Académique Documents
Professionnel Documents
Culture Documents
491 www.erpublication.org
Factors of Implementing Biometric Security on Measure of ATM
either an edge bifurcation or an edge finishing[6].In recent attractive groups of the cards. The following venture in the
years the importance of biometrics has grown tremendously advancement of this industry was to join these gadgets to the
with an increasing demand of security in accordance of bank's incorporated frameworks; by then, mid -1980's, banks
unique identification of individuals. Apart from banking, would work in a double modality [9], at the end of the day, the
biometrics finds use in the retail payments arena. Since ATM would take a shot at the line yet in the occasion of
biometric engineering can be utiliz ed as a part of the spot of correspondence misfortune it had the capability to approve
PIN codes in Atms. Biometric offers a guaranteeing the transaction with the data recorded with the attractive band.
methodology for security applications, with a few favorable [12][13].
circumstances over the established techniques. As such,
utilizing biometrics makes it conceivable to build a character Atms began to work solely on-line intimating that, if the ATM
based technique, which can give sufficient security to these misfortune correspondence with its focal framework, there
applications [7]. would not be adjusted. Once ATMs was connected directly,
the need arose to protect the information on the card and the
II. ISSUES & CHALLENGES clients PIN (Personal Identification Number) found in
messages that had to travel across public telecommunication
A broadly held idea among security experts is that security for lines. For this purpose, from the beginning, algorithms that
it purpose is not a wise business investment. Before putting allowed for the encryption of the information
resources into efforts to establish safety, an association ought
to embrace a danger evaluation to recognize conceivable Cards with Magnetic Bands
dangers, their probability and their conceivable effect. At the
point when inspecting ATM security, a sober minded An attractive stripe card is a sort of card fit for putting away
methodology is a danger based one. Particularly in today's information by changing the attraction of little iron-built
financial atmosphere, it bodes well for use cash on ATM attractive particles with respect to a band of attractive material
efforts to establish safety that doesn't address genuine on the card. The attractive stripe, in some cases called swipe
business dangers. There are numerous routes for robbery, card or magstripe, is perused by swiping past a head. The card
ATM, for example, skimming and card burglary will be Reader is a piece of the ATM machine that distinguishes the
shown.Automatic Teller Machines (ATM) are an electronic specific record number. To comprehend the record data of the
keeping money outlet, which permits clients to finish essential client, the information from the card is passed on to the host
transactions without the support of an extension delegate or processor. The host processor, along these lines utilizes this
taller[8]. These days, utilizing the ATM which gives clients information to get the data from the card holder's bank. ATM
the helpful banknote exchanging is extremely basic. On the Processing is like Mastercard preparing, with the exception of
other hand, the money related wrongdoing course climbs over with ATM Machines the handling focus utilizes ATM
and again lately; a ton of culprits messes around with the organizes rather than credit systems. Regardless, the ATM
ATM terminal and take a client's charge card and watchword machine will be modified with a TID (terminal ID number).
by illicit means. When the client's bank card is lost and the This is the number that recognizes the ATM machine on the
secret word is stolen, the criminal will attract all money the framework.[14]
briefest time, which will bring colossal budgetary misfortunes
to the client. The most effective method to bear on the Cards with Magnetic Bands The plastic cards with
legitimate personality of the client turns into the center in a magnetic bands date back to more than 30 years. The financial
current financial circle[2][9]. sector has used them as a means to making payments and to
Conventional ATM frameworks confirm by and large by offer access to the financial services to clients. The attractive
utilizing the charge card and the watchword, the system has a band contains interesting data for each card, taking into
few deformities. Utilizing charge card and secret word can't account client ID and master viding access to its items
confirm the customer's character precisely. With quickly through the different electronic channels [15]. In order to
expanding number of break-in reports on customary PIN and offer access to these things, cards with alluring gatherings are
secret word security frameworks, there is an appeal for more frequently joined with an individual recognizing evidence
prominent security for access to touchy/ individual number (PIN) which is from the start dispensed by the
information. These days, biometric technologies are typically component issuing the card and, sometimes, the client can
used to analyze the human characteristics for security then change it at his/her settlement. The card and the PIN are
purposes[10]. Biometrics based authentication is a potential straightforwardly identified by the client ID and take into
candidate to replace password-based authentication[11]. In account the use of electronic channels much the same as is the
recent years, the technique that the fingerprint recognition situation with the ATMs[12].
