Gesture-Based Secure Pin Entry in ATM

Author:

Thakur Akhilesh1,Aryan Ashish1,Kumar Jayendra2,Kumar Roshan2,Anumeha Bentham Science Publisher3

Affiliation:

1. India,

2. China,

3. Jamshedpur,India,

Abstract

At present, ATMs (Automated Teller Machines) are one of the essential services for our daily life. It is also true that the thefts of false transactions and pin thefts are increasing yearly. A significant amount of theft at ATMs is due to pin overlooking and card skimming. Biometrics provide promising security but have high implementation costs. Also, Indian laws discourage using BiometricsBiometrics in all places. So, can AI be the solution to this problem? Instead of using keypad-based inputs for pins, gesture detection with AI can be used for secure inputs. A trained deep neural network can detect count from the hand symbols/gestures. The gesture input is given by inserting the hand inside a safe box with a high-resolution camera attached. The camera takes images and sends them to Raspberry Pi or any other embedded system. The Raspberry Pi executes the lightweight ML model to detect the count. The detected count is then encrypted and passed to the ATM. Using a gesture identification system removes the problem of pin theft and can be developed and implemented with the slightest modification in ATMs. In the current COVID period, execution of ATM works with minimum contact to public surfaces has increased immensely. In this system, a keypad is also removed and can further be incorporated to read a variety of inputs from gestures instead of just hands. This chapter explores how lightweight neural networks can be trained to detect sensors and run on low-processing systems like Raspberry Pi. We achieved an accuracy of 94%-97% in detecting gestures and pins where accuracy varies for each motion.<br>

Publisher

BENTHAM SCIENCE PUBLISHERS

Reference18 articles.

1. Coventry, Lynne, Antonella De Angeli, and Graham Johnson. "Usability and biometric verification at the ATM interface," In SIGCHI conference on Human factors in computing systems, 2003, pp. 153-160

2. N. K. Ratha, J. H. Connell and R. M. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems Journal, vol. 40, no. 3, pp. 614-634, 2001

3. Sharma, N, Rathore VS. "Different data encryption methods used in secure auto teller machine transactions." International Journal of Engineering and Advanced Technology (IJEAT), vol 1, issue 4, pp. 175-176, 2012

4. Jim Bowen, “How ATMs Work”. April 2000 [Online]. Available: [Accessed:. 17 March 2022]

5. Jamie Bettles, “Chinese Lesson – Count from 0 to 10”. June 2014 [Online]. Available: [Accessed:. 17 March 2022]

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3