    • 729 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Biometric Paper

    • 325 Words
    • 2 Pages

    A face recognition system captures a live face image and compares it with a stored image to determine if the person is a legitimate user. Some buildings use face recognition systems to secure access to rooms. Law enforcement, surveillance systems, and airports use face recognition systems to protect the public. Some mobile devices use face recognition systems to unlock the device. Face recognition systems are becoming more sophisticated and can recognize people with or without glasses, hats, facial hair, makeup, or jewelry, and which new hairstyles (Allensmith, n.d.).…

    • 325 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The new technologies of future policing provide a number of invaluable uses. Facial recognition would allow law enforcement to identify criminals in real time through facial recognition matched criminal databases, wanted posters,…

    • 673 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The comparison of at least two types of specialized databases that have an advantageous effect undergoing such development are the Automated Fingerprint Identification system (AFIS) and the facial recognition in identifying a criminal. These two specialized databases are security-based computer systems that identify and locate a person in a matter of minutes providing factual information based on the summarized data. AFIS and facial recognition are essential tools that help to provide criminal justice and law enforcement agencies with fully integrated communications system with the ability to log on to a computer system to view necessary data among criminal justice professionals, while including a comprehensive range of security safeguards in order to prevent undesirable consequences from happening. Developing the ability…

    • 1152 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Registered Nurse

    • 558 Words
    • 3 Pages

    Registered nurses (RNs) provide and coordinate patient care, educate patients and the public about various health conditions, and provide advice and emotional support to patients and their family members.…

    • 558 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Facial recognition technology has been very questionable on a national level and potential misuse of the technology has raised questions among very many people. Facial recognition is used by the police around the world to identify subject. Some people think that the facial recognition technology goes against constitutionally protected rights. The software identifies people from the different “points” on their face. Facial recognition is a controversial issue among the law and people because of the potential misuse of the technology, meaning it’s being very badly viewed among large amounts of people.…

    • 1207 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The emerging technology of today’s generation brought up the advancement of processes in people’s lives. Information technology (I.T.) is a more specific term that stresses the role of unified communication and the integration of telecommunication and computers (Murray, 2011). Specifically, computer is a general purpose device that can be programmed to carry out a finite set of arithmetic and logical operations. It lessens the tedious tasks carried out in manual based operations in the society. However, providing efficient security is still considered as one of the arising difficulties in information technology.…

    • 409 Words
    • 2 Pages
    Good Essays