• Indexed in

  • Latest News

    June 28, 2023
    Volume 12, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2022
    Volume 11, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 28, 2022
    Volume 11, Issue 1 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • A Fingerprint-Based Scheme for ATM User Authentication

    Author(s): IWASOKUN, Gabriel B.

    Quick view | Full article | Citations | Views: 1,229

    Author(s) keywords: , , , ,

    Reference keywords: ,


    Presently, ATM users rely on the card-based information for authorization. This approach is confronted with challenges of card swallowing, misplacement, damage and expiration as well as Personal Identification Number (PIN) forgetfulness and theft. With a view to addressing these challenges, a fingerprint-based scheme for ATM user authentication is proposed in this paper. The scheme comprises of different components for fingerprint enrollment, database and verification. The verification component handles fingerprint enhancement, feature extraction and matching (based on suitable mathematical models). Validation experiments based on False Rejection Rate (FRR), False Acceptance Rate (FAR), Average Matching Time (AMT), Receiver Operating Characteristic (ROC) curve and Equal Error Rate (ERR) were conducted using FVC2000, FVC2002 and FVC2004 standard fingerprint databases. Comparative analysis of the experimental results with those obtained from three other schemes shows the superiority, adequacy and practicality of the proposed scheme.


    [1]. O. S. Adeoye, Evaluating the Performance of Two-Factor Authentication Solution in the Banking Sector, International Journal of Computer Science Issues, Vol. 9 No. pp. 457-462, 2012

    [2]. S. D. Shimal and J. Debbarma, Designing a Biometric Strategy (Fingerprint) Measure for Enhancing ATM Security in Indian E-Banking System, International Journal of Information and Communication Technology Research, pp. 197-203, 2011

    [3]. O. A. Ibidapo, O. O. Zaccheous and M. O. Olufemi, Towards Designing a Biometric Measure for Enhancing ATM Security in Nigeria EBanking System, International Journal of Electrical & Computer Sciences IJECS-IJENS, Vol. 10, No. 6, pp. 68-73, 2010

    [4]. K. J. Anil, F. Jianjiang F and N. Karthik, Fingerprint Matching, IEEE Computer Society, Bellis Mary, The ATM of John Shepherd baron, pp. 36-44. Available: http:www.google.com/ the_atm_of_john_shepherd_baron.pdf/ [5 April 2014], 2010

    [5]. C. Roberts, Biometrics, Available: http://www.ccip.govt.nz/ newsroom/informoation-notes/2005/ biometrics.pdf [16 July 2013], 2009

    [6]. C. Michael C and E. Imwinkelried, A Cautionary Note about Fingerprint Analysis and Reliance on Digital Technology, Public Defence Backup Center Report, Vol. XXI, No. 3, pp. 7-9, 2006

    [7]. M. J. Palmiotto, Criminal Investigation. Chicago: Nelson Hall, Accessed 25/06/2014, https://www.ncjrs.gov/ App/publications/abstract.aspx?ID=166681, 1994

    [8]. D. Salter, Thumbprint – An Emerging Technology’, Engineering Technology, New Mexico State University, 2006

    [9]. G. B. Iwasokun, Development of a Hybrid Platform for the Pattern Recognition and Matching of Thumbprints, PhD Thesis , Department of Computer Science, Federal University of Technology, Akure, Nigeria, 2012

    [10]. Y. Yang and J. Mi J, ATM Terminal Design is based on Fingerprint Recognition, Proceedings of 2nd International Conference of Computer Engineering and Technology (ICCET-2010), Apri16-18, 2010, Chengdu, 2010

    [11]. V. K. Singh, S. P. Tripathi, R. P. Agarwal and J. B. Singh, Formal Verification of Finger Print ATM Transaction through Real Time Constraint Notation (RTCN), International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 1, pp. 395-400, 2011

    [12]. A. K. Jain, P. Salil and C. Shaoyun, Combining Multiple Matchers for a High Security Fingerprint Verification System, Pattern Recognition Letters, Vol. 20, pp. 1371-1379, 1999

    [13]. Y. Wang Y, J. Hu and D. Phillips, A Fingerprint Orientation Based 2D Fourier Expansion and its Application to Singular-Point Detection and Fingerprint Indexing, Available: ieeexplore.ieee.org/iel5/34/4107554/04107562.pdf [16 Feb 2014], 2007

    [14]. F. Han, J. Hu, X. Yu, Y. Feng and J. Zhou, A novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications, Lecture Notes in Computer Science, Vol. 3832, pp. 675-681, 2005

    [15]. K. Nandakumar , A Fingerprint Cryptosystem Based on Minutiae Phase Spectrum, 12-15 Dec. 2010, Seathle, WA, USA, pp 1 - 6, USA, 2010

    [16]. A. J. Perez-Diaz and I. C. Arronte-Lopez, Fingerprint Matching and Non-Matching Analysis for Different Tolerance Rotation Degrees in Commercial Matching Algorithms, Journal of Applied Research and Technology, Vol. 8, No. 2, pp. 186-199, 2010