continuously updated, which has offered new verification, the
original password authentication method combined with the 2.1 ATM Hardware and Software Characteristics
biometric identification technology verify the clients' identity
better and achieve the purpose that use of ATM machines ATM is seen as fittings and programming that complies
improve the safety effectiveness. with ATM convention principles. Together, the equipment
ATM advancement paralleled the development of the PC and and programming give multiplexing, cross associate and
information transfers commercial ventures. Each one machine exchanging capacities in a system. The ATM innovation takes
worked in a neighborhood mode without any association with the type of Network Interface Cards, multiplexers, cross-join
the saving money frameworks, and transaction approval and switches. ATM-based administrations are presently being
occurred focused around the information recorded in the offered by circuit suppliers. The improvement of
circuit-copying engineering focused around ATM will permit
492 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-5, May 2015
clients to profit from incorporated access to administrations. The idea of network towards accomplishing a complete
Associations with access to transporter circuits will have the definition utilizing principle matrix quality and uses found in
capacity to include ATM applications with negligible writing. Ten definitions separated from primary written
incremental expense. ATM fittings and related programming sources have been examined permitting the extraction of
can give the spine engineering to an advanced framework attributes while network users are characterized as
correspondences system. ATM gives an extremely scaleable far as the distinctive sorts of use backing gave by lattices. A
base that can be developed from in-building applications to lattice definition is proposed utilizing these qualities and
yard situations to associations between remote areas. The employments. This definition may be exceptionally valuable
adaptability is found in the accessible measurements for to focus the cutoff points of the lattice idea and to investigate
interface velocity, switch size, system size and tending to. new application fields in matrix figuring. In this sense, the
concentrated qualities are utilized to focus the potential
ATM Hardware and Software Characteristics We may profits a lattice base may give to Computer Supported
group the fittings for an ATM in two real classes: the first, Collaborative[20].
comparing to its PC building design (a chip, memory, drives,
screen, console, and so forth.), the second one identified with 2.2 Transaction Functionality
ATM particular capacities, for example, card perusers, money
apportioning, money stockpiling, utilization and For ATM transactions, it is a key necessity that the
administrator's feature and console communication, and so on. presentation of another venture in the confirmation process
[16]. Based on the PC architecture, the software included in does not add fundamentally to the general transaction time
an ATM is not very different to that which is found on a generally lines of clients can rapidly manufacture. That model
personal computer [17]. It has a working framework. The coordinated finger impression biometric engineering into the
telecom framework is today basically arranged to transaction approval process in Atms. The approving
administrations focused around the TCP/IP conventions. The framework programming approved the client by teaching the
application programming is more often than not given by the biometric framework to peruse and accept the unique finger
maker of the ATM machine. It typically offers an interface impression biometric and afterward entered into the ATM
taking into account every budgetary foundation to adjust its framework. Since, it is conceivable that information acquired
own particular applications[18]. amid biometric enlistment of the clients may be utilized as a
part of routes for which the selected individual has not agreed
putting away the biometric all things considered is not fitting.
We have portrayed the different components that intercede in
an ATM transaction, the card and the ATM segments. Figure
2 demonstrates the arrangement of occasions included in the
approval process together with the usefulness of the focal
approval framework to which the ATM is associated [13].
