The Role of Biometric in Banking: A Review
DOI:
https://doi.org/10.4108/airo.3676Keywords:
Fingerprint Sensor, Microcontroller, Identification Methods, HardwareAbstract
Biometrics plays a pivotal role in enhancing security, ensuring accurate identification, and offering convenient solutions across diverse industries. Its uniqueness, reliability, and potential for future advancements establish it as a crucial and valuable field in today's digital landscape. Fingerprint authentication in ATMs presents primary advantages such as heightened security through distinctive identification and user convenience by eliminating the reliance on PINs or passwords. This research paper focuses on conducting a comprehensive review and comparative analysis of various approaches for fingerprint identification, aiming to contribute to the understanding of effective and efficient methods in the context of ATM authentication.
Downloads
References
T. Sabhanayagam, V. P. Venkatesan, and K. Senthamaraikannan, "A comprehensive survey on various biometric systems," International Journal of Applied Engineering Research, vol. 13, no. 5, pp. 2276-2297, 2018.
S. Khan, S. Parkinson, L. Grant, N. Liu, and S. Mcguire, "Biometric systems utilizing health data from wearable devices: applications and future challenges in computer security," ACMComputing Surveys (CSUR), vol. 53, no. 4, pp. 1-29, 2020.
M. Gayathri, C. Malathy, and M. Prabhakaran, "A review on various biometric techniques, its features, methods, security issues and application areas," Computational Vision and Bio-Inspired Computing: ICCVBIC 2019, pp. 931-941, 2020.
I. M. Alsaadi, "Study on most popular behavioral biometrics, advantages, disadvantages and recent applications: A review," Int. J. Sci. Technol. Res, vol. 10, pp. 15-21, 2021.
W. Yang, S. Wang, N. M. Sahri, N. M. Karie, M. Ahmed, and C. Valli, "Biometrics for internet-of-things security: A review," Sensors, vol. 21, no. 18, p. 6163, 2021.
A. F. Y. Althabhawee and B. K. O. C. Alwawi, "Fingerprint recognition based on collected images using deep learning technology," IAES International Journal of Artificial Intelligence, vol. 11, no. 1, p. 81, 2022.
Ansaripour N, Heidari A, Eftekhari SA. Multi-objective optimization of residual stresses and distortion in submerged arc welding process using Genetic Algorithm and Harmony Search. Proceedings of the Institution of Mechanical Engineers, Part C: Journal of Mechanical Engineering Science. 2020 Feb;234(4):862-71.
Daniali OA, Toghraie D, Eftekhari SA. Thermo-hydraulic and economic optimization of Iranol refinery oil heat exchanger with Copper oxide nanoparticles using MOMBO. Physica A: Statistical Mechanics and its Applications. 2020 Feb 15;540:123010.
Babajamali Z, Aghadavoudi F, Farhatnia F, Eftekhari SA, Toghraie D. Pareto multi-objective optimization of tandem cold rolling settings for reductions and inter stand tensions using NSGA-II. ISA transactions. 2022 Nov 1;130:399-408.
Barnoon P, Toghraie D, Mehmandoust B, Fazilati MA, Eftekhari SA. Natural-forced cooling and Monte-Carlo multi-objective optimization of mechanical and thermal characteristics of a bipolar plate for use in a proton exchange membrane fuel cell. Energy Reports. 2022 Nov 1;8:2747-61.
Khan MA, Arshad H, Khan WZ, Alhaisoni M, Tariq U, Hussein HS, Alshazly H, Osman L, Elashry A. HGRBOL2: human gait recognition for biometric application using Bayesian optimization and extreme learning machine. Future Generation Computer Systems. 2023 Jun 1;143:337-48.
Soltani M. Joint optimization of opportunistic predictive maintenance and multi-location spare part inventories for a deteriorating system considering imperfect actions. arXiv preprint arXiv:1810.06315. 2018 Oct 15.
Soleimani M, Forouzanfar Z, Soltani M, Harandi MJ. Imbalanced Multiclass Medical Data Classification based on Learning Automata and Neural Network. EAI Endorsed Transactions on AI and Robotics. 2023 Jul 24;2.
Sun H, Zhang Y, Chen P, Wang H, Liu YP, Liang R. A New Approach in Automated Fingerprint Presentation Attack Detection using Optical Coherence Tomography. IEEE Transactions on Information Forensics and Security. 2023 Jul 7.
M. N. Kumar, S. Raghul, K. N. Prasad, and P. N. Kumar, "Biometrically Secured ATM Vigilance System," in 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021, vol. 1: IEEE, pp. 919-922.
K. M. Htwe, Z. M. M. Htun, and H. M. Tun, "Design and implementation of bank locker security system based on fingerprint sensing circuit and RFID reader," International Journal of Scientific and Technology Research, vol. 4, no. 7, pp. 6-10, 2015.
K. R. Gill and J. Sachin, "Vehicle ignition using fingerprint sensor," Int. J. Innov. Res. Sci. Technol, vol. 2, no. 12, pp. 357-363, 2016.
