<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Design and Implementation of Secure ATM Biometric and Hashing Technique</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Resmi Karinattu ReghuNathan</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dhanya Job</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>MG University, Santhigiri College of Computer Sciences</institution>
          ,
          <addr-line>Idukki, Kerala</addr-line>
          ,
          <country country="IN">India</country>
        </aff>
      </contrib-group>
      <fpage>92</fpage>
      <lpage>96</lpage>
      <abstract>
        <p>Security is a major concern in all aspects of life, Nowadays. Automated teller machines (ATMs) are the most commonly used devices for financial transactions in which personal identification numbers (PINs) are the authentication method used by many people. For a long time, researchers have been studying how to use an individual's biometric features to enhance authentication and verification technologies beyond the existing reliance on passwords. Since the biometric features cannot be stolen, the protection of digitized biometric data becomes critical in order to prevent it from various attacks. This paper presents a method for enhancing security in ATM banking system using finger print hash code biometric authentication. The proposed system provides two levels of security between ATM machine and server by combining biometric and hashing technique.</p>
      </abstract>
      <kwd-group>
        <kwd>1 ATM</kwd>
        <kwd>Security</kwd>
        <kwd>Biometric</kwd>
        <kwd>Fingerprint</kwd>
        <kwd>Minutiae</kwd>
        <kwd>Hash Code</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Many people in today's modern world depend on computers to keep track of important details. ATM
is an automatic machine, and it has been in operation since 1967. John Shepphardbaren invented the
ATM in the United Kingdom in June 1967. People nowadays use PINs and passwords to manage
various devices such as cars, cell phones, and ATM machines; however, using PINs without security
causes major problems for customers such as usability, memorability and security [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A customer with
a bank account can obtain confidential access to their account via an ATM by obtaining a PIN or
password, enabling them to conduct transactions, transfer money, and so on. PIN numbers are very
critical for securing customer account information and should not be shared with others.
      </p>
      <p>ATM fraud is on the rise as automated teller machines (ATMs) become more widespread. ATM
fraud is a major global issue that consumers and bank operators have had to deal with on a regular basis
in recent years. Traditional ATM authentication, which relies on a card and a PIN, has drawbacks. If
the account holder's card is lost and the PIN is known, the account holder is vulnerable to fraud. To
resolve the security issues with ATM PIN authentication, new techniques are being developed. Since
biometric data cannot be duplicated or lost, biometric authentication methods may provide a solution
to this issue.</p>
      <p>Biometrics authentication ensures identification based on a physiological or behavioural
characteristic. In this work, we propose a two factor authentication scheme which uses biometric
fingerprint, and hashing process to provide improved security for ATM authentication. Hash values are
sent across the network and stored in the central database. During verification, the new hash value is
compared with the hash values stored in the database for matching.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>Traditional authentication are primarily based on knowledge and token. Despite the fact that the two
credentials are well-known and accepted in society, they may also fail to provide true authentication.
To overcome the limitations of conventional approaches, biometrics allows us to determine an
individual's identity based on who they are rather than what they have or remember. Although user
authentication and verification using biometrics is easy to use, it does pose concerns about the security
of digitized biometric data. If an attacker gains access to this information, it can be used to perform a
variety of attacks. Various security measures are used to protect the data from different attacks.</p>
      <p>Nowadays, ATMs are widely used by the general public due to their ease of use, user-friendliness,
and immediate availability of cash at any location. As the technology of ATM advances, attackers
develop new techniques to bypass ATM security. Various types of fraud are common in ATM which
include card theft, pin theft, card reader techniques, force withdrawals etc. As fraud approaches have
become more sophisticated and occurrences have increased, financial institutions must manage the risk
associated with ATM fraud by devising new security measures.</p>
      <p>
        Soutar et al. [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] used an approach to fingerprint biometrics protection on images by encoding key
data with a special filter in Fourier space. The decoder can retrieve the data only by showing a similar
fingerprint picture. Here the matching process is based on correlation, where image translations are
possible but not rotations.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], ATM security is achieved by using steganography and cryptographic techniques on biometric
finger vein technology. Security can be achieved by using light-weight cryptography and stegnography
using variable MSB–LSB algorithm. Zhang et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] also proposed the usage of finger vein technology
for authentication. Alzamel et.al [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] proposed a method by fusing pin number with finger print
authentication scheme. It employed POS (Point of Sale) network devices between finger print and ATM
card. In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] the authors used finger print authentication method for enhancing ATM security.
Onyesolu and Okpala [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], proposed a system with three levels of authentication including pin, finger
print and OTP. The system provides a high level of security but the model is very complex and time
consuming.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Proposed Method</title>
      <p>Proposed method uses ATM authentication using hash code generated from finger print minutiae.
