Abstract
Automatic Teller Machine (ATM) offers rapid and user-friendly avenues to reach their bank accounts and engage in financial operations. A crucial component of ATM security is the “Personal Identification Number (PIN) or password”. This PIN or password serves as a fundamental element in safeguarding and preserving customers’ financial data from unauthorized entry. Within the financial realm, an ongoing necessity exists to enhance security measures. In the realm of identity verification, modern ATM systems traditionally require the combination of an access card and the input of a PIN. However, the landscape has evolved with the emergence of cutting-edge biometric authentication methods like fingerprint scanning, retina recognition, and facial identification. These innovations have significantly mitigated the security vulnerabilities previously associated with ATMs. To surmount such challenging factors, a novel multimodal biometric-based authentication is introduced for ATM transactions. Traditionally, the MultiBank Provider (Pvt Company) provides an ATM card with all bank access for an individual. With the help of ATM machines, multimodal authentication is accomplished by using the Multichannel EfficientNet B7 with Attention Mechanism (MEB7-AM), in which each channel carries information about each image from the Face, Retina, Fingerprint, and spectrogram. Once it is done, a single pin is required to select the bank. Further, from the selected bank with proper credentials, the money is withdrawn from the ATM machine. Lastly, the efficacy of the model is analyzed using various measures and compared among existing methodologies. Therefore, the proposed system provides the precise results of better authentication for ATM machines.
Keywords
Introduction
In the past, authentication methods primarily relied on two-factor authentication, employing either passwords or PIN codes alongside smart cards [1]. This approach, combining knowledge and ownership factors, is deemed more secure than single-factor authentication [2]. The knowledge factor pertains to user-specific information like passwords and Personal Identification Number (PIN) codes, while the ownership factor involves possession of items such as smart or Automatic Teller Machine (ATM) cards [3]. An example of two-factor authentication is ATM transactions, which necessitate both knowledge of a PIN code or password and possession of a specific ATM card [4]. Despite the convenience of online banking, security and privacy concerns have deterred some customers from adopting these services. The surge in technology-enabled banking operations has captured the interest of criminal elements [5]. Two-Factor Authentication (2FA) commonly entails a dual-layer verification process: the user acquires a code via email, SMS, or a token and subsequently inputs this code alongside their username, and occasionally a PIN or password, to gain access to the service [6]. Consequently, when choosing an authentication mechanism for an online banking system, it’s essential to account for elements like security, cost-efficiency, compatibility, and user-friendliness [7]. However, the vulnerability of information stored within smart cards became evident, leading to the reconsideration of authentication schemes using smart cards due to password guessing, impersonation, and related attacks [8]. Conversely, asymmetric strategies encompass tasks such as exponentiation, point multiplication, and pairing, which become unfeasible in situations with limited resources. In contrast, authentication systems based on symmetric keys, leveraging shared keys [9], offer a more fitting approach for resource-constrained environments, owing to their streamlined nature and reliance on less computation-intensive operations like symmetric encryption, hash functions, and XOR. Nonetheless, such schemes often lack defense against certain attacks or encounter correctness-related issues [10]. Passwords or PINs enable access to private information in ATMs, but remain susceptible to various attacks [11]. As an alternative, biometrics have gained traction. Biometrics rely on human physiological or behavioral features for authentication, offering heightened information security. This makes biometrics a popular alternative to traditional password or PIN-based authentication systems [12].
Recognizing the limitations of password-centric authentication methods involving smart cards, a range of three-factor biometrics-driven authentication strategies have been adopted [13]. These three-factor authentication approaches hinge on the principles of knowledge, ownership, and inherence factors [14]. Inherence factors utilize biometric features such as fingerprints or iris offering greater security than passwords due to their difficulty to forge, share, or break [15]. Individuals are identified through what they possess (ID cards, smart cards), what they know (PINs, passwords), and unique biometric traits. While security systems based on possession can be lost, stolen, forged, or duplicated [16], systems based on what individuals know are vulnerable to being forgotten, shared, stolen, guessed, or hacked. On the other hand, systems based on unique traits are less easily compromised. Multimodal biometrics enhance spoof attacks, security against vulnerabilities, inter-class, and intra-class variations, and non-universality [17].
