Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002.

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

ATM WITH AN EYE PRESENTED BY G. SATHISHKUMAR 3RD YEAR, EEE, RMK ENGG
Dr. Marc Valliant, VP & CTO
Card Verification Support
Automatic Finger Print Identification System with Multi biometric Options A smart presentation On AFIS System.
Warm-up: April 11 What’s the difference between a checking and savings account?
Debit Card Plastic card that looks like a credit card
Security, Guaranteed By Biometrics The new generation of access control and time & attendance products WRS Technology Services Authorized Reseller San.
Information System Design IT60105
ATM User Interface Design. Requirements A bank customer is able to access his or her account using an automatic teller machine. To be able to use an ATM.
Chapter 8 Operating Systems and Utility Programs.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
PALM VEIN TECHNOLOGY.
Credit cards and Debit Cards, Credit and Debt
Facial Recognition. 1. takes a picture of a person 2. runs that image through the database 3. finds a match and identifies the person Humans have always.
Marjie Rodrigues
Facial Recognition CSE 391 Kris Lord.
Online and Mobile Banking. Online banking Online Banking  Online banking is a fairly established practice in our internet-saturated world.  Many people.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Karthiknathan Srinivasan Sanchit Aggarwal
C C R e c f o r T R A M S for Windows. O v e r v i e w The purpose of the CC Rec program is for a travel agency to reconcile credit card charges with.
IC3 Chapter 8 Computer Fundamentals
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Information Technology Department NNK Investment & Banking Team 3-F Bao Nguyen | Henrik Nilsen | Yoonjin Kim 1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
Case Study :. Introduction The ATM network will consist of a large number of ATM machines distributed over a wide geographical area. The network must.
Face Recognition System By Arthur. Introduction  A facial recognition system is a computer application for automatically identifying or verifying a person.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
SFWR ENG 3KO4 Software Development Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS) for the Automated Banking Machine.
BIOMETRICS.
At a glance…  Introduction  How Biometric Systems Work ?  Popular Biometric Methodologies  Multibiometrics  Applications  Benefits  Demerits 
A Seminar Report On Face Recognition Technology A Seminar Report On Face Recognition Technology 123seminarsonly.com.
INFO1408 Database Design Concepts Week 15: Introduction to Database Management Systems.
© 2008 Lenovo Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential Lenovo Confidential VeriFace 3.6 disclosure a software makes.
Chapter 10 Verification and Validation of Simulation Models
Image Comparison Tool Product Proposal Tim La Fond and Peter Beckfield.
Microsoft Management Seminar Series SMS 2003 Change Management.
Facial Recognition Systems By Derek Ciocca. 1.Parts of the system 2.Improving Accuracy 3.Current and future uses.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
Anika Massey.  There are three main types of business:  Traditional  Online  Transportation.
Software Testing Mehwish Shafiq. Testing Testing is carried out to validate and verify the piece developed in order to give user a confidence to use reliable.
Decimalisation Table Attacks for PIN cracking “ It takes an average of 15 guesses to determine a four digit PIN using this technique, instead of the 5000.
Hall, Accounting Information Systems, 8e ©2013 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly.
Checking & Savings Accounts Economics What is a Checking Account?  Common financial service used by many consumers (a place to keep money)  Funds.
Miloš Kotlar 2012/115 Single Layer Perceptron Linear Classifier.
Face Recognition Technology By Catherine jenni christy.M.sc.
Electronic Banking & Security Electronic Banking & Security.
A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a video frame from.
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
RAJAT GOEL E.C.-09. The information age is quickly revolutionizing the way transactions are completed. Using the proper PIN gains access, but the user.
Submitted by: Siddharth Jain (08EJCIT075) Shirin Saluja (08EJCIT071) Shweta Sharma (08EJCIT074) VIII Semester, I.T Department Submitted to: Mr. Abhay Kumar.
FACE RECOGNITION. A facial recognition system is a computer application for automatically identifying or verifying a person from a digital image or a.
Challenge/Response Authentication
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
DATA COLLECTION Data Collection Data Verification and Validation.
Intelligent Face Recognition
CMPE 280 Web UI Design and Development August 29 Class Meeting
E-voting …and why it’s good..
A Seminar Report On Face Recognition Technology
FACE RECOGNITION TECHNOLOGY
SECURITY FEATURES OF ATM
Face Recognition 1.
FACE RECOGNITION TECHNOLOGY
Biometric Security Fujitsu Palm Vein Technology
Jenna Lutton February 26th, 2007
by- A.Swetha (13FF1A0401) G.Pradeep (14FF5A0407) B.Gopi (14FF5A0402)
Chapter 10 Verification and Validation of Simulation Models
Facial Recognition [Biometric]
Biometric technology.
Presentation transcript:

Improving ATM Security via Facial Recognition CPSC510 James Maxlow November 25 th, 2002

Proposal  Cameras in use at automatic teller machines should take still images of users  A facial recognition scheme should be added to the software used to verify users at ATMs  This scheme should match a picture of the user at the ATM with a picture of the account holder in the bank’s database 2 of 11

Reasoning  ATM fraud costs U.S. banks an average of $15,000 each year… hundreds of millions in total  This cost is borne by bank customers  Current ATM validation schemes are limited to access cards and PINs  Card theft, PIN theft and cracking, stealing of account information by bank employees all contribute to fraud schemes 3 of 11

Algorithm  Take customer’s picture(s) when account is opened and allow user to set non- verified transaction limits  At ATM, use access card and PIN to pre- verify user  Take user’s picture, attempt to match it to database image(s)  If match is successful, allow transaction  If match is unsuccessful, limit available transactions 4 of 11

Can ATMs Support This?  Most current generation ATMs run Windows CE, 2000, XP Embedded, or Linux – these machines can run facial recognition software locally ATM Bank Computer 1: Image, account no, PIN 2: Account no, PIN 3: Bank-held customer image 4: Processing 5: User verified 5 of 11

Can ATMs Support This?  Older ATMs run DOS or OS/2 – these machines can offload the processing to the bank’s computers ATM Bank Computer 1: Image, account no, PIN 2: Image, account no, PIN 4: User verified message 5: User verified message 3: Processing 6 of 11

Is Facial Recognition Reliable?  Matching a user image with any image in a database… facial evaluation… is still problematic – digital airport screenings, public surveillance cameras, etc. have high error rates  But this isn’t a problem here!  We must only match a user image with one known image from a database… facial verification… this technique has low error rates under good conditions (3% - 10%) 7 of 11

What Variables Affect Verification? 1. Lighting 2. Angle of view 3. Extreme facial expressions 4. Facial hair 5. Glasses Please follow these guidelines to help us verify your identity: Face the camera, holding still until you hear the beep Maintain a normal facial expression If you are wearing glasses, please remove them 8 of 11

What Is The Best Verification?  Local Feature Analysis  This method analyzes the geometric relationships between facial features  In some versions it builds a 3-D topography of the user’s face and uses this topography for later comparisons 9 of 11

What Would I Actually Do?  Find open-source LFA recognition programs  Write an ATM black box module  Create two databases of images  Tweak and test recognition programs with ATM module and images  Rewrite ATM module into client/server version with encryption to emulate ATM/bank interactions  Add USB camera control to client 10 of 11

Summary  Access card / PIN provides insufficient ATM security  Adding facial verification to the process can greatly decrease fraudulent transactions  Current ATMs have the power to perform verification locally given a software change  I will create a simulated system using a custom ATM black box and an open-source LFA recognition program 11 of 11