The block diagram of the proposed method is shown in Figure 1. It consists of two stages enrolment
and verification. During enrolment, finger print data is taken instead of pin and hash code is generated
from fingerprint minutiae points. During verification, the hash code generated for the given input image
is compared with the hash values stored in the central database. If same hash Code matching is found,
the fingerprint is authenticated and integrity is checked.
3.1.</p>
    </sec>
    <sec id="sec-4">
      <title>Feature Extraction using Fingerprint</title>
      <p>Fingerprint is one of the important biometric feature used in ATM for personal authentication. The
unique feature called minutiae, is the most critical parameters used in fingerprint recognition systems.
Based on minutiae points, ridge ending and bifurcation are the two important minutiae features used for
verification or identification.</p>
      <p>The feature extraction of minutiae from finger print images is described in this section. Many
fingerprint matching models are based on minutiae. The low quality of fingerprint images is one of the
issues with fingerprint recognition. The enhancement's aim is to minimize noise in the fingerprint image
and improve the ridge-valley structures, allowing for more precise minutiae extraction. There are a
variety of fingerprint enhancement techniques available. This paper uses Gabor filters with only four
orientations: θ = {0, π/4, π/2, 3π/4}.The minutiae must be extracted after enhancement. First step is a
thresholding operation that is used to binarize the enhanced image. In thresholding each gray scale pixel
value is converted to a binary value. After binarization, the next step is morphological thinning
operation in which the width of each ridge is reduced to a single pixel, resulting in an image skeleton.
The actual minutiae detection from the skeleton image is the next step. The Bifurcation and Termination
is extracted as red points and green points in minutia. The last step is the post processing operation
which eliminates false minutiae if any from skeleton images and maintaining the final true minutiae
points. Figure 2 shows the steps involved in minutiae extraction from input finger print image.</p>
    </sec>
    <sec id="sec-5">
      <title>Hash code generation from finger print</title>
      <p>
        Hashing is a technique by which the data is mapped to a fixed value. Authentication is the primary
application of hashing. There are many hash functions available. Two popular hash functions are MD5
and SHA. The two algorithms are compared based on parameters such as running time and complexity
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].The complexity of the two algorithms are equal, but MD5 is faster than SHA. Also MD5 generate
simple hash compared to SHA. Based on these properties, MD5 hashing is used in the proposed
technique.
      </p>
      <p>MD5 hashing algorithm is used for generating the high security 32 bit hexadecimal hash code
containing text and numbers. The procedure of MD5 hash generation is summarized in Algorithm 1.
This algorithm takes features extracted from minutiae as input.
Algorithm 1 The algorithm used for generating Hash Code</p>
      <sec id="sec-5-1">
        <title>Input: Extracted Minutiae Features</title>
      </sec>
      <sec id="sec-5-2">
        <title>Output: 32 bit hexadecimal Hash Code</title>
      </sec>
      <sec id="sec-5-3">
        <title>1. Append or add extra padding bits to original image</title>
      </sec>
      <sec id="sec-5-4">
        <title>2. Attach 64 bits at the end of step1 results.</title>
      </sec>
      <sec id="sec-5-5">
        <title>3. Initialize four MD buffers A, B, C, D to calculate the message digest values.</title>
      </sec>
      <sec id="sec-5-6">
        <title>All the four buffers are 32 bit registers.</title>
      </sec>
      <sec id="sec-5-7">
        <title>4. Process message using logical operators OR, NOR, XNOR in 16 word blocks 5. Generate output as 32 bit hash code with lower order bits A ending higher bits D</title>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4. Experimental Results and Discussion</title>
      <p>
        In this study finger print database FVC2002 [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] is used and the feature extraction and hash code
generation is implemented using Matlab. The finger print images goes through various preprocessing
steps before minutia extraction. The outputs generated in minutia extraction for a given input image is
illustrated in Figure 3.
      </p>
      <p>After minutiae extraction, the hash code is generated from minutiae features using MD5 algorithm.
Once the user enters his finger print at ATM client, hash code is generated at client side from fingerprint
minutiae. The hash code is transmitted and reaches the server, the server verifies the hash code with the
hash codes stored in the server database and if the verification is successful the user is authenticated.
Figure 4 shows hash code generation and user authentication based on hash.
60 % of images in the database is used for training, 20% for testing and 20% for validation .The
performance of the proposed algorithm is measured by using the parameters false acceptance and false
rejection rate.</p>
    </sec>
    <sec id="sec-7">
      <title>5. Conclusion</title>
      <p>Automatic Teller Machines are the most commonly used technology in today's world of growing
financial transactions. ATM security using traditional PIN can be misused in a variety of ways. This
paper presents security for ATM banking system using finger print and hashing techniques. Finger print
hash code is used to uniquely identify the person. The proposed biometric and hashing techniques
together for personal authentication improve the security level of ATM for efficient banking.</p>
    </sec>
    <sec id="sec-8">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Maltoni</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maio</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>A.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Prabhakar</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Handbook of Fingerprint Recognition. Springer, New York, (
          <year>2003</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Soutar</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roberge</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stoianov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gilroy</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kumar</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Biometric encryption</article-title>
          .In Nichols, R., ed.: ICSA Guide to Cryptography.
