Choose Your Project Department

COMPLETE PROJECT DEPARTMENTS

CHOOSE YOUR CURRENCY

[aelia_currency_selector_widget widget_type="dropdown"]

Amount: ₦5,000.00 |

Format: Ms Word |

1-5 chapters |



TABLE OF CONTENTS

TABLE                                                                                            PAGE

COVER PAGE                                                                                                                      i

THESIS PAGE                                                                                                                       ii

DECLARATION                                                                                                                   iii

CERTIFICATION                                                                                                                 iv

ACKNOWLEDGEMENT                                                                                                     v

ABSTRACT                                                                                                                           vi

TABLE OF CONTENT                                                                                                         vii

LIST OF TABLE                                                                                                                   viii

LIST OF FIGURE                                                                                                                 ix

 

CHAPTER ONE: INTRODUCTION

1.0 Introduction                                                                                                                      1

1.1 Background of Study                                                                                                       1

1.2 Statement of the Problem                                                                                                 4

1.3 Aim and Objectives of studies                                                                                         4

1.4 Significance of Study                                                                                                       5

1.5 Scope of the Study                                                                                                           6

1.6 Limitations of study                                                                                                         6

Definition of Terms                                                                                                               7

CHAPTER TWO: LITERATURE REVIEW

2.0 Introduction                                                                                              9

2.1 Review of literature                                                                                                          10

2.2 The Automated Teller Machine                                                                                        13

2.3 Types of ATM Fraud                                                                                                        15

2.4 Categories of Biometric                                                                                                    16

2.5 Types of Biometric                                                                                                           17

2.5.1 Fingerprint                                                                                                                     17

2.5.2 Voice                                                                                                                              18

2.5.3 Facial                                                                                                                              19

2.5.4 Retina                                                                                                                             21

2.6 Biometric Accuracy Criteria                                                                                             22

2.7 Summary of Review                                                                                                         23

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN

3.0 Introduction                                                                                                                      25

3.1 Analysis of Existing System                                                                                             26

3.2 Limitation of the Existing System                                                                                    26

3.3 Justification of the New   System                                                                                   27

3.4 Methodology                                                                                                                    27

3.5 Data collection                                                                                                                  29

3.6 Proposed New System                                                                                                      30

3.7 Components of the New System                                                                                      34

3.8 Representation of the System                                                                                           35

3.8.1 Use case Diagram                                                                                                          35

3.8.2 Activity Diagram                                                                                                           36

3.8.3 Flow Chart Diagram                                                                                                      37

CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING

4.0 Introduction                                                                                                                      40

4.1 Choice of programming language                                                                                     40

4.1.1 Visual Basic 2010                                                                                                          40

4.1.1 Microsoft .Net Framework                                                                                            41

4.1.2 Microsoft Server 2008                                                                                                   42

4.2 System Main Menu and Implementation                                                                          43

4.3 Implementation of the Subsystem                                                                                                46

4.3.1 Account Holder Information                                                                                         46

4.3.2 Card Holder Information                                                                                               46

4.3.3 Alternate ATM user Detail                                                                                            47

4.3.4 ATM Card form                                                                                                             48

4.4 Query Subsystem Implementation                                                                                    52

4.5 System Testing and Integration                                                                                        54

4.5.1 Testing                                                                                                                           54

4.5.2 Integration                                                                                                                     54

4.6 The Test Data                                                                                                                    55

4.6.1 Hardware Requirement For the System                                                                        56

4.6.2 Software Requirement for the System                                                                          56

4.6.3 System Documentation                                                                                                  57

4.6.4  Software Maintenance                                                                                                  57

CHAPTER FIVE: SUMMARY, RECOMMENDATION AND CONCLUSION

5.0 Summary                                                                                                                           58

5.1 Findings and Discussion                                                                                                   58

5.2 Suggestion for Future Work                                                                                             59

5.4: Recommendation                                                                                                             49

5.3: Conclusion                                                                                                                       60

REFERENCE                                                                                                                         61

APPENDIX                                                                                                    63

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

LIST OF TABLES

TABLE                                                                                                      PAGE

Table 3.1 Analysis of Questionnaire                                                                                       29

Table 3.2  Account Holder Information                                                                                 33

Table 3.3 Card Holder Information                                                                                        33

Table 3.4 Alternate User information                                                                                     34

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

LIST OF FIGURE

FIGURE                                                                                             PAGE

Figure 2.1 Types of Finger Print                                                                                             18

Figure 2.2 Sample of a voice Pattern                                                                                      19

Figure 2.3 Sample of a Facial Recognition Pattern                                                                21

Figure 2.4 Sample of Retina Images                                                                                       22

Figure 3.1 Diagram of a client Server Architecture                                                                28

Figure 3.2 Pie Chart Showing Result of the Questionnaire                                                    29

Figure 3.3 Numeric Input Diagram                                                                                         32

Figure 3.4 Biometric Input                                                                                                     32

Figure 3.5 Use Case Diagram of an ATM Processes                                                              36

Figure 3.6 Activity Diagram                                                                                                   37

Figure 3.7 Flow chart Diagram                                                                                               38

Figure 4.1 Start Page                                                                                                              43

Figure 4.2AdminLogin Interface                                                                                            44

Figure 4.3 New account opening Form                                                                                  45

Figure 4.4 Account Holder Information                                                                                 46

Figure 4.5card holder Information                                                                                         47

Figure 4.6Alternate User Detail                                                                                              48

Figure 4.7 ATM Card Form                                                                                                    49

Figure 4.8 Insertion of ATM Card                                                                                         50

