ABSTRACT
This research work is determined to provide a more secure platform for cash dispensing machines and financial transactions.
The security of the transactions on the Automated Teller Machine (ATM) has been raising many concerns in some parts of the world. These concerns are due to series of limitations in the existing designs of the various service points. The current use of Personal Identification Number (PIN) for ATM user’s verification and identification has been susceptible to unauthorized access, misplacement, forgetfulness, card swallowing among others; thereby narrowing down the machine’s acceptability and patronage. In this paper, a framework for fingerprint authenticated ATM application is presented. The framework comprises of modules for fingerprint enrolment, database and verification. The verification module comprises of fingerprint enhancement, feature extraction and matching sub-modules, which all rely on suitable mathematical models to function. There is also platform for financial transactions including withdrawal and balance enquiries as seen in the existing PIN ATM system. The designed system was not meant to be implemented as the scope of this work does not give room for that. But since the need for implementation may definitely arise in the future; the new system maybe best implemented using Windows 7 as operational platform while C# and Microsoft SQL server served as the frontend and backend engines respectively. Tests conducted on the evaluation of the application using False Rejection Rate (FRR), False Acceptance Rate (FAR) and Average Matching Time (AMT) show the adequacy and the suitability of the proposed framework for ATM user verification and authentication. Futher details of this proposed implementation process can be found under the implications section of this work.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION
APPROVAL
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
ORGANIZATION OF WORK
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 PROBLEM STATEMENT
1.2 AIMS/OBJECTIVES
1.3 PURPOSE
1.4 SIGNIFICANCE
1.5 SCOPE/DELIMITATION
1.6 CONSTRAINTS/LIMITATIONS
1.7 DEFINITION OF TERMS
CHAPTER TWO
REVIEW OF RELEVANT LITERATURE
CHAPTER THREE
3.0 METHODS OF FACT FINDING AND DETAILED DISCUSSION OF THE SYSTEM
3.1 METHODS OF FACT FINDING
3.2 DISCUSSIONS
3.3 PROBLEMS OF THE EXISTING SYSTEM
3.4 JUSTIFICATION OF THE NEW SYSTEM
CHAPTER FOUR
FEATURES, IMPLICATIONS AND CHALLENGES OF THE SYSTEM
4.1 FEATURES
4.2 IMPLICATIONS
4.3 CHALLENGES
CHAPTER FIVE
SUMMARY, RECOMMENDATION AND CONCLUSION
5.1 SUMMARY
RECOMMENDATION
CONCLUSION
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2014, 09). Novel Information Security Framework For Automated Teller Machine Atm.. ProjectStoc.com. Retrieved 09, 2014, from https://projectstoc.com/read/2938/novel-information-security-framework-for-automated-teller-machine-atm-4686
"Novel Information Security Framework For Automated Teller Machine Atm." ProjectStoc.com. 09 2014. 2014. 09 2014 <https://projectstoc.com/read/2938/novel-information-security-framework-for-automated-teller-machine-atm-4686>.
"Novel Information Security Framework For Automated Teller Machine Atm.." ProjectStoc.com. ProjectStoc.com, 09 2014. Web. 09 2014. <https://projectstoc.com/read/2938/novel-information-security-framework-for-automated-teller-machine-atm-4686>.
"Novel Information Security Framework For Automated Teller Machine Atm.." ProjectStoc.com. 09, 2014. Accessed 09, 2014. https://projectstoc.com/read/2938/novel-information-security-framework-for-automated-teller-machine-atm-4686.
- Related Works
- Shortest Nodefinder In Wireless Ad Hoc Network
- Itp: An Image Transport Protocol For The Internet
- Design And Implementation Of A Computer Based Income Tax ( A Case Study Of Board Of Internal Revenue Enugu)
- Scalable And Efficient End To End Network Topology Inference
- Design And Implementation Of A Computerized Financial Management System For Public Institutions (a Case Study Of Unth, Enugu)
- Design And Simulation Of A Digital Circuit Simulation
- Radar Tracking System Concept And Application
- Design And Implementation Of Code Optimization: Implementation Of Scalar Optimization
- Optimal Multicast Routing In Mobile Ad Hoc Network
- Peer To Peer Messaging