493 www.erpublication.org
Factors of Implementing Biometric Security on Measure of ATM
equipment for skimming (card readers, miniature cameras) embedded into the card reader's throat. Snares are appended
can be easily obtained online. to the tests keeping the card from being come back to the
The skimming gadgets can be appended with ATM purchaser at the end of the transaction. At the point when the
machine and take information of different ATM cards. ATM terminal client shows concern because of the caught
Basically, this kind of assault is to be carried out on a vendor's card, the criminal, typically in the close, closeness of the
machine where the client gives ATM card for installment ATM, will offer help, recommending the client enter the PIN
reason. In the overview, Reserve Bank of India reports told once more, so he or she finds herself able to view the section
that this is exceptionally normal debilitating in India last and recollect the PIN. After the buyer leaves the region,
numerous years.[21] accepting their card to have been caught by the ATM, the
criminal will then utilize a test (angling gadget) to concentrate
Skimming is by far the most popular form of ATM attack, the card. Having saw the clients PIN and now having the cord
accounting for over 80% of ATM fraud, or around $800 under control, the criminal can undoubtedly withdraw cash
million per year in 2008 [22]. It is additionally picking up from the clueless client's record.[24]
notoriety among culprits as it is an "a great deal more gainful
wrongdoing to perpetrate (contrasted with other III. BIOMETRIC TECHNOLOGY
crimes)"(peretti, 2009) on the grounds that a lot of cash can be The expression "biometrics" is inferred from the Greek words
gathered rapidly and with a generally okay of recognition. bio (life) and metric (to measure) For our utilization,
biometrics alludes to innovations for measuring and breaking
For example, In January 2010, two criminals in Houston, down an individual's physiological or behavioral attributes.
Texas ran a skimming operation at a single ATM that resulted These attributes are one of a kind to people thus can be
in more than $200,000 in bank losses. Their operation was utilized to confirm or recognize an individuals. Biometric
fairly low-tech compared to other skimming operations, innovation is utilized for programmed individual
illustrating how easy it is to perform these attacks. They distinguishment focused around natural attributes finger
installed a skimmer at an ATM and parked across the street, impression, iris,face, palm print, hand geometry, vascular
observing the ATM through binoculars. When a victim example, voiceor behavioral qualities walk,
approached the ATM, they would move in with a camera and signature,typing example. Fingerprinting is the most seasoned
capture the PIN number being entered[23]. of these systems and has been used for a century by law
implementation authorities who utilize these unique qualities
An alternate technique for getting to a purchaser's record to stay informed concerning culprits.[27]
data is to skim the data off of the card. Skimming is the most The biometric innovation uses a human's one of a kind
regularly utilized strategy for wrongfully acquiring card track physical or behavioral qualities to verify people [28]. The
information. "Skimmers" are gadgets utilized by offenders to fundamental inspiration for utilizing biometric engineering is
catch the information put away in the attractive piece of the to effectively and viably control get to by confirming clients
card. Perusing and disentangling the data on the attractive through their remarkable biometric attributes. Because of the
stripes of the card can be fulfilled through the application of potential value of this new engineering, its applications are
little card perusers in close, closeness to, or on top of, the real getting to be pervasive all through government programs and
card per user into opening, so it has the capacity to read and the private division [29][30].
record the data put away on the attractive track of the card.
The gadget is then uprooted, permitting the downloading of Market experts estimate that biometrics will be in the
the recorded information.[24] standard of data engineering inside 10 years[31]. The
International Biometric Group (IBG) predicts that biometrics
2.4 Card Theft business sector size will reach $4.6 billion in 2008[32]. The
main biometric modalities incorporate finger impression
There are numerous approaches to burglary, ATM card, distinguishment, iris distinguishment, facial distinguishment,
one of them is the hoodlum puts wire, VHS tape or other hand or two-finger geometry, voice distinguishment, and
system in the ATM card space to "get" the card and keep it mark distinguishment. It is clear that there are huge contrasts
from being catapulted. They then frequently watch the in these modalities as far as exhibitions, complexities,
cardholder entering their PIN or "help" the brush off by vulnerabilities, and acknowledgement by customers[28].
