Skip to main content Skip to main navigation menu Skip to site footer
Articles
Published: 2024-06-18

Atm Transaction Without a Card Via Biometric and Hand Recognitionmetric

Professor & Department of Computer Science Engineering1.2, Stanly College of Engineering &Technology For Women,India
Professor & Department of Computer Science Engineering1.2, Stanly College of Engineering &Technology For Women,India
OTP PIN two-phase security biometric ATMs

Abstract

Cloud computing has become a ubiquitous storage, processing, and data management tool. However, providing strong security measures inside cloud infrastructure remains a primary priority.The purpose of this study is to give an overview of the process of integrating cloud infrastructure with machine learning. The main objective of this work is to leverage machine learning approaches and models for threat identification, anomaly detection, and access control methods in order to protect sensitive data and reduce growing risks in the cloud infrastructure.  Ultimately, this research endeavours to enhance the overall security posture of cloud computing, enabling organisations to harness the full potential of the cloud while safeguarding their critical assets and sensitive information.

References

  1. C Kishor Kumar Reddy, Anisha P R, Samiya Khan, Marlia Mohd Hanafiah, Lavanya P, Madana Mohana R, “Sustainability in Industry 5.0: Theory and Applications”, CRC Press, Taylor & Francis, 2024
  2. C Kishor Kumar Reddy, Anisha P R, Marlia Mohd Hanafiah, Srinath Doss, kari J Lipert, “Intelligent Systems and Industrial Internet of Things for Sustainable Development”, Sustainability in Industry 5.0: Theory and Applications, CRC Press, Taylor & Francis, 2024.
  3. C Kishor Kumar Reddy, Pullisani Satvika, Marlia Mohd Hanafiah, Srinath Doss, “An Efficient early Diagnosis and Healthcare Monitoring System for Mental Disorder using Machine Learning”, Intelligent Engineering Applications and Applied Sciences for Sustainability IGI Global, 2023
  4. Nuzhat Yasmeen, Kishor Kumar Reddy C, Srinath Doss, “Intelligent Systems Powered Hourly Attendance Capturing System”, 7th IEEE International Conference on Trends in Electronics and Informatics, Tirunelveli, India, 11-13 April 2023 DOI: 10.1109/ICOEI56765.2023.10125964.
  5. Ramana Kadiyala, Madana Mohana, Kishor Kumar Reddy, Tippa Reddy G, “Block Chain Based Data Sharing System for Cloud Based Internet of Things Systems with Efficient Smart Contracts”, IEEE ICC 2023, Rome, Italy. DOI: 10.1109/ICCWorkshops57953.2023.10283747.
  6. Leow, H.B. (1999). New Distribution Channels in banking Services. Banker's Journal Malaysia, No.l 10, 48-56.
  7. Liu, N. Y. (2013). Bio Privacy: Privacy Regulations and the Challenge of Biometrics.
  8. Oko, S. and Orah, J. (2012): Enhanced ATM security system using biometrics. UCSI International Journal of Computer Science Issues, 9(5), 352-357.
  9. Ravikumar, S., Vaidyanathan, S., Thamotharan, S. &Ramakrishan, S. (2013), A new business model for ATM.
  10. Rosenblatt, S. (2013). Two-factor authentication: What you need to know. Retrieved from: http://www.cnet.com/news/two-factorauthentication-what-you- need-to-know-faq/ last updated on April 14, 2014. Accessed on November 23, 2014.
  11. Shoewu, O. and Edeko, F.O. (2011). Outgoing call quality evaluation of GSM network services in Epe, Lagos State. American journal of scientific and industrial research, 2(3), 409-417.
  12. Siddique, M.I and Rehman, S. (2011). Impact of Electronic crime in Indian banking sector - An Overview Int. International Journal of Business & Information Technology, 1(2), 159-164.
  13. Okokpujie K., Olajide F., John S. and Kennedy C.G., (2016). Implementation of the enhanced fingerprint authentication in the ATM system ssing ATmega128 with GSM feedback mechanism. Conference paper on  banking in Nigeria.

How to Cite

Bandari, M., & Dr GVS RAJU. (2024). Atm Transaction Without a Card Via Biometric and Hand Recognitionmetric. International Journal of Interpreting Enigma Engineers (IJIEE), 1(2). Retrieved from https://ejournal.svgacademy.org/index.php/ijiee/article/view/51

Article Contents

Indexed In

Indexed In



Tools