    [17]. U. Klopcic and P. Peer, Fingerprint-Based Verification System A Research Prototype’, Proceedings of 17th International Conference on Systems, Signals and Image Processing, 2010, pp. 150-153, 2010

    [18]. B. Santhi and K. K. Ram, Novel Hybrid Technology in ATM Security Using Biometrics, Journal of Theoretical and Applied Information Technology, Vol. 37, No. 2, pp. 217-223, 2012

    [19]. S. T. Bhosale and B. S. Sawant, Security in e-Banking via Card-less Biometric ATMS, International Journal of Advanced Technology and Engineering Research, Vol. 2, No. 4, pp. 9-12, 2012

    [20]. T. S. Ibiyemi, S. E. Obaje and J. Badejo, Development of Iris and Fingerprint Biometric Authenticated Smart ATM Device & Card, Proceedings of the 24th National Conference of the Nigeria Computer Society (NCS) , 25-28 July, 2012. , 2012

    [21]. M. Subh and S. Vanithaasri, A Study on Authenticated Admittance of ATM Clients Using Biometrics Based Cryptosystem, International Journal of Advances in Engineering & Technology, Vol. 4, No. 2, pp. 456-463, 2012

    [22]. S. Oko and J. Oruh, Enhanced ATM Security System Using Biometrics, International Journal of Computer Science Issues, Vol. 9, Issue 5, No 3, pp. 352-357, 2012

    [23]. M. O. Onyesolu and I. M. Ezeani, ATM Security Using Fingerprint Biometric Identifer: An Investigative Study, International Journal of Advanced Computer science and Applications, Vol. 3, No.4, pp. 68-72, 2012

    [24]. M. Pooja, S. Shruti, M. Rajashri and K. Pooja, Multilevel ATM Security Based On Two Factor Biometrics, International Journal of Engineering Research and Technology, Vol. 1, No. 8, pp 1-6, 2012

    [25]. G. B. Iwasokun, O. C. Akinyokun, B. K. Alese, O. Olabode, Adaptive and Faster Approach to Fingerprint Minutiae Extraction and Validation, International Journal of Computer Science and Security, Vol. 5, No. 4, pp. 414-424, 2011

    [26]. G. B. Iwasokun, O. C. Akinyokun, B. K. Alese and O. Olabode, Fingerprint Image Enhancement: Segmentation to Thinning, International Journal of Advanced Computer Science and Applications, Vol. 3, No. 1, pp 15-24, 2012

    [27]. A. C. López, R. L. Ricardo, R. C. Queeman, Fingerprint Pattern Recognition, PhD Thesis, Electrical Engineering Department, Polytechnic University, Mexico, 2002

    [28]. J. Hoffman, Introduction to Structured Query Language, Available: magnum.anu.edu.au/sql-intro.pdf [22 Feb 2014], 2001

    [29]. MS Access Database and Structured Query language (MS ADSQL). Available: cs.njit-edu/MS-Access-Database-Topics.doc [19 Feb 2013]

    [30]. Structured Query Language (SQL), Available: www.automated.com/ ch8.pdf) [22 Feb 2014]

    [31]. G. Bierman and A.Wren, First-Class Relationships in an Object-Oriented Language, Proceedings of FOOL 2005, 15 January 2005, Long Beach, California, ACM, 2005

    [32]. O. Warth and I. Piumarta, OMeta: an Object-Oriented Language for Pattern Matching, Proceedings of DLS’07, Montr´eal, Qu´ebec, Canada, October 22, 2007, ACM 978-1-59593-868-8/07/0010 , 2007

    [33]. R Cappelli, D. Maio, D. Maltoni, J. L. Wayman and A. K. Jain, Performance Evaluation of Fingerprint Verification Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 28, No. 1, pp. 3 - 18., 2006

    [34]. C. Jiangang and T. Jie, Fingerprint Enhancement With Dyadic Scale-Space, Pattern Recognition Letters, Vol. 25, pp 1273-1284, 2004

    [35]. G. B. Iwasokun, O. C. Akinyokun and S. O. Ojo, An Investigation into the Impact of False Minutiae Points on Fingerprint Matching, International Journal of Database Theory and Application Vol.7, No.3, pp.159-178, 2014

    [36]. G. B. Iwasokun, O. C. Akinyokun and C. O. Angaye, Fingerprint Matching Using Neighborhood Distinctiveness, International Journal of Computer Applications, Vol. 66, No. 21, pp. 1-16, 2013.

    Additional Information

    Article Title: A Fingerprint-Based Scheme for ATM User Authentication
    Author(s): IWASOKUN, Gabriel B.
    Date of Publication: 2016-12-29
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2016.02.07
    Issue: Volume 5, Issue 2, Year 2016
    Section: Cyber-Attacks Evolution and Cybercrime Trends
    Page Range: 71-86 (16 pages)

    Copyright ©2012-2023
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.