prescribing they enter their PIN to recover the card[25]. The
cheats later utilize tweezers to uproot the card. As specified long ago, unique finger impression
distinguishment innovation is the most usually utilized
Then again a trick includes the hoodlums putting a dainty, biometric engineering, making up around 67% of the present
clear, unbending plastic, "sleeve" into the ATM card opening. day biometrics market [33]. This kind of biometric examines
At the point when the exploited person embeds his card, the the structures and examples of the edges and valleys at first
ATM can't read the strip, so it over and over requests that he glance tips of human fingers. The prominence of finger
enter his PIN number. In the interim, somebody behind him impression distinguishment engineering is because of its high
looks as he taps in his PIN. In the end the exploited person dependability, usability, and low framework cost, and
leaves, thinking the ATM has gulped his card. The cheats then additionally the long lifespan of fingerprints . So also, iris
uproot both the plastic sleeve and the card, and withdraw from distinguishment engineering investigates the rich examples of
the victimized person's record. [26]. the eye's iris to extraordinarily recognize people. This
In an exertion to get real cards, hoodlums have utilized a modality is more solid than fingerprints, in any case,
mixed bag of card catching gadgets involved thin mechanical organizations have been moderate to grasp this biometric
gadgets, frequently encased in a plastic transparent film,
494 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-5, May 2015
495 www.erpublication.org
Factors of Implementing Biometric Security on Measure of ATM
496 www.erpublication.org
International Journal of Engineering and Technical Research (IJETR)
ISSN: 2321-0869, Volume-3, Issue-5, May 2015
redesign schema security, data and finger impression quirks establish safety, an association ought to attempt a danger
transmitting between the customer and the server must be appraisal to distinguish conceivable dangers, their probability
encoded.[58] and their conceivable effect. Biometric innovation comprises
Electronic exchange is a making field. All things considered, of systems for remarkably perceiving people based upon one
ordinary security framework uses mystery word affirmation in or more natural physical or behavioral attributes. In software
the midst of recognizable confirmation and support of engineering, specifically, biometrics is utilized as a type of
individual/machine skeletons, which makes general joined character access administration and access control. It is also
information securing and transmitting security structures used to identify individuals. The main motivation for
become irrelevant in light of a couple of inadequacies employing biometric technology is to efficiently and
occurring in view of the customers themselves, for instance, effectively control access by authenticating users via their
the watchword being too much essential and successfully unique biometric characteristics such as fingerprint
decoded.[59] Finger impression recognizing verification technique .Fingerprint scanning, continues to gain acceptance
advancement and its applications makes it possible to murder as a reliable form of securing access through identification
such hindrances in the information fields. and verification processes. It is essential that to first
understand the basic of a biometric based security system.
SENSOR Finger print Management The usage of the ATM security framework by utilizing
Module biometric systems it is a paramount system and extremely
Feature Extraction difficult and troublesome. This system is exceptionally vital
Module Database to control criminal records.the model of the created
application has been discovered guaranteeing on the record of
its affectability to the distinguishment of the client's finger
Interface Module Server Identify impression as contained in the database. This framework
Verification when completely conveyed, we will certainly lessen the rate
of deceitful exercises on the ATM machines such that just the
Key Protocol enlisted manager of a card access to the bank account.from
and Key the test completed we have possessed the capacity to
demonstrate that the biometric ATM is practicable and could
be actualized in a true the earth. Biometric tokens are the most
Customer Identification secure method for avoiding ATM frauds.
Verification
REFERENCE
Figure 7. Bank saving network system frame based on [1] A. .Cavoukian, Consumer Biometric Applications: A Discussion
fingerprints. Paper: Information and Privacy Commissioner/Ontario, from
http//www.ontla.on.ca/library/repository/mon/10000/ 211727.pdf,
1999.
IV. CONCLUSION [2] M. M. Jaber, M. K. A. Ghani, and N. S. Herman, "A Review of
ATMs are an electronic managing an account outlet, which Adoption of Telemedicine in Middle East Countries: Toward
permits clients to finish fundamental transactions without the Building Iraqi Telemedicine Framework" Sci.Int. (Lahore), vol. 26,
no. 4, pp. 1795-1800, 2014.
support of an extension delegate or teller. Atms have [3] S. S. Alhir, Learning UML, OReilly Assoc. Inc. Sebastopol, CA,
transformed into an accomplished development which gives USA., 2003.
money related administrations to a growing segment of the [4] J. Anjanaa, D. P. V, and M. Prathiba, Universal ATM Card, no. 3,
populace in numerous countries.It is an unattended computer pp. 1922, 2013.
