5. Banks should always support to their service users [2] Biometric ATMs for rural India, Chirasrota Jena,Weekly
regarding any problems while using e-banking services. Insight for Technology Professionals, 12,
March 2007, www. Expresscomputeronline.com, Access
date 16-Dec-2011
XII. Problems with biometric [3] Handbook of Biometrics. Springer. pp. 122. ISBN 978-0-
1. Biometrics techniques are relatively new, and some 387-71040-2.
people find their use intrusive. Hand geometry, http://www.springer.com/computer/image+processing/book/97
fingerprint and face recognition (which can be done from 8-1-4419-4375-0, access on 10-Dec-2011, 5.00pm
a camera across the room) are not quite enveloping, but [4] International References:
people have real concerns about peering (hard to watch) http://www.rediff.com/money/2005/oct/11atm.htm, Access on
into a laser beam or strictly a finger into a slot. 16- Dec- 2011, 11.00 am
2. Biometrics recognition devices are costly, although as [5] Jain, A., Hong, L., & Pankanti, S. (2000). "Biometric
the devices become more popular, their cost goes down. Identification", Communications of the ACM, 43(2), p. 91-98.
3. All biometrics readers use sampling and establish a [6] Jain, Anil K.; Ross, Arun (2008). "Introduction to
threshold for when a match is close enough to accept. Biometrics", pp. 45-60
The device has to sample the biometric, measure often [7] Krause Micki, Tipton Harold F., Handbook of Information
hundreds of key point, and compare that set of Security Management (Imprint: Auerbach Publications)
measurements with a template. There is normal (Publisher: CRC Press LLC), ISBN: 0849399475,
variability. http://www.ccert.edu.cn/education/cissp/hism/ewtoc.html, data
4. Although equipments are improving, there are still false access on 13-Dec-2011, 3.50 pm
reading / recognition. [8] Laudon Kenneth, Traver Carol Guercio, E-Commerce
5. The speed at which recognition must be done limits (2005), Second Edition , pp. 237-239, Pearson Education
accuracy. (Singapore), Pvt. Ltd.
[9] ONeil Erin, Back to the future at your local ATM,
XIII. Future ATMs http://banking.about.com/od/securityandsafety/a/biometricatms
Todays ATMs operating on the basis of card system and PIN, .htm, access on 16-Dec-2011 at 11.45 am
where as for better security biometric authentication is [10] Pfleeger Charles P., Pfleeger Shari Lacorence, Shah
growing demand. According to security experts, fingerprints Deven N. (2009), Security in Computing, User
can easily be lifted and replicated. The most secure biometric Authentication, pp. 257-258, IVth Edition, Pearson
technology uses a device designed to perform an iris scan Publication.
based on more than 2,000 unique measurement points. [11] S.C. Bihari, e-Banking, When Convenience Banking can
According to developers, people and pets all over the world Become Inconvenience, pp. 52-55, First Edition, Skylark
will be connected to a system that uses iris scan identification Publication, New Delhi
within the next decades. In future solar power and biometric [12] S.C. Bihari, e-Banking, When Convenience Banking can
with PIN based ATMs will be launched by banks especially in Become Inconvenience, pp. 85-91, First Edition, Skylark
rural areas. [13] Publication, New Delhi
[13] http://www.indianexpress.com/news/district-gets-its-first-
solar-biometric-atm/767886/, access on date 15-Dec-2011,
XIV. Conclusion 1.00 pm
Proposed conceptual model is designed for ATM users for
various transactions like withdrawing cash, balance enquiry
etc. Point of Sales (POS) machines will also use biometric Biographies
authentication. This system requires biometric authentication
(finger print, iris recognition) which is always with user, PIN 1. SATISH BHOSALE. Assistant Professor, MCA
code and selection of bank branch, which then creates virtual Dept. VPIMSR, Sangli. Pursuing Ph.D. from Shivaji
account (V-ID) it helps for identification and authentication of University, Kolhapur. Specialization in E-commerce,
service user. This is card less e-banking technique for ATMs, ERP, Software Engineering. Published and presented
which reduces efforts of handling, operating and various risks research articles in more than 16 National and
associated with cards. The same and simplified procedure will International Journals and various conferences. Satish
be helpful for Internet, Mobile and POS transactions. Due to Bhosale may be reached at stbhosale@yahoo.co.in.
unique method of authentication it reduces cost, time, efforts 2. Dr. B.S. Sawant. Director, KBPIMSR Satara.
of both banks as well as service users. Research guide. He had guided and awarded more
than 4 Ph.D. and 2 M.Phil. Students. He is Editor-in-
XV. References: Chief of ETHOS research journal. Dr. B. S. Sawant
may be reached at drbssawant@rediffmail.com
[1] Kahate Atul (2004), Cryptography and Network Security,
User Authentication Mechanism, pp. 303-
304, III rd Edition, McGraw-Hill Publications.