<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Design and Implementation of Secure ATM System Using Biometric and Hashing Technique</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Resmi</forename><surname>Karinattu Reghunathan</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">MG University</orgName>
								<orgName type="institution" key="instit2">Santhigiri College of Computer Sciences</orgName>
								<address>
									<settlement>Idukki</settlement>
									<region>Kerala</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dhanya</forename><surname>Job</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution" key="instit1">MG University</orgName>
								<orgName type="institution" key="instit2">Santhigiri College of Computer Sciences</orgName>
								<address>
									<settlement>Idukki</settlement>
									<region>Kerala</region>
									<country key="IN">India</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Design and Implementation of Secure ATM System Using Biometric and Hashing Technique</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">643E4545BC04A2D05EF9506E105F4168</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T12:18+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>ATM</term>
					<term>Security</term>
					<term>Biometric</term>
					<term>Fingerprint</term>
					<term>Minutiae</term>
					<term>Hash Code</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Security is a major concern in all aspects of life, Nowadays. Automated teller machines (ATMs) are the most commonly used devices for financial transactions in which personal identification numbers (PINs) are the authentication method used by many people. For a long time, researchers have been studying how to use an individual's biometric features to enhance authentication and verification technologies beyond the existing reliance on passwords. Since the biometric features cannot be stolen, the protection of digitized biometric data becomes critical in order to prevent it from various attacks. This paper presents a method for enhancing security in ATM banking system using finger print hash code biometric authentication. The proposed system provides two levels of security between ATM machine and server by combining biometric and hashing technique.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Many people in today's modern world depend on computers to keep track of important details. ATM is an automatic machine, and it has been in operation since 1967. John Shepphardbaren invented the ATM in the United Kingdom in June 1967. People nowadays use PINs and passwords to manage various devices such as cars, cell phones, and ATM machines; however, using PINs without security causes major problems for customers such as usability, memorability and security <ref type="bibr" target="#b0">[1]</ref>. A customer with a bank account can obtain confidential access to their account via an ATM by obtaining a PIN or password, enabling them to conduct transactions, transfer money, and so on. PIN numbers are very critical for securing customer account information and should not be shared with others.</p><p>ATM fraud is on the rise as automated teller machines (ATMs) become more widespread. ATM fraud is a major global issue that consumers and bank operators have had to deal with on a regular basis in recent years. Traditional ATM authentication, which relies on a card and a PIN, has drawbacks. If the account holder's card is lost and the PIN is known, the account holder is vulnerable to fraud. To resolve the security issues with ATM PIN authentication, new techniques are being developed. Since biometric data cannot be duplicated or lost, biometric authentication methods may provide a solution to this issue.</p><p>Biometrics authentication ensures identification based on a physiological or behavioural characteristic. In this work, we propose a two factor authentication scheme which uses biometric fingerprint, and hashing process to provide improved security for ATM authentication. Hash values are sent across the network and stored in the central database. During verification, the new hash value is compared with the hash values stored in the database for matching.</p><p>WCNC-2021: Workshop on Computer Networks &amp; Communications, May 01, 2021, Chennai, India. EMAIL: resmykr@gmail.com (Resmi Karinattu ReghuNathan) ORCID: 0000-0002-1307-8080 (Resmi Karinattu ReghuNathan)</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related Works</head><p>Traditional authentication are primarily based on knowledge and token. Despite the fact that the two credentials are well-known and accepted in society, they may also fail to provide true authentication. To overcome the limitations of conventional approaches, biometrics allows us to determine an individual's identity based on who they are rather than what they have or remember. Although user authentication and verification using biometrics is easy to use, it does pose concerns about the security of digitized biometric data. If an attacker gains access to this information, it can be used to perform a variety of attacks. Various security measures are used to protect the data from different attacks.</p><p>Nowadays, ATMs are widely used by the general public due to their ease of use, user-friendliness, and immediate availability of cash at any location. As the technology of ATM advances, attackers develop new techniques to bypass ATM security. Various types of fraud are common in ATM which include card theft, pin theft, card reader techniques, force withdrawals etc. As fraud approaches have become more sophisticated and occurrences have increased, financial institutions must manage the risk associated with ATM fraud by devising new security measures. Soutar et al. <ref type="bibr" target="#b1">[2]</ref> used an approach to fingerprint biometrics protection on images by encoding key data with a special filter in Fourier space. The decoder can retrieve the data only by showing a similar fingerprint picture. Here the matching process is based on correlation, where image translations are possible but not rotations.