[5] J. T. Bangor, A., Kortum, P. T., & Miller, An empirical evaluation of
terminal that performs basic teller functions when a the system usability scale, vol. . Internat, pp. 24(6), 574594., 2008.
cardholder inserts a card into the ATM and enters the correct [6] M. Beck, K., & Fowler, Planning extreme programming, Boston,
PIN. Typical functions include dispensing cash, accepting MA, USA Addison-Wesley Longman Publ. Co. Inc., 2000.
deposits and loan payments, and accepting account transfers [7] G. Berardi, D., Calvanese, D., & De Giacomo, Reasoning on UML
class diagrams. Artificial Intelligence, pp. 168(12), 70118., 2005.
and inquiries. The primary purpose behind acquainting [8] M. L. Bote-lorenzo, Y. A. Dimitriadis, and G. Eduardo, Grid
biometric frameworks is with increment general security. Characteristics and Uses: a Grid Definition, pp. 291298, 2004.
Biometrics offers more prominent security and [9] M. M. Jaber, M. K. A. Ghani, N. Suryana, M. A. Mohammed, and T.
accommodation than customary techniques for individual Abbas, Flexible Data Warehouse Parameters: Toward Building an
Integrated Architecture, Int. J. Comput. Theory Eng., vol. 7, no. 5,
distinguishment. In a few applications, biometrics can pp. 349353, 2015. DOI: 10.7763/IJCTE.2015.V7.984
supplant or supplement the current innovation. In others, it is [10] A. Cavoukian, A., & Stoianov, Biometric encryption. Biometric
the main feasible methodology. The biometric framework is Technology Today, vol. Conceptual, 2007.
one and only piece of a general ID or validation process, and [11] T. J. Abaas, A. S. Shibghatullah, and M. M. Jaber, Use Information
Sharing Environment Concept to Design Electronic Intelligence
alternate parts of that process will assume an equivalent part
Framework for Support E-Government: Iraq as Case Study,
in deciding its viability. When reviewing ATM security, a Sci.Int.(Lahore), vol. 26, no. 4,, pp. 2224, 2014.
pragmatic approach is a risk-based one. Especially in todays [12] G. Darwish, A., Zaki, W., Saad, O., Nassar, N., & Schaefer, Human
economic climate, it makes little sense to spend money on Authentication Using Face and Fingerprint Biometrics, . Pap.
Present. Comput. Intell. Commun. Syst. Networks (CICSyN),
ATM security measures that dont address real business risks.
Liverpool, United Kingdom,, pp. 274278., 2010.
There are numerous courses for robbery, ATM, for example, [13] R. Das, An introduction to biometrics., pp. 29(7), 2027., 2005.
skimming and card burglary etc. A generally held idea among [14] S. S. Das and S. J. Debbarma, Designing a Biometric Strategy (
security experts is that security for it purpose is not a shrewd Fingerprint ) Measure for Enhancing ATM Security in Indian
business speculation. Before putting resources into efforts to E-Banking System, vol. 1, no. 5, pp. 197203, 2011.
497 www.erpublication.org
Factors of Implementing Biometric Security on Measure of ATM
[15] B. Dedeke, A., & Lieberman, Qualifying use case diagram [41] J. Nielsen, The usability engineering life cycle., . Comput. 25(3),,
associations., Comput. 39(6), 23-29., 2006. pp. 1222., 2002.
[16] M. Delac, K.; Carrier Services Dept., HT - Croatian Telecom, [42] M. A. Subramani, & A. Krishnan, (2005). STATIC
Zagreb, Croatia; Grgic, A survey of biometric recognition MULTITHRESHOLD RATE CONTROL MECHANISMS IN
methods, Electron. Mar. 2004. Proc. Elmar 2004. 46th Int. Symp., DOUBLY FINITE QUEUE FOR SUPPORTING ABR TRAFFIC IN
pp. 184 193, 2004. ATM NETWORKS.
