skip to main content
10.1145/3127942.3127945acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicacsConference Proceedingsconference-collections
research-article

Raspberry Pi and IOT Based-Automated Teller Machine Security for the DSWD 4P's Biometric System Using Fingerprint Recognition with Fast- Fourier Transform Image Enhancement, Multi-Stage Minutia Extraction

Published: 10 August 2017 Publication History

Abstract

Card skimming and identity theft in ATMs transactions are prevalent nowadays. The use of the common PIN system together with the use of fingerprint as one's identification, eliminating the card skimming- and theft-prone typical card when the PIN is known, strengthens the current ATM transaction process. Images from fingerprint sensors undergo a multi-step process to provide proper user identification when transacting in ATMs. The researcher came up with the idea of designing a system to eliminate possibilities of card skimming and identity theft with the use of a fingerprint identification which is unique for each person. The system uses Fast Fourier Transform as one of its image process to produce better image quality to be used for minutiae identifications. The system's simulated performance indices showed an FAR and FRR of 0% and 15.79%, respectively, and accuracy of 92.11%. The image is remotely transmitted to a distant server wirelessly, implementing a full Internet of Things providing the system a better mobility for mobile ATM Setups in far places.

References

[1]
Ashbaugh, D. R. Quantitative-Qualitative Friction Ridge Analysis: An Introduction to Basic and Advanced Ridgeology, CRC Press, 1999.
[2]
Cappelli, R., et al. Fingerprint Image Reconstruction from Standard Templates. IEEE Trans. Pattern Analysis and Machine Intelligence, Sept. 2007, pp. 1489--1503.
[3]
Clarke, R. Human Identification in Information Systems: Management Challenges and Public Policy Issues. Information Technology & People, (1994), pp. 6--37.
[4]
Feng, X. Combining Minutiae Descriptors for Fingerprint Matching. Pattern Recognition, Jan. 2008, pp. 342--352.
[5]
Hong, L. Fingerprint Image Enhancement: Algorithm and Performance Evaluation. Transactions on Pattern Analysis and Machine Intelligence, (1998), pp. 777--789.
[6]
Hong, L., Wan, Y., and Jain, A. K. Fingerprint Image Enhancement: Algorithm and Performance Evaluation. Transactions on Pattern Analysis and Machine Intelligence, vol. 20, no. 8, (1998), pp. 777--789.
[7]
Jain, A. K., Flynn, P., and Ross, A. A. eds., Handbook of Biometrics, Springer, 2007.Maltoni, D., et al., Handbook of Fingerprint Recognition, 2nd ed., Springer, 2009.
[8]
Kansaei, M. B. Fingerprint Feature Enhancement Using Block-Direction on Reconstructed Images. International Conference on Information, Communications and Signal Processing, (1997), pp. 721--725.
[9]
Lee, H. C. and Gaensslen, R. E., eds. Advances in Fingerprint Technology, 2nd ed., CRC Press, 2001.
[10]
Pankanti, S., Prabhakar, S. and Jain, A. K. On the Individuality of Fingerprints. IEEE Trans. Pattern Analysis and Machine Intelligence, Aug. 2002, pp. 1010--1025.
[11]
Ross, A. A., Nandakumar, K., and Jain, A. K. Handbook of Multibiometrics, Springer, 2006.

Cited By

View all
  • (2022)A Spoof Detecting Fingerprint Reader Based on a Combination of Total Internal Reflection and Direct Image Capture2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)10.1109/IICAIET55139.2022.9936823(1-6)Online publication date: 13-Sep-2022
  • (2021)Development of a Non-contact Two-Tier Biometric Security System for the DSWD 4Ps using Iris recognition and Speech Recognition2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)10.1109/ISRITI54043.2021.9702822(550-555)Online publication date: 16-Dec-2021
  • (2021)Image Enhancement in Healthcare Applications: A ReviewArtificial Intelligence and Machine Learning for COVID-1910.1007/978-3-030-60188-1_6(111-140)Online publication date: 20-Feb-2021
  • Show More Cited By

Index Terms

  1. Raspberry Pi and IOT Based-Automated Teller Machine Security for the DSWD 4P's Biometric System Using Fingerprint Recognition with Fast- Fourier Transform Image Enhancement, Multi-Stage Minutia Extraction

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICACS '17: Proceedings of the 1st International Conference on Algorithms, Computing and Systems
    August 2017
    117 pages
    ISBN:9781450352840
    DOI:10.1145/3127942
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 10 August 2017

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Automated Teller Machine
    2. FAR
    3. FR
    4. Fast Fourier Transform
    5. Fingerprint
    6. IoT
    7. Mobility
    8. Network Security
    9. Raspberry Pi
    10. image processing
    11. minutia

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICACS '17

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)7
    • Downloads (Last 6 weeks)3
    Reflects downloads up to 07 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)A Spoof Detecting Fingerprint Reader Based on a Combination of Total Internal Reflection and Direct Image Capture2022 IEEE International Conference on Artificial Intelligence in Engineering and Technology (IICAIET)10.1109/IICAIET55139.2022.9936823(1-6)Online publication date: 13-Sep-2022
    • (2021)Development of a Non-contact Two-Tier Biometric Security System for the DSWD 4Ps using Iris recognition and Speech Recognition2021 4th International Seminar on Research of Information Technology and Intelligent Systems (ISRITI)10.1109/ISRITI54043.2021.9702822(550-555)Online publication date: 16-Dec-2021
    • (2021)Image Enhancement in Healthcare Applications: A ReviewArtificial Intelligence and Machine Learning for COVID-1910.1007/978-3-030-60188-1_6(111-140)Online publication date: 20-Feb-2021
    • (2019)A Systematical Review Study to Investigate the Use of Biometric Security Techniques in Automatic Teller Machines: Insight from the Past 15 Years2019 1st International Informatics and Software Engineering Conference (UBMYK)10.1109/UBMYK48245.2019.8965494(1-4)Online publication date: Nov-2019
    • (2017)MFCC and VQ voice recognition based ATM security for the visually disabled2017IEEE 9th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment and Management (HNICEM)10.1109/HNICEM.2017.8269516(1-5)Online publication date: Dec-2017

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media