</p><p>In <ref type="bibr" target="#b2">[3]</ref>, ATM security is achieved by using steganography and cryptographic techniques on biometric finger vein technology. Security can be achieved by using light-weight cryptography and stegnography using variable MSB-LSB algorithm. Zhang et al. <ref type="bibr" target="#b3">[4]</ref> also proposed the usage of finger vein technology for authentication. Alzamel et.al <ref type="bibr" target="#b4">[5]</ref> proposed a method by fusing pin number with finger print authentication scheme. It employed POS (Point of Sale) network devices between finger print and ATM card. In <ref type="bibr" target="#b5">[6]</ref> [7] and <ref type="bibr" target="#b7">[8]</ref> the authors used finger print authentication method for enhancing ATM security. Onyesolu and Okpala <ref type="bibr" target="#b8">[9]</ref>, proposed a system with three levels of authentication including pin, finger print and OTP. The system provides a high level of security but the model is very complex and time consuming.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Proposed Method</head><p>Proposed method uses ATM authentication using hash code generated from finger print minutiae. The block diagram of the proposed method is shown in Figure <ref type="figure" target="#fig_0">1</ref>. It consists of two stages enrolment and verification. During enrolment, finger print data is taken instead of pin and hash code is generated from fingerprint minutiae points. During verification, the hash code generated for the given input image is compared with the hash values stored in the central database. If same hash Code matching is found, the fingerprint is authenticated and integrity is checked.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Feature Extraction using Fingerprint</head><p>Fingerprint is one of the important biometric feature used in ATM for personal authentication. The unique feature called minutiae, is the most critical parameters used in fingerprint recognition systems. Based on minutiae points, ridge ending and bifurcation are the two important minutiae features used for verification or identification.</p><p>The feature extraction of minutiae from finger print images is described in this section. Many fingerprint matching models are based on minutiae. The low quality of fingerprint images is one of the issues with fingerprint recognition. The enhancement's aim is to minimize noise in the fingerprint image and improve the ridge-valley structures, allowing for more precise minutiae extraction. There are a variety of fingerprint enhancement techniques available. This paper uses Gabor filters with only four orientations: θ = {0, π/4, π/2, 3π/4}.The minutiae must be extracted after enhancement. First step is a thresholding operation that is used to binarize the enhanced image. In thresholding each gray scale pixel value is converted to a binary value. After binarization, the next step is morphological thinning operation in which the width of each ridge is reduced to a single pixel, resulting in an image skeleton. The actual minutiae detection from the skeleton image is the next step. The Bifurcation and Termination is extracted as red points and green points in minutia. The last step is the post processing operation which eliminates false minutiae if any from skeleton images and maintaining the final true minutiae points. Figure <ref type="figure" target="#fig_1">2</ref> shows the steps involved in minutiae extraction from input finger print image.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Hash code generation from finger print</head><p>Hashing is a technique by which the data is mapped to a fixed value. Authentication is the primary application of hashing. There are many hash functions available. Two popular hash functions are MD5 and SHA. The two algorithms are compared based on parameters such as running time and complexity <ref type="bibr" target="#b9">[10]</ref>.The complexity of the two algorithms are equal, but MD5 is faster than SHA. Also MD5 generate simple hash compared to SHA. Based on these properties, MD5 hashing is used in the proposed technique.</p><p>MD5 hashing algorithm is used for generating the high security 32 bit hexadecimal hash code containing text and numbers. The procedure of MD5 hash generation is summarized in Algorithm 1. This algorithm takes features extracted from minutiae as input. All the four buffers are 32 bit registers. 4. Process message using logical operators OR, NOR, XNOR in 16 word blocks 5. Generate output as 32 bit hash code with lower order bits A ending higher bits D</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Experimental Results and Discussion</head><p>In this study finger print database FVC2002 <ref type="bibr" target="#b10">[11]</ref> is used and the feature extraction and hash code generation is implemented using Matlab. The finger print images goes through various preprocessing steps before minutia extraction. The outputs generated in minutia extraction for a given input image is illustrated in Figure <ref type="figure" target="#fig_2">3</ref>. After minutiae extraction, the hash code is generated from minutiae features using MD5 algorithm. Once the user enters his finger print at ATM client, hash code is generated at client side from fingerprint minutiae. The hash code is transmitted and reaches the server, the server verifies the hash code with the hash codes stored in the server database and if the verification is successful the user is authenticated. Figure <ref type="figure" target="#fig_3">4</ref> shows hash code generation and user authentication based on hash. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusion</head><p>Automatic Teller Machines are the most commonly used technology in today's world of growing financial transactions. ATM security using traditional PIN can be misused in a variety of ways. This paper presents security for ATM banking system using finger print and hashing techniques. Finger print hash code is used to uniquely identify the person. The proposed biometric and hashing techniques together for personal authentication improve the security level of ATM for efficient banking.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Proposed Authentication System in ATM</figDesc><graphic coords="3,253.32,352.92,117.72,186.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Steps used for Minutiae extraction</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Extracted Minutia from the input image</figDesc><graphic coords="4,211.44,303.36,188.52,133.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Hash code generation and User Authentication</figDesc><graphic coords="4,213.48,532.44,184.32,173.16" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head></head><label></label><figDesc>Algorithm 1 The algorithm used for generating Hash Code Input: Extracted Minutiae Features Output: 32 bit hexadecimal Hash Code 1. Append or add extra padding bits to original image 2. Attach 64 bits at the end of step1 results. 3. Initialize four MD buffers A, B, C, D to calculate the message digest values.</figDesc><table /></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Handbook of Fingerprint Recognition</title>
