recognition technique for atm based on iris technology

5
Embedded systems 7842522786/9948887244/9346934699 Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606 RECOGNITION TECHNIQUE FOR ATM BASED ON IRIS TECHNOLOGY AIM: The main aim of this project is to giving high security while transactions in the ATM”S. PURPOSE: The project entitled “Recognition Technique for ATM based on IRIS Technology” is the one which is designed to develop a system by which the authentication is being provided by making use of one RFID Technology and IRIS Recognition technology.

Upload: khadar-embedded

Post on 13-Jul-2015

220 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: Recognition technique for atm based on iris technology

Embedded systems 7842522786/9948887244/9346934699

Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606

RECOGNITION TECHNIQUE FOR ATM BASED ON IRIS

TECHNOLOGY

AIM:

The main aim of this project is to giving high security while transactions in the ATM”S.

PURPOSE:

The project entitled “Recognition Technique for ATM based on IRIS Technology” is

the one which is designed to develop a system by which the authentication is being provided by

making use of one RFID Technology and IRIS Recognition technology.

Page 2: Recognition technique for atm based on iris technology

Embedded systems 7842522786/9948887244/9346934699

Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606

BLOCK DIAGRAM:

DESCRIPTION:

In this project initially the users will enroll their eye images that will be saved in the data

base using webcam. In this project initially the user is made to show a RFID tag to the reader. If

it is a valid one then the user have to enter the correct password, if the user will entered the

wrong password it will not moves the next step and the buzzer will be on, if the password

accessing is continuously failed for three times means then process will move to the initial

condition i.e. RFID tag showing step. If the user will entered the correct password then controller

POWER

SUPPLY

WEBC

AM

KEYS

LCD

BUZZER

PC

RFID

READER

(ARM7

TDMI)

LPC2148

Micro

Controller

Page 3: Recognition technique for atm based on iris technology

Embedded systems 7842522786/9948887244/9346934699

Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606

asks for IRIS identification process. In the IRIS identification the person who ever want access

that particular accessories or things first he/she has to place his eye in front of the PC camera at

that time it will capture the image of eye and to access various options of ATM like mini

statement, balance enquiry, withdrawal etc. again taking the eye image of same person and

comparing with previous eye image in that same way we can access some others with matching

or compare of eye image and this whole process will done with the help of mat lab code. If it

matches then he or she will access to that Particular option of the ATM with switches or keys

and the process goes on. If captured image does not matched with first taken image then the

controller gives a halt to the process and moves to the initial step. Nevertheless, if RFID tag is an

invalid card then the controller stops the whole process.

TECHNOLOGY:

RFID:

RFID is an acronym for Radio Frequency Identification. In general terms, RFID is a

means of identifying a person or object using a radio frequency transmission. In other words

RFID is an electronic method of exchanging data over radio frequency waves. The technology

can be used to identify, track, sort or detect a wide variety of objects.

There are three major components of an RFID system: the reader, the antenna, and the tags. Each

tag is associated with a unique number. When a tag is in the detection range of the reader, the

number is read. Two types of tags can be found: active tags with a longer detection range and

passive tags with a shorter detection range. An RFID tag is usually attached to an object and the

information of the object along with the RFID number are recorded in the database. Whenever

the RFID tag is sensed, the object can thus be identified.

IRIS

The Human Iris: The iris is a thin circular diaphragm, which lies between the cornea and the

lens of the human eye. A front-on view of the iris is shown in Figure below. The iris is

Page 4: Recognition technique for atm based on iris technology

Embedded systems 7842522786/9948887244/9346934699

Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606

perforated close to its centre by a circular aperture known as the pupil. The function of the iris is

to control the amount of light entering through the pupil, and this is done by the sphincter and the

dilator muscles, which adjust the size of the pupil. The average diameter of the iris is 12 mm, and

the pupil size can vary from 10% to 80% of the iris diameter.

The iris consists of a number of layers; the lowest is the epithelium layer, which

contains dense pigmentation cells. The stromal layer lies above the epithelium layer, and

contains blood vessels, pigment cells and the two iris muscles. The density of stromal

pigmentation determines the color of the iris. The externally visible surface of the multi-layered

iris contains two zones, which often differ in color. An outer ciliary zone and an inner pupillary

zone, and these two zones are divided by the collarette – which appears as a zigzag pattern. The

iris is an externally visible, yet protected organ whose unique epigenetic pattern remains stable

throughout adult life. These characteristics make it very attractive for use as a biometric for

identifying individuals. Image processing techniques can be employed to extract the unique iris

pattern from a digitized image of the eye, and encode it into a biometric template, which can be

stored in a database. This biometric template contains an objective mathematical representation

of the unique information stored in the iris, and allows comparisons to be made between

templates. When a subject wishes to be identified by iris recognition system, their eye is first

photographed, and then a template created for their iris region. This template is then compared

with the other templates stored in a database until either a matching template is found and the

subject is identified, or no match is found and the subject remains unidentified.

SOFTWARE:

1. Embedded C

2. Keil IDE

3. Uc-Flash

HARDWARE:

1. Micro Controller (ARM 7)

2. RFID reader

Page 5: Recognition technique for atm based on iris technology

Embedded systems 7842522786/9948887244/9346934699

Email: [email protected] www.purpletechnosolutions.com 9030880909/101/202/505/606

3. Power supply

5. LCD

6. PC

7. WEB CAM

8. BUZZER

RESULT:

A step by step approach in designing the secured approach for authentication system

using fingerprint and iris identification giving security to the users banking system and providing

the security for the locker system using Iris..

The system has successfully overcome some of the aspects existing with the present

technologies, by the use of iris Biometric as the authentication Technology.