R. Madhu and U. Mahadevaswamy, "GSM/GPS based Device Switching with Fingerprint Module Integration using Arduino," International Journal of Computer Applications, vol. 149, no. 2, 2016.
A. J. Moshayedi, M. Hosseinzadeh, B. P. Joshi, M. Emadi Andani,(2023). Recognition System for Ergonomic Mattress and Pillow: Design and Fabrication. IETE Journal of Research, 1-19.
S. Singh, A. Singh, and R. Kumar, "A constraint-based biometric scheme on ATM and swiping machine," in 2016 international conference on computational techniques in information and communication technologies (icctict), 2016: IEEE, pp. 74-79.
S. I. Manzoor and A. Selwal, "An analysis of biometric based security systems," in 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC), 2018: IEEE, pp. 306-311.
K. M. Sagayam, D. N. Ponraj, J. Winston, J. Yaspy, D. E. Jeba, and A. Clara, "Authentication of biometric system using fingerprint recognition with euclidean distance and neural network classifier," Int. J. Innov. Technol. Explor. Eng, vol. 8, no. 4, pp. 766-771, 2019.
Z. Ishak, N. Rajendran, O. I. Al-Sanjary, and N. A. M. Razali, "Secure biometric lock system for files and applications: a review," in 2020 16th IEEE International Colloquium on Signal Processing, Its Applications (CSPA), 2020: IEEE, pp. 23-28.
H. Hoorfar, A. Bagheri, Minimum hidden guarding of histogram polygons. arXiv preprint arXiv:1708.05815. 2017 Aug 19.
H. Hoorfar, Bagheri A. A New Optimal Algorithm for Computing the Visibility Area of a simple Polygon from a Viewpoint. arXiv preprint arXiv:1803.10184. 2018 Mar 27.
M. Ferretti, S. Nicolazzo, and A. Nocera, "H2O: secure interactions in IoT via behavioral fingerprinting," Future Internet, vol. 13, no. 5, p. 117, 2021.
X. Yin, S.Wang, M. Shahzad, and J. Hu, "An IoT-oriented privacy-preserving fingerprint authentication system," IEEE Internet of Things Journal, vol. 9, no. 14, pp. 11760- 11771, 2021.
T. Nonthaputha, M. Kumngern, S. Kaewwang, J. Phookwantong, N. Thepnarin, and K. Anontree, "A Design of Smart Biometric Fingerprint Key Storage Cabinet Based on IoT," in 2022 20th International Conference on ICT and Knowledge Engineering, 2022: IEEE, pp. 1-5.
V. M. M. Siregar and N. F. Siagian, "The Implementation of Fingerprint Sensors for Fingerprint Reader Prototypes Using a Microcontroller," Internet of Things and Artificial Intelligence Journal, vol. 2, no. 1, pp. 47-59, 2022.
M. Lastra, J. Carabaño, P. D. Gutiérrez, J. M. Benítez, and F. Herrera, "Fast fingerprint identification using GPUs," Information Sciences, vol. 301, pp. 195-214, 2015.
P. M. A. Hambalık, "Fingerprint recognition system using artificial neural network as feature extractor: design and performance evaluation," Tatra Mt. Math. Publ, vol. 67, pp. 117-134, 2016.
A. J. Moshayedi, A. J. Li, N. Sina, Chen, X., Liao, L., Gheisari, M., Xie, X. (2022). Simulation and validation of optimized pid controller in agv (automated guided vehicles) model using pso and bas algorithms. Computational Intelligence and Neuroscience, 2022.
R. Murugesh, "Advanced biometric ATM machine with AES 256 and steganography implementation," in 2012 Fourth International Conference on Advanced Computing (ICoAC), 2012: IEEE, pp. 1-4.
A. Taralekar, G. Chouhan, R. Tangade, and N. Shardoor, "One touch multi-banking transaction ATM system using biometric and GSM authentication," in 2017 International Conference on Big Data, IoT and Data Science (BID), 2017: IEEE, pp. 60-64.
B. Saranraj, N. S. P. Dharshini, R. Suvetha, and K. U. Bharathi, "ATM security system using Arduino," in 2020 6th International Conference on Advanced Computing and Communication Systems (ICACCS), 2020: IEEE, pp. 940-944.
H. A. Alzamel, M. Alshabanah, and M. Alsmadi, "Point of Sale (POS) Network with Embedded Fingerprint Biometric Authentication," Hussah Adnan Alzame, Muneerah Alshabanah, Mutasem K. Alsmadi," Point of Sale (POS) Network with Embedded Fingerprint Biometric Authentication", International Journal of Scientific Research in Science and Technology (IJSRST), Online ISSN, 2019.
A. V. Bataev, "The Model of Assessing Economic Efficiency of Biometric ATMs," in 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2019: IEEE, pp. 1365-1370.
T. Sangeetha, M. Kumaraguru, S. Akshay, and M. Kanishka, "Biometric based fingerprint verification system for atm machines," in Journal of Physics: Conference Series, 2021, vol. 1916, no. 1: IOP Publishing, p. 012033.