          <string-name>
            <surname>McGraw-Hill</surname>
          </string-name>
          (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Das</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Singh</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          et al.
          <article-title>Design and implementation of secure ATM system using machine learning and crypto-stego methodology</article-title>
          .
          <source>SN Appl. Sci. 1</source>
          ,
          <issue>976</issue>
          (
          <year>2019</year>
          ). https://doi.org/10.1007/s42452-019-0988-0.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Zhang</surname>
            <given-names>J</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lu</surname>
            <given-names>Z</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            <given-names>M</given-names>
          </string-name>
          (
          <year>2018</year>
          )
          <article-title>A finger-vein extraction algorithm based on local Radon transform</article-title>
          .
          <source>In: 13th World Congress on intelligent control and automation (WCICA)</source>
          ,
          <year>July</year>
          , (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Hussah</given-names>
            <surname>Adnan</surname>
          </string-name>
          <string-name>
            <given-names>Alzame</given-names>
            , Muneerah Alshabanah,
            <surname>Mutasem K. Alsmadi</surname>
          </string-name>
          ,
          <article-title>"Point of Sale (POS) Network with Embedded Fingerprint Biometric Authentication"</article-title>
          ,
          <source>International Journal of Scientific Research in Science and Technology (IJSRST)</source>
          ,
          <string-name>
            <surname>Online</surname>
            <given-names>ISSN</given-names>
          </string-name>
          :
          <fpage>2395</fpage>
          -
          <lpage>602X</lpage>
          ,
          <string-name>
            <surname>Print</surname>
            <given-names>ISSN</given-names>
          </string-name>
          :
          <fpage>2395</fpage>
          -
          <lpage>6011</lpage>
          , Volume
          <volume>6</volume>
          , Issue 5 (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Christiawan</surname>
            ,
            <given-names>B. A.</given-names>
          </string-name>
          <string-name>
            <surname>Sahar</surname>
            ,
            <given-names>A. F.</given-names>
          </string-name>
          <string-name>
            <surname>Rahardian</surname>
            and
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Muchtar</surname>
          </string-name>
          ,
          <article-title>"Fingershield ATM - ATM Security System using Fingerprint Authentication," 2018 International Symposium on Electronics and Smart Devices (ISESD), Bandung</article-title>
          , Indonesia,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , (
          <year>2018</year>
          ) doi: 10.1109/ISESD.
          <year>2018</year>
          .
          <volume>8605473</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Mahesh</given-names>
            <surname>Patil</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Sachin</surname>
          </string-name>
          ,
          <article-title>"ATM Transaction Using Biometric Fingerprint Technology"</article-title>
          ,
          <source>International Journal of Electronics</source>
          , vol.
          <volume>2</volume>
          , (
          <year>2012</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G. R.</given-names>
            <surname>Jebaline</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Gomathi</surname>
          </string-name>
          ,
          <article-title>"A novel method to enhance the security of ATM using biometrics,"</article-title>
          2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, India,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , (
          <year>2015</year>
          ) doi: 10.1109/ICCPCT.
          <year>2015</year>
          .
          <volume>7159391</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Onyesolu</surname>
            ,
            <given-names>M. O.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Okpala</surname>
            ,
            <given-names>A. C.</given-names>
          </string-name>
          (
          <year>2017</year>
          ).
          <article-title>Improving Security Using a Three-Tier Authentication for</article-title>
          <source>Automated Teller Machine (ATM)</source>
          ,
          <source>(October)</source>
          ,
          <fpage>50</fpage>
          -
          <lpage>56</lpage>
          (
          <year>2017</year>
          ). https://doi.org/10.5815/ijcnis.
          <year>2017</year>
          .
          <volume>10</volume>
          .06.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Rachmawati</surname>
            ,
            <given-names>Dian</given-names>
          </string-name>
          &amp; Tarigan, Jos &amp; Ginting,
          <string-name>
            <surname>A.</surname>
          </string-name>
          <article-title>A comparative study of Message Digest 5(MD5) and SHA256 algorithm</article-title>
          .
          <source>Journal of Physics: Conference Series</source>
          .
          <volume>978</volume>
          .
          <fpage>012116</fpage>
          . (
          <year>2018</year>
          )
          <volume>10</volume>
          .1088/
          <fpage>1742</fpage>
          -6596/978/1/012116.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Fingerprint</given-names>
            <surname>Verification</surname>
          </string-name>
          <article-title>Competition (FVC2002</article-title>
          ), http://bias.csr.unibo.it/fvc2002/download.asp
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>