CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Multi-Factor Authentication Model for Integrating Iris Recognition into an Automated Teller Machine

by Akinola Kayode E., Adekunle Y. A., Adebayo A. O., Okolie S. O.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 45
Year of Publication: 2019
Authors: Akinola Kayode E., Adekunle Y. A., Adebayo A. O., Okolie S. O.
10.5120/ijca2019918530

Akinola Kayode E., Adekunle Y. A., Adebayo A. O., Okolie S. O. . Multi-Factor Authentication Model for Integrating Iris Recognition into an Automated Teller Machine. International Journal of Computer Applications. 181, 45 ( Mar 2019), 1-8. DOI=10.5120/ijca2019918530

@article{ 10.5120/ijca2019918530,
author = { Akinola Kayode E., Adekunle Y. A., Adebayo A. O., Okolie S. O. },
title = { Multi-Factor Authentication Model for Integrating Iris Recognition into an Automated Teller Machine },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2019 },
volume = { 181 },
number = { 45 },
month = { Mar },
year = { 2019 },
issn = { 0975-8887 },
pages = { 1-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number45/30418-2019918530/ },
doi = { 10.5120/ijca2019918530 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:08.407860+05:30
%A Akinola Kayode E.
%A Adekunle Y. A.
%A Adebayo A. O.
%A Okolie S. O.
%T Multi-Factor Authentication Model for Integrating Iris Recognition into an Automated Teller Machine
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 45
%P 1-8
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The emergence of computer has greatly fuelled the advancement of Science and Technology and drastically changed the way human live. Beside these advancements is increasing sense of insecurity and apprehension. Security issues, particularly those relating to users, which include identification, authentication, authorization and accountability, have always been a challenge to banking transactions. As the number of customers in banking system increases, the banking channel becomes a target for criminals to carry out their activities. Series of security challenges in automatic teller machine (ATM) transactions are: Identity Theft, Impersonation, Skimming, Entrapping of smartcard, personal identification number (PIN) theft, Phishing, Insider attacks and physical attack. The existing ATM authentication method involves PIN and smartcard usage for customer privacy protection and fraud prevention. Hence, this research is focused on developing a model that allows Iris recognition into an automated teller machine authentication processes. Iris authentication combine with PIN were adopted for authentication in ATM transaction in this study due to its accuracy, relatively low cost, small size, and ease of integration into different programming language. Window based application (IriSoft) was developed using NetBeans 8.0 IDE and Wamp Server 2.4 x86 to build database application package. In the iris recognition approach, to implement iris localization, segmentation and normalization VeriEye Software Development Kit (SDK) version 10.0 extended SDK which contain iris extractor and iris comparism component were utilized. The process involves a pre-enrolment of users with PIN and irises in the database. While during verification, user will stand in front of camera attached to the computer for scanning of the iris, after which the comparism of the sample iris image would be matched with the sample feature which had been stored up in database. The model developed was tested and verification exercise was successfully carried out. The new system was found out to be more efficient when compared with the existing PIN authentication method. The verification time was very small and measured in seconds. Furthermore, the program (IriSoft) was subjected to standard indicator for checking the effectiveness, accuracy and performance of iris pattern matching. The Fake Acceptance Rate (FAR) was 0% while Fake Rejection Rate (FRR) was found to be 99.94% implying that it was not possible for any fraudster, to match the identity of another individual in the database; whereas there was a chance of 1.6% of an authentic user to be denied access which is very minimal.ATM users should be security conscious while withdrawing money to prevent forced withdrawal. Banks should also ensure end-to-end encryption is in place to protect data as it travels from users through internet to bank servers. Government should be involved in awareness campaign. Having realized the importance of iris recognition authentication in ATM, a holistic approach is recommended that individual users, bank and government play their role; bearing in mind that no security systems can be wholly full proof.

References
  1. Ankit, S. and Neelu, J. (2017). Fraud Reduction in ATM Machines using Voice Recognition- A Review. International Journal of Innovative Research in Science, Engineering and Technology(ijirset), 6( 5), 7525-7530.
  2. Awodele, O. and Akanni, A. (2012). Combatingautomated teller machine frauds through biometrics. International Journal of Emerging Technology and Advanced Engineering, 2(11), 441 -444.
  3. Frimpong, T., Kofi, N., and Michael, A. (2016).Improving Security Levels In Automatic Teller Machines(ATM) Using Multifactor Authentication. International Journal of Science and Engineering Applications. 5(3), 126-134.
  4. Jayakumar, S., Alamelu, Radhika , Ramya , Dharani and Senthil J., (2017). Enhanced way of Securing Automated Teller Machine to track the mis-users using secure monitor tracking analysis. IOP Conf. Ser.: Mater. Sci. Eng. 263 042032. doi:10.1088/1757-899X/263/4/042032
  5. Jegede,C.A.(2014).Effects of Automated TellerMachineon the Performance of Nigerian Banks. American Journal of Applied Mathematics and Statistics, 2(1), 40–46. https://doi.org/10.12691/ajams-2-1-7
  6. Jimoh, R.G. and Babatunde, A. N. (2014). Enhanced Automated Teller Machine using Short Message Service authentication verification. World Academy of Science, Engineering and Technology. International Journal of Computer, Information Science and Engineering. 8(1). 14-17.
  7. Michael, L.(2016). ATM Benchmarking StudyandIndustryReport.http://www.accenture.com/_acnmedia/pdf_10/accenture-banking-ATM-benchmarking, Retrieved April 16, 2018.
  8. Muhammad,B.L.,Alhassan M.E. and Ganiyu, S.O. \(2015).An Enhanced ATM Security System using Second-Level Authentication. International Journal of Computer Applications. 111(5). 8-15.
  9. Oko,S.and Oruh, J.(2012): Enhanced ATM securitysystem using biometrics. IJCSI. International Journal of Computer Science Issues. 9(5). 352-357.
  10. Supakit,M.and Sirapat, B.(2015). Improving Securitywith Two-factor Authentication Using Image. KMUTNB Int J Appl Sci Technol. 8(1), 33-43
Index Terms

Computer Science
Information Sciences

Keywords

Automatic Teller Machine (ATM) Fake Acceptance Rate (FAR) Fake Rejection Rate (FRR) Iris Recognition Multi-Factor Authentication (MFA).