International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
INTEGRATION OF TRIANGULAR LOCATION DETECTION, IOT, OPEN CV USER AUTHENTICATION FOR SECURED ATM. Gomathi.D1,Hameetha Banu.K2,Mahalakshmi.M3,S.Panimalar4 4S.Panimalar
,Assistant Professor, Dept. of Computer Science & Engineering, Panimalar Institute Of Technology, Chennai,Tamilnadu, India
---------------------------------------------------------------------***----------------------------------------------------------------Abstract-The Open CV for Utilizer Signature like with image processing capabilities utilizing pattern Apperception is implemented. The silhouette image finds its application. implementation is deployed for ATM Loading 2.LITERATURE SURVEY: Conveyance.It is deployed with 3 Zigbees, one is affixed with Conveyance, another is with the Mobile Xian Pan, Zhen Ling, Aniket Pingley and Wei phone of the Ascendancy and the last one is with the Yu[1] reconstruct the on-screen cursor trajectories ATM Machine. Once all the Zigbees meet together, from sniffed mouse kineticism data. Two inference which denotes conveyance is at the ATM, and then strategies are habituated to discover passwords OTP is engendered and Verified by ATM Zigbee via from cursor trajectories. We conducted a holistic Conveyance Zigbee.Apart from OTP, Utilizer study over all popular operating systems and Signature is verified utilizing Open CV after loading analyzed how mouse expedition algorithms and cash into the ATM Machine. packet losses may affect the reconstruction results. Our authentic-world experiments demonstrate the astringency of privacy leakage from unencrypted Keywords—Automated Teller Machine (ATM), Bluetooth mice. We additionally discuss Zigbee,One Time Password (OTP),Utilizer countermeasures to avert privacy leakage from Signature,open CV. wireless mice. To the best of our erudition, our 1. INTRODUCTION work is the first to demonstrate privacy leakage from raw mouse detain Syeda Farha Shazmeen and Automated Teller Machines (ATM) today have Shyam Prasad[2]proposed perpetually growing become areas of target due to their facile and yarely number of customers who utilize Internet banking available cash at everyone’s accommodation. The because of its accommodation. But the security and assailments on ATM’s are steadily elevating and privacy of Information may be one of the most this is an earnest quandary for law enforcement sizably voluminous concerns to the Online Banking and banking sectors. So there has to be a system users. The quandary with Online banking developed and put into place that will ascertain the applications is that they send data directly to ATM is safeguarded and additionally gives customer in plain text form compromising with customers the confidence when utilizing the ATM. security. The solutions to the security issues Currently to provide bulwark to the ATM and to the require the utilization of software-predicated customers utilizing it, there are CCTV security solutions that involve the utilization of encryption cameras and emergency sirens. Other measures algorithms. For this we propose a that are being researched includes a system that challenge/replication predicated short-time implements a low cost standalone embedded web password authentication methods utilizing server, Machine to Machine (M2M) and RFID to Symmetric cryptography in cumulation with implement an anti-larceny system, in case there is Software Security model. In this approach bank an intruder in the ATM kiosk a system with image obnubilates customer transaction data is secure processing capabilities proves it’s worth in SMS utilizing conception symmetric cryptographic identifying the intruder, but this kind of systems algorithm and send it to customer application doesn’t function up to prospects when the facial fortified handset. Customer application decrypts features extracted from the front face don’t give us data in secure manner the encryption and a congruous ID of the intruder, in this case a system decryption are characterized by a secret key that the licit parties have to possess. So, in face of the © 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 1590