Figure 4.9 Insertion of Password                                                                                            51

Figure 4.10 Insertion of Finger Print                                                                                      51

Figure 4.11 Admin Login                                                                                                       52

Figure 4.12 Incorrect password                                                                                              53

Figure 4.13Test Data                                                                                                              55

 

 

 

 

 

 

CHAPTER ONE

INTRODUCTION

         1.1   Background to the Study

In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is not always efficient. In view of this and the fast wind of  IT sweeping through Nigeria, had lead the bank to the utilization of an electronic device known as Automatic Teller Machine (ATM) for performing transaction without the physical presence of a bank delegate. Automated teller machine is a mechanical device that has its roots embedded in the accounts and records of a banking institution. It is a machine that allows the bank customers to carry out banking transactions like deposits, transfers, balance enquiries, mini statement, withdrawal and fast cash e.t.c. The ATM has gained wide utilization due to the 24 hours service it provides to customers. Khatmode R. K. et al,(2014).

Nearly 10 years since its introduction in Nigeria, the ATM has become the favored channel of financial transaction by most Nigerians. However, the expanding and wide acceptance of the ATM by the member of the public has led to a need to further build and enhance the security and integrity of the system. Utilization of ATM (Automatic Teller Machine) is helpful for monetary transaction. ATM transaction is initiated by inserting the ATM card and typing the PIN (Personal Identification Number) of that specific card. Despite the fact that bank allows their customers to choose their PIN, this system is not safe to use because anybody can access the system if they have the card and PIN number. The system looks at the code against a stored list of approved authorized passwords and users. PIN typically in a form of four digit combination of numbers that is entered via the ATM panel. If the code is genuine, the system permits access at the security level approved for the owner of the account. The strength of PIN as a security system is weakened and the likelihood of the code leaking to other people is high. In recent time, due to fraudsters advancements and technological improvement it is now possible to fix ATM Card scanners in ATM Machine to acquire encoded information from ATM Card, which is again used to create a copy of the ATM card and to make fraudulent transactions. This is the primary impediment of the current system. Conventional ATM systems authentication method has some limitations. Using ATM card and password cannot;

  1. Verify the client’s identity exactly.
  2. Protect the card user against theft.
  3. It is easy for fraudsters to get the PIN and perform fraudulent transactions.
  4. Protect customers from Vulnerabilities and the increasing wave of criminal activities occurring at Automated Teller Machines (ATMs.)

This has called for a more secure method of authentication at the ATM terminals. Biometrics based authentication is a potential technique in increasing ATM security. Among all the biometrics, fingerprint based identification is one of the most mature and proven technique. Biometric is a Greek Words, Bio means life and metric means measuring some objects that have life. Biometric measures both physiological and behavioral characteristics. These characteristics are finger prints, Voice patterns, hand measurements, irises and others (although this project will be limited to fingerprints alone). These characteristics are used to identify an individual, they are connected to an individual and cannot be forgotten, stolen, shared or easily hacked like passwords.

Finger Print technology is the initial biometric science that uses unique features of the fingerprint to identify or verify the identity of an individual. Finger Print technology is the most deployed technology among other biometric characteristics and it application ranges from physical access to logical access. Each and every human have unique characteristics and patterns. A Finger Print pattern or sample consists of lines and spaces and these lines are referred to as Ridges while the spaces between these ridges are called valleys. These ridges and valleys are matched for verification and authorization. These unique finger print traits are referred to as “minutiae” and comparisons are made on these traits. There has been a significant surge in the use of Biometric based user authentication system in recent years because Bio-metric authentication offers several advantages over other authentication methods. The advantages that Biometrics presents are that the information is unique for each individual and that:

  1. It can identify the individual in spite of variations in the time.
  2. It provides strong authentication
  3. It can be easily implemented on existing system.
  4. There are very less chances of two people having same fingerprint.

 

Fingerprint is currently being used as variables of security during voting, operation of bank account among others. It is also used for controlling access to highly secured places like offices, equipment rooms, control centers and so on.The proposed system will be self manipulative, simple, fast and yet much more secure. It will provide a secure online transaction to protect the user against ATM Card frauds.

 

 

1.2       Statement of the Problem

The existing system is plagued with the following problems;

 

  1. Traditional authentication systems cannot discriminate between an impostor who fraudulently obtains the access privileges and the real owner.
  2. Passwords and PINs can be illicitly acquired by direct covert observation.
  3. Easily guessed PIN’s and passwords e.g. birthday, 1234 etc.
  4. Malware can be placed at the ATM terminal by fraudsters to capture magnetic stripe data and PIN codes from the private memory space of transaction processing application installed on the ATM.

 

1.3      Aim and Objectives of the Study

The aim of this project is to design an ATM simulator that will combine PIN (Personal Authentication Number) verification system with finger print biometric system for more reliable authentication. The system is designed with the following objectives.

To explore the problem associated with the existing password Based system and pose the


This material content is developed to serve as a GUIDE for students to conduct academic research



BIOMETRIC AUTHENTICATION OF AN AUTOMATIC TELLER MACHINE USING FINGER PRINT AND PASSWORD

NOT THE TOPIC YOU ARE LOOKING FOR?



PROJECTS TOPICS Support Team Are Always (24/7) Online To Help You With Your Project

Chat Us on WhatsApp » 09069999843

DO YOU NEED CLARIFICATION? CALL OUR HELP DESK:

  09069999843 (Country Code: +234)
 
YOU CAN REACH OUR SUPPORT TEAM VIA MAIL: projectstopics1@gmail.com


Related Project Topics :

LIST OF PROJECTS DEPARTMENTS