		<author>
			<persName><forename type="first">D</forename><surname>Maltoni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Maio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Prabhakar</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<publisher>Springer</publisher>
			<pubPlace>New York</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Biometric encryption</title>
		<author>
			<persName><forename type="first">C</forename><surname>Soutar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Roberge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Stoianov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Gilroy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Kumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">ICSA Guide to Cryptography</title>
				<editor>
			<persName><forename type="first">R</forename><surname>Nichols</surname></persName>
		</editor>
		<imprint>
			<publisher>McGraw-Hill</publisher>
			<date type="published" when="1999">1999</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Design and implementation of secure ATM system using machine learning and crypto-stego methodology</title>
		<author>
			<persName><forename type="first">I</forename><surname>Das</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Singh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gupta</surname></persName>
		</author>
		<idno type="DOI">10.1007/s42452-019-0988-0</idno>
		<ptr target="https://doi.org/10.1007/s42452-019-0988-0" />
	</analytic>
	<monogr>
		<title level="j">SN Appl. Sci</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="page">976</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">A finger-vein extraction algorithm based on local Radon transform</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">13th World Congress on intelligent control and automation (WCICA)</title>
				<imprint>
			<date type="published" when="2018-07">2018. July. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Point of Sale (POS) Network with Embedded Fingerprint Biometric Authentication</title>
		<author>
			<persName><forename type="first">Muneerah</forename><surname>Hussah Adnan Alzame</surname></persName>
		</author>
		<author>
			<persName><surname>Alshabanah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Mutasem</surname></persName>
		</author>
		<author>
			<persName><surname>Alsmadi</surname></persName>
		</author>
		<idno>ISSN: 2395-6011</idno>
	</analytic>
	<monogr>
		<title level="j">International Journal of Scientific Research in Science and Technology (IJSRST)</title>
		<idno type="ISSN">2395-602X</idno>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">5</biblScope>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Fingershield ATM -ATM Security System using Fingerprint Authentication</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">A</forename><surname>Christiawan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">F</forename><surname>Sahar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Rahardian</surname></persName>
		</author>
		<author>
			<persName><surname>Muchtar</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISESD.2018.8605473</idno>
	</analytic>
	<monogr>
		<title level="m">2018 International Symposium on Electronics and Smart Devices (ISESD)</title>
				<meeting><address><addrLine>Bandung, Indonesia</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page" from="1" to="6" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">ATM Transaction Using Biometric Fingerprint Technology</title>
		<author>
			<persName><forename type="first">Mahesh</forename><surname>Patil</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Sachin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Electronics</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A novel method to enhance the security of ATM using biometrics</title>
		<author>
			<persName><forename type="first">G</forename><forename type="middle">R</forename><surname>Jebaline</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gomathi</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICCPCT.2015.7159391</idno>
	</analytic>
	<monogr>
		<title level="m">2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015</title>
				<meeting><address><addrLine>Nagercoil, India</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2015">2015. 2015</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Improving Security Using a Three-Tier Authentication for Automated Teller Machine</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">O</forename><surname>Onyesolu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">C</forename><surname>Okpala</surname></persName>
		</author>
		<idno type="DOI">10.5815/ijcnis.2017.10.06</idno>
		<ptr target="https://doi.org/10.5815/ijcnis.2017.10.06" />
	</analytic>
	<monogr>
		<title level="j">ATM</title>
		<imprint>
			<biblScope unit="page" from="50" to="56" />
			<date type="published" when="2017-10">2017. October. 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A comparative study of Message Digest 5(MD5) and SHA256 algorithm</title>
		<author>
			<persName><forename type="first">Dian</forename><forename type="middle">&amp;</forename><surname>Rachmawati</surname></persName>
		</author>
		<author>
			<persName><surname>Tarigan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Ginting</surname></persName>
		</author>
		<idno type="DOI">10.1088/1742-6596/978/1/012116</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Physics: Conference Series</title>
		<imprint>
			<biblScope unit="volume">978</biblScope>
			<biblScope unit="page">12116</biblScope>
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="http://bias.csr.unibo.it/fvc2002/download.asp" />
		<title level="m">Fingerprint Verification Competition</title>
				<imprint>
			<date type="published" when="2002">FVC2002</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