[17] J. Duan, An approach for modeling business application using [43] L. Olatokun, W., Gaborone, B., & Igbinedion, The Adoption of
refined use case, Pap. Present. ISECS Int. Colloq. Comput. Automatic Teller Machines in Nigeria: An Application of the Theory
Commun. Control. Manag. (CCCM 2009), Sanya. China, p. . pp 404 of Diffusion of Innovation., pp. Growing Information: Part I, 6, 373.,
407., 2009. 2009.
[18] M. Hassan, A. Fuad, M. A. Mohammed, and M. M. Jaber, Follow up [44] O. Overmyer, S. P., Lavoie, B., & Rambow, Conceptual modeling
System for Directorate of Scholarship and Cultural Relations in Iraq, through linguistic analysis using LIDA, Pap. Present. 23rd Int.
in International Conference on Computer, Communication, and Conf. Softw. Eng. Toronto, 1219 May. IEEE Comput. Soc. Press.
Control Technology, 2014, no. I4ct, pp. 182187. Toronto, p. . pp. 401410., 2001.
[19] R. Guerette, R., & Clarke, Product life cycles and crime: Automated [45] K. K. Peretti, DATA BREACHES: What the Underground World of
teller machines and robbery, Secur. J., pp. 16(1), 718., 2003. Carding Reveals., St. Cl. Comput. High Technol. Journal, 25(2),
[20] W. Halal, Technologys Promise: Highlights from the TechCast 375-413., 2009.
Project, . Futur. 40(6), 41., 2006. [46] M. H. Ali and M. A. Othman, "Towards a Exceptional Distributed
[21] J. Han, F., Hu, J., Yu, X., Feng, Y., & Zhou, A novel hybrid Database Model for Multi DBMS," in Advanced Computer and
crypto-biometric authentication scheme for ATM based banking Communication Engineering Technology, ed: Springer, 2015, pp.
applications., Adv. Biometrics, 675-681, 2005. 553-560.
[22] T. Hannan, ATM surcharge bans and bank market structure: The [47] S. Qadrei, A., & Habib, Allocation of Heterogeneous Banks
case of Iowa and its neighbors, J. Bank. Financ. 31(4), 1061-1082., Automated Teller Machines, Pap. Present. Intensive Appl. Serv.
2007. INTENSIVE 09. First Int. Conf. alencia. pp 16-24, 2009.
[23] & W. er Hayashi, F., Sullivan, R., A guide to the ATM and debit [48] R. Rasu, P. K. Kumar, and M. Chandraman, Security for ATM
card industry: Payments System Research Dept., City., Fed. Reserv. Terminal Using Various Recognition Systems, vol. 2, no. 4, pp.
Bank Kansas, 2003. 222225, 2012.
[24] M. Hidano, S., Ohki, T., Komatsu, N., & Kasahara, On biometric [49] I. B. Recognition, using Dyadic Wavelet Transform, no. October,
encryption using fingerprint and its security evaluation., Pap. pp. 36, 2002.
Present. Control. Autom. Robot. Vision, 2008. ICARCV 2008. 10th [50] K. A. Rhodes, Challenges in using biometrics, . United States Gen.
Int. Conf. Hanoi, p. . pp.950956., 2009. Account. Off. Retrieved Novemb. 24, 2010, from
[25] IBG, Biometric market and industry overview., from http//www.gao.gov/new.items/d031137t.pdf, 2003.
http//www.biometricgroup.com/reports/public/CBT8_Overview.pdf, [51] A. Ross, A., & Jain, Information fusion in biometrics., Pattern
2005. Recognit. Lett., pp. , 24(13), 21152125., 2003.
[26] S. Jain, A., Hong, L., & Pankanti, Biometric identification, . [52] T. N. Science and T. Matsumoto, Biometrics Biometrics, pp. 35,
Commun. ACM, 43(2), 90-98., 2000. 2012.