The key contributions of the proposed ATM transaction security framework, which relies on the utilization of Multichannel EfficientNet B7 in conjunction with Attention Mechanism via deep networks, are outlined as follows.
To develop an ATM transactions security framework using Multi-modal biometric authentication for enhancing the security of ATM transactions. This approach combines multiple biometric factors (face, retina, fingerprint, and spectrogram) to ensure a higher level of security and accuracy, reducing the risks associated with traditional card and PIN methods.
To propose MEB7-AM is designed to efficiently process and analyze the biometric information from various sources. This mechanism ensures that each channel’s data contributes to the authentication process, thereby increasing accuracy and reducing false positives.
To done the successful multimodal authentication, the system streamlines the transaction process. Users only need to enter a single PIN to select the desired bank. Once the bank is selected and proper credentials are provided, the ATM machine facilitates the withdrawal of money seamlessly.
To assess the system’s efficacy using a comprehensive set of performance measures. By comparing the results with existing authentication methodologies, the system’s accuracy, speed, and reliability can be quantified, demonstrating its superiority and effectiveness. To assess the system’s efficacy using a comprehensive set of performance measures. The system’s accuracy, speed, and reliability can be quantified by comparing the results with existing authentication methodologies to demonstrate its superiority and effectiveness.
The subsequent sections expound upon the security framework for ATM transactions, employing Multi-modal biometric authentication through deep networks. The overview of conventional research findings is encapsulated in Section 2, along with a concise discussion of its merits and limitations. Section 3 delves into security concerns related to banking transactions, particularly the use of a single ATM card for multiple banks. Moving to Section 4, the model’s design is outlined, encompassing the collection of biometric-based data for authentication in ATM transactions. The utilization of multichannel EfficientNet B7 with an attention mechanism for ATM transaction authentication is detailed in Section 5. The outcomes of experiments, including comparisons with various established systems and performance metrics, are presented in Section 6. The final segment, Section 7, concludes by highlighting that the proposed framework yields precise user recognition performance.
Literature review
In 2018, Ogbanufe and Kim [18] proposed a research model, incorporating hypotheses that were subsequently evaluated to compare how individuals perceive different payment authentication methods, their level of trust in online stores, and their willingness to continue using website accounts linked to these methods. An experimental approach was adopted to empirically test these hypotheses. The findings indicated that biometric authentication significantly impacted individuals’ perceived utility, trust in online stores, and sense of security. The study’s context, which compared biometrics with credit card authentication, offered theoretical evidence highlighting the significance of individuals’ perceptions, apprehensions, and beliefs regarding the adoption of biometrics in electronic payments. This study also had managerial implications, illuminating the importance of understanding individuals’ perceptions and concerns regarding secure authentication methods. Furthermore, the study underscored the necessity of implementing biometric authentication for electronic payments to address these concerns effectively.
In 2018, Chaudhry et al. [19] employed the random oracle model to assess the proposed scheme. This analysis confirmed that the scheme exhibited strong resilience against various potential attacks, with particular emphasis on guarding against smart card theft attacks and user anonymity violation attacks. The validity of the analysis was reinforced using the ProVerif automated software application. Furthermore, the analysis demonstrated that the proposed scheme boasted computational efficiency superior to that of Mir and Nikooghadam’s scheme.
In 2021, Tsai and Su [20] presented a novel approach for authenticating online banking customers and transactions were introduced, which involved the utilization of a hash-based multi-server authentication scheme alongside a smart card. The system’s design offered robust security attributes while minimizing maintenance expenses for financial institutions operating Internet banking services. This innovative mechanism was seamlessly integrated into established banking frameworks due to its compatibility with a tailored interface, making it an adaptable solution for enhanced security of Internet banking applications.
In 2019, Das et al. [21] developed an authentication method for ATMs, and employed a finger vein authentication technique, while a combined strategy encompassing steganography and cryptography was employed for transferring information, specifically finger vein images. The finger vein authentication system was realized through a fusion of image processing and machine learning techniques. As for the transfer of finger vein images, a hybrid solution involved lightweight cryptography and the variable MSB-LSB steganography algorithm was proposed. In the finger-vein authentication experiment, the results highlighted the efficacy of the proposed classification methods.
