A virtual keyboard security system for automated teller machine

  • Authors

    • V Brindha Devi
    • S Sindhuja
    • S Shanthini
    • M Hemalatha
    2018-06-08
    https://doi.org/10.14419/ijet.v7i2.33.13855
  • Arduino, DC Motor, GSM, GPS, Image Processing, Shuffling Algorithm.
  • The Automated Teller Machines (ATM) are used for cash withdrawals. Meanwhile as ATM lacks security, thefts occurring in the ATMs are also high. Our proposed system minimizes those break-ins occurring in the ATM’s by instigating a low cost standalone embedded sys-tem using Arduino Microcontroller. This system is proposed for ATM security, comprising of the components namely RGB tag, Global System for Mobile communication (GSM), Global Positioning System (GPS), Virtual Keyboard and camera. Authentication by virtual keyboard thus helps the public to protect their credentials from being captured by malicious bots, key loggers and spyware. Whenever theft occurs, Buzzer makes an alarm, DC Motor turns ON and the door of ATM is closed. The nearby police station and corresponding bank authorities is alerted by the GSM Modem that sends messages along with the location. This will prevent the robberies and the person in-volving in the robbery can be easily caught. In short, it discusses the methods that are used to detect the venture, initiate preemptive measures and forewarn the officials through GSM network. This system thus heightens the safety of ATM users as well as the ATM’s against forthcoming attacks effectively.

     

     

  • References

    1. [1] M. Ajaykumar, N. Bharath Kumar, "Anti-Theft ATM Machine Using Vibration Detection Sensor", B.Tech-CSE Department & JNTU Hyderabad India. International Journal of Advanced Research in Computer science and software, vol. 3, no. 12, December 2013.

      [2] Bharati M Nelligani, N V Uma Reddy, Nithin Awasti,â€Smart ATM security system using FPR, GSM, GPSâ€, Invenive Computation Technologies (ICICT) , International Conference , January 2016.

      [3] Ulrich Burgbacher , Klaus Hinrichs “Synthetic Word Gesture Generation for Stroke-Based Virtual Keyboards†Department of Computer Science, University of Münster, Münster, Germany IEEE Transactions on Human-Machine Systems ( Volume: 47,issue: 2, April 2017).

      [4] Mrs.S.P.Balwir,Ms.K.R.Katole,Mr.R.D.Thakare,Mr.N.S.Panchbudhe,Mr.P.K.Balwir. “Secured ATM Transaction System Using Micro-Controller†International Journal of Scientific Engineering Research Volume 4, Issue 4, April 2014.

      [5] Dhiraj Sunehra, "Fingerprint based biometric ATM authentication system", Department of Electronics & Communication Engineering Jawaharlal Nehru Technological University Hyderabad India. International Journal of Engineering Inventions, vol. 3, no. 11, June 2014.

      [6] Jignesh J. Patoliya ,â€Face Detection based ATM Security System using Embedded Linux Platformâ€2017 second International Conference for Convergence in Technology (I2CT).

      [7] C. Wang, X. Guo, Y. Chen, Y. Wang and B. Liu, "Personal PIN Leakage from Wearable Devices," in IEEE Transactions on Mobile Computing, vol. 17, no. 3, pp. 646-660, March 1 2018.

      [8] K. Kadir, M. Kamaruddin, H. Nasir & S. Safie, “4th InternationalConference on Engineering Technology and Technopreneuship (ICE2T)â€, 2014, p. 335.

      [9] S. Monk, first Ed., Raspberry Pi Cookbook, O’REILLY, 2013.

      [10] Open CV Website. [Online]. Available: http://www.opencv.org.

      [11] Homepage on Open CV: Face Detection using Haar Cascades.[Online].Available.http://docs.opencv.org/master/d7/d8b/tutorial_py_face_detection.html#gsc.tab=0.

      [12] L. Zhuang, F. Zhou, and J.D. Tygar, “Keyboard Acoustic Emanations Revisited,†ACM Trans. Information and System Security, vol. 13, article 3, 2009.

      [13] F. Maggi, A. Volpatto, S. Gasparini, G. Boracchi, and S. Zanero, “AFast Eavesdropping Attack against Touchscreens,†Proc. Seventh Int’l Conf. Information Assurance and Security (IAS), 2011.

      [14] P. Marquardt, A. Verma, H. Carter, and P. Traynor, “(sp)iPhone:Decoding Vibrations from Nearby Keyboards Using Mobile Phone Accelerometers,†Proc. ACM Conf. Computer and Comm.Security, 2011.

      [15] D. Balzarotti, M. Cova, and G. Vigna, “ClearShot: Eavesdropping on Keyboard Input from Video,†Proc. IEEE Symp. Security and Privacy, 2008.

      [16] All about skimmers. http://krebsonsecurity.com/all-about-skimmers/.

      [17] P.A. Viola and M.J. Jones, “Rapid Object Detection Using a Boosted Cascade of Simple Features,†Proc. IEEE CS Conf. Computer Vision and Pattern Recognition, 2001.

      [18] K. Jung, K.I. Kim, and A.K. Jain, “Text Information Extraction in Images and Video: A Survey,†Pattern Recognition, vol. 37, no. 5, pp. 977-997, 2004.

      [19] H. Grabner, M. Grabner, and H. Bischof, “Real-Time Tracking via On-Line Boosting,†Proc. British Machine Vision Conf., vol. 1, pp. 47-56, 2006.

      [20] P.A. Viola and M.J. Jones, “Robust Real-Time Face Detection,†Int’l J. Computer Vision, vol. 57, no. 2, pp. 137-154, 2004.

      [21] How strong is your password? https://www.msecure.com/blog/howstrong-is-your-password/.

      [22] S. Stalder, H. Grabner, and L.V. Gool, “Beyond Semi-Supervised Tracking: Tracking Should Be as Simple as Detection, but Not Simpler Than Recognition,†Proc. Workshop On-Line Learning for Computer Vision, pp. 1409-1416, Sept. 2009.

      [23] Android sensor event. http://developer.android.com/reference/androidHardware/SensorEvent.html.

  • Downloads

  • How to Cite

    Brindha Devi, V., Sindhuja, S., Shanthini, S., & Hemalatha, M. (2018). A virtual keyboard security system for automated teller machine. International Journal of Engineering & Technology, 7(2.33), 59-63. https://doi.org/10.14419/ijet.v7i2.33.13855