Moshayedi AJ, Roy AS, Liao L, Lan H, Gheisari M, Abbasi A, Bamakan SM. Automation Attendance Systems Approaches: A Practical Review. BOHR International Journal of Internet of things, Artificial Intelligence and Machine Learning. 2022 May 11;1(1):25-34.
M. N. Kumar, S. Raghul, K. N. Prasad, and P. N. Kumar, "Biometrically Secured ATM Vigilance System," in 2021 7th International Conference on Advanced Computing and Communication Systems (ICACCS), 2021, vol. 1: IEEE, pp. 919-922.
C. Hochwarter, D. Jahnel, and A. Uhl, "Public Perceptions, Preferences and Legal Aspects towards ATMs with Biometric Authentication in Austria," in 2019 International Conference of the Biometrics Special Interest Group (BIOSIG), 2019: IEEE, pp. 1-6.
A. J. Moshayedi, M. Soleimani, M. Marani, Sh.Yang, A.Razi, M. Emadi Andani, (2023) Fingerprint Identification Banking(FIB); Affordable and Secure Biometric IOT Design. Paper presented at the International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT 2023), China.
K. O. Okokpujie, F. Olajide, S. John, and C. G. Kennedy, "Implementation of the enhanced fingerprint authentication in the ATM system using ATmega128 with GSM feedback mechanism," 2016.
P. Subpratatsavee and N. Pubpruankun, "A Design and Implementation of Attendance System Using Smallest Wireless Fingerprint with Arduino Yún Embedded Board," in Applied Mechanics and Materials, 2015, vol. 752: Trans Tech Publ, pp. 1057-1061.
D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of fingerprint recognition. Springer, 2009.
Soleimani M, Naderi MH, Ashrafi AR. Tensor product of the power graph of some finite rings. Facta Universitatis, Series: Mathematics and Informatics. 2019 Mar 13:101- 22.
Mahmudi F, Soleimani M. Some results on Maximal Graph of a Commutative Ring, 2016.
J. Yang, S. Xie, S. Yoon, D. Park, Z. Fang, and S. Yang, "Fingerprint matching based on extreme learning machine," Neural Computing and Applications, vol. 22, pp. 435-445, 2013.
R. D. Labati, A. Genovese, E. Munoz, V. Piuri, and F. Scotti, "A novel pore extraction method for heterogeneous fingerprint images using convolutional neural networks," Pattern Recognition Letters, vol. 113, pp. 58-66, 2018.
J. Li, J. Feng, and C.-C. J. Kuo, "Deep convolutional neural network for latent fingerprint enhancement," Signal Processing: Image Communication, vol. 60, pp. 52- 63, 2018.
J. Khodadoust and A. M. Khodadoust, "Fingerprint indexing based on expanded Delaunay triangulation," Expert Systems with Applications, vol. 81, pp. 251-267, 2017.
C. Zhao, M. Huang, L. Huang, X. Du, and M. Guizani, "A robust authentication scheme based on physical-layer phase noise fingerprint for emerging wireless networks," Computer networks, vol. 128, pp. 164-171, 2017.
S. Wang, W. Yang, and J. Hu, "Design of alignmentfree cancelable fingerprint templates with zoned minutia pairs," Pattern Recognition, vol. 66, pp. 295-301, 2017.
A. J. .Moshayedi, D. C. Gharpure, (2017, May). Evaluation of bio inspired Mokhtar: Odor localization system. In 2017 18th international carpathian control conference (ICCC) (pp. 527-532). IEEE.
M. Soleimani, F. Mahmudi, M. H. Naderi, On the Maximal Graph of a Commutative Ring. Mathematics Interdisciplinary Research. 2021 Jul 2.
Soleimani M, Mahmudi F, Naderi MH. Some results on the maximal graph of commutative rings. Advanced Studies: Euro-Tbilisi Mathematical Journal. 2023 Mar;16(supp1):21-6.
Moshayedi AJ, Roy AS, Liao L, Lan H, Gheisari M, Abbasi A, Bamakan SM. Automation Attendance Systems Approaches: A Practical Review. BOHR International Journal of Internet of things, Artificial Intelligence and Machine Learning. 2022 May 11;1(1):25-34.
Boroujeni SP, Pashaei E. A Hybrid Chimp Optimization Algorithm and Generalized Normal Distribution Algorithm with Opposition-Based Learning Strategy for Solving Data Clustering Problems. arXiv preprint arXiv:2302.08623. 2023 Feb 16.
Mehrabi N, Boroujeni SP. Age estimation based on facial images using hybrid features and particle swarm optimization. In2021 11th International Conference on Computer Engineering and Knowledge (ICCKE) 2021 Oct 28 (pp. 412-418). IEEE.
Boroujeni SP, Pashaei E. Data clustering using chimp optimization algorithm. In2021 11th international conference on computer engineering and knowledge (ICCKE) 2021 Oct 28 (pp. 296-301). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Mehdi Marani, Morteza Soltani, Mina Bahadori, Masoumeh Soleimani, Atajahangir Moshayedi
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
This is an open access article distributed under the terms of the CC BY-NC-SA 4.0, which permits copying, redistributing, remixing, transformation, and building upon the material in any medium so long as the original work is properly cited.