In 2015, Nagaraju and Parthiban [22] described the Multi-Factor Biometric Fingerprint Authentication (MFA) approach as systematically devised, offering a highly secure means of verifying the identities of remote users. A noteworthy feature of this approach was that user authentication details remained undisclosed to both the bank and cloud authentication servers, enabling these servers to perform remote user authentication without accessing the credentials. Building upon this researched framework, a privacy-preserving gateway was developed. This gateway employed tokenization and data anonymization techniques to obscure and desensitize customers’ account information. Notably, this approach maintained the original data format at various levels of the database management systems, rendering the data meaningless to unauthorized parties while remaining accessible to the rightful owner. Alongside the efficient MFA design, extensive experimental outcomes underscored the practicality and efficacy of the privacy protection gateway.
In 2022, Gavaskar et al. [23] prevented a security feature to counteract theft attempts involving the use of chloroform. A relay mechanism was incorporated, enabling the remote release of chloroform inside the ATM in response to a potential threat. Authorized personnel was initiated this action using a mobile app. To monitor and oversee the ATM’s internal activity, an ESP32-based camera was deployed, providing live video coverage. This camera not only recorded events but also transmitted video footage from inside the ATM. Additionally, the system tracked the ATM’s geographical location using GPS, providing latitude and longitude coordinates. The entire system was integrated with the Blynk mobile application. The microcontroller collected data from sensors and the GPS module. This information was then transmitted to the Blynk application. Through the Blynk application, authorized personnel was interact with the system. They had the capability to manipulate the relays, thus controlling the connected devices by toggling them ON or OFF. This versatile setup was to find applications in real-time scenarios like banking institutions, residences, and industrial settings.
In 2018, Sujatha and Chilambuchelvan [24] designed a sophisticated multimodal biometric algorithm, palm print, combining iris, signature recognition, and face techniques using an encoded discrete wavelet transform for comprehensive authentication and image analysis. This approach employed a multi-level wavelet-based fusion method, effectively integrating and encoding the biometric traits into a single composite image to facilitate matching decisions. The integration process was not only minimized memory requirements but also enhanced recognition accuracy and Equal Error Rate (ERR) compared to standalone biometric methods. The fusion and reconstruction algorithms were adeptly designed to handle the complexity of the process, making them well-suited for a wide range of real-time applications.
In 2021, Sangeetha et al. [25] implemented a fingerprint authentication method within the ATM system was undertaken with the primary goal of enhancing safety and security for individuals while streamlining transaction processes. The inherent uniqueness of fingerprints for each person ensured a robust level of security. This approach eliminated concerns related to lost ATM cards and eliminated the need to carry physical cards at all times. In comparative evaluations of various technologies for ATM security, fingerprint technology emerged as a superior and more secure option. These factors collectively established this mechanism as a convenient and highly secure transaction method, fostering a seamless interaction between users and ATM machines. Undoubtedly, this technology marked a cutting-edge advancement in electronic cash transactions.
Numerous studies regarding ATM transactions are given in Table 1. Fingerprint-based authentication [18] enhances the system performance of doing the transaction. But, the external validity becomes less which can mislead the authentication process. Key agreement [19] is more resistible to certain security threats by using the symmetric key-based authentication. Still, it incurs the computation overhead or complexity that affects the system integrity. Two-factor authentication [20] enhances the security level by considering the two different factor processes. However, it requires more training process that makes the system more intricate. SVM [21] offers higher classification accuracy and it can also reduce the time required for execution. On the other hand, it is less sensitive to noise and it also contains inadequate pixel information. MFA [22] performs better for data extraction, symmetric encryption, and decryption. As it considers the cloud datasets, the system cannot able to handle the massive collection of resources. IoT-based system [23] yields superior results in monitoring ATM transactions and their security. On the other hand, it suggests including biometric-based authentication for a better process. DWT [24] achieves the desired authentication value and it also offers multimodal biometric information. Nevertheless, the behavior-related traits, multi-sensor and multi-instance are critical to play in this process. Fingerprint-based verification [25] becomes effortless to avail for better verification by ATM system, but, it entails hardware complexity. These help to motivate to design of a well-developed model for ATM transactions.
Features and challenges of traditional multimodal biometric-based authentication for ATM transaction
Features and challenges of traditional multimodal biometric-based authentication for ATM transaction
Architectural view of recommended security framework on ATM transactions based on Multi-modal biometric authentication using deep networks.