[27] S. Jain, A.K.; Dept. of Comput. Sci. & Eng., Michigan State Univ., [53] X. Sha, L., Zhao, F., & Tang, Improved fingercode for
USA; Ross, A.; Prabhakar, An introduction to biometric filterbank-based fingerprint matching., Pap. Present. Image
recognition, Circuits Syst. Video Technol. IEEE Trans. (Volume14 , Process. 2003. ICIP 2003. Proceedings. 2003 Int. Conf. china.,
Issue 1 ), pp. 4 20, 2004. 2003.
[28] Y. H. Jang, S. H., Kim, Y. H., Cho, S. H., Lee, J. H., Park, J. W., & [54] I. Sommerville, Software Engineering., . Eighth Addison-Wesley.
Kwon, Cortical reorganization induced by task-oriented training in ISBN 0-321-31379-8., 2007.
chronic hemiplegic stroke patients, . Neuroreport, 14(1), 137., [55] J. Stavins, ATM fees: does bank size matter?, New Engl. Econ.
2003. Rev. 13-24., 2000.
[29] M. K. A. Ghani, M. M. Jaber, and N. Suryana, Telemedicine [56] A. C. Study, S. Singh, M. Komal, and D. Ph, Impact Of Atm On
supported by data warehouse architecture, ARPN J. Eng. Appl. Sci., Customer Satisfaction, vol. 2, no. 2, pp. 276287, 2009.
vol. 10, no. 2, pp. 415417, 2015. [57] Y. Sugiura, A., & Koseki, A user interface using fingerprint
[30] B. Santhi, & K. Ramkumar, (2012). Novel hybrid Technology in recognition: holding commands and data objects on fingers., . Pap.
ATM security using Biometrics. Journal of Theoretical and Applied Present. Proc. 28th Int. Conf. Hum. factors Comput. Syst. NY, USA.
Information Technology, 37(2), 217-223. pp. 581-590., 1998.
[31] A. Kosse, DNB W o r k i n g P a p e r, no. 245, 2010. [58] R. J. Sullivan, Can smart cards reduce payments fraud and identity
[32] S. Lamon, P., Nourbakhsh, I., Jensen, B., Deriving and matching theft?, Fed. Reserv. Bank Kansas City, Econ. Rev. 93(3), 35-62.,
image fingerprint sequences for mobile robot localization. Paper 2008.
presented at the Robotics and Automation, 2001, Proc. 2001 ICRA. [59] C. B. S. Traw and J. M. Smith, Hardware/software organization of a
IEEE Int. Conf. Lausanne, Switzerland. pp. 1609-1614., 2005. high-performance ATM host interface, IEEE J. Sel. Areas Commun., vol.
[33] M. Lee, Global ATM Security Alliance focuses on insider fraud. 11, no. 2, pp. 240253, 1993.
ATMMarketplace, , http//www. atmmarketplace. com/article. php?
id, 7154., 2006.
[34] M. K. A. Ghani, M. M. Jaber, and N. Suryana, Barriers Faces
Telemedicine Implementation in the Developing Countries: Toward
Building Iraqi Telemedicine Framework, ARPN J. Eng. Appl. Sci.,
vol. 10, no. 4, pp. 15621567, 2015.
[35] D. E. Levine, Voice security: Biometrics keeps information secure.,
Audio Technol. 6(8), 60-63., 2000.
[36] H. Li, X., Liu, Z., & Jifeng, A formal semantics of UML sequence
diagram. Paper presented at the Software Engineering Conference.
Australia. pp168., 2004.
[37] A. Matutes, C., & Padilla, Shared ATM networks and banking
competition, Eur. Econ. Rev. 38(5), 1113-1138., 1994.
[38] J. McAndrews, Automated teller machine network pricing-a review
of the literature., Rev. Netw. Econ. 2(2), Nielsen, J. (2002, pp.
146158., 2003.
[39] M. Metropolis, Journal of Internet Banking and Commerce, vol.
15, no. 2, 2010.
[40] A. T. Mode, Overview ATM defined ATM is a cell-switching
technology based on a fixed-length cell . It combines the high
throughput , low delay and transparency of circuit- switching and the
bandwidth efficiency of packet-switching ., no. 1, pp. 166, 1996.
498 www.erpublication.org