Proposed secured authentication model for ATM transaction
ATMs manage physical currency and sensitive financial data, underscoring the critical importance of robust security protocols to forestall unauthorized access and fraudulent transactions. The potential repercussions, encompassing financial harm to individuals and financial institutions, underscore the urgency of establishing formidable security measures for ATM transactions. A plethora of security frameworks have been developed to elevate user protection. While conventional ATM transaction methods have undoubtedly offered convenience, they also bring forth several shortcomings relating to security, accessibility, and potential vulnerabilities. Illicit actors may resort to tactics like shoulder surfing to surreptitiously acquire PINs, granting them unauthorized access to accounts and the capability to execute deceitful transactions. Furthermore, criminals might employ card cloning by pilfering card information during ATM transactions [26], enabling them to carry out unauthorized purchases. The nefarious practice of ATM card skimming involves affixing devices to ATMs [27] to covertly gather card data. To counteract these security risks, this research endeavors to harness biometric attributes such as fingerprints, iris scans, speech recognition, and facial recognition. This biometrics is chosen for their distinctiveness, rendering them exceedingly arduous to replicate. By incorporating these biometric elements, the research seeks to establish confidentiality, integrity, and availability of financial services and data, thereby ensuring a secure and dependable platform for conducting day-to-day financial operations. Figure 1 provides an illustration of the Proposed Security Framework for ATM transactions, leveraging multi-modal biometric authentication through deep networks.
The proposed system consists of many phases, the primary goal of the system is to enhance the security of ATM transactions by implementing a novel multimodal biometric-based authentication approach. This approach combines multiple biometric factors (face, retina, fingerprint, and spectrogram) to ensure a higher level of security and accuracy, reducing the risks associated with traditional card and PIN methods. To propose MEB7-AM is designed to efficiently process and analyze the biometric information from various sources. This mechanism ensures that each channel’s data contributes effectively to the authentication process, thereby increasing accuracy and reducing false positives. After successful multimodal authentication, the system streamlines the transaction process. Users only need to enter a single PIN to select the desired bank. Once the bank is selected and proper credentials are provided, the ATM machine facilitates the withdrawal of money seamlessly. The proposed system aims to assess its efficacy using a comprehensive set of performance measures. By comparing the results with existing authentication methodologies, the system’s accuracy, speed, and reliability can be quantified, demonstrating its superiority and effectiveness.
Authentication for ATM transactions Using Multichannel EfficientNet B7 with attention mechanism
Multichannel EfficientNet B7
Using a Multichannel EfficientNet B7, the ATM authentication system sounds like an advanced and secure approach. EfficientNet B7 is a convolutional neural network architecture that is known for its efficiency and effectiveness in image classification tasks. Combining it with a multichannel approach can enhance its capabilities for ATM authentication. The explanation of Multichannel EfficientNet B7 is explained below
Multichannel [28]: In the context of deep learning, “multichannel” typically refers to the use of multiple input channels in a neural network model. These input channels represent different sources or types of data that are fed into the network simultaneously. Each input channel contains distinct information, and the network processes these channels collectively to make predictions or perform tasks. The concept of multichannel in deep learning enhances the model’s ability to learn and extract features from diverse data sources, ultimately improving its performance on various tasks. It’s commonly used in tasks like image classification, object detection, and speech recognition, where different aspects of the input data can provide complementary information for better predictions or analysis.
EfficientNet B7:
EfficientNet B7 [29], which belongs to the EfficientNet model family, stands as a Deep Convolutional Neural Network (DCNN) architecture meticulously crafted to find an optimal balance between precision and computational efficiency. This inherent adaptability renders it particularly well-suited for an array of computer vision tasks, encompassing image classification and object detection. The term “Efficient” in EfficientNet encapsulates the approach of methodically scaling the model’s dimensions to attain heightened performance gains without imposing significant increments in computational requirements. This scaling is achieved through a comprehensive approach that concurrently adjusts the network’s depth, width, and resolution while also governing parameters and computational intricacies.
In particular, EfficientNet B7 stands as one of the more substantial and potent variants within the EfficientNet lineup. Compared to smaller iterations like EfficientNet B0 or B1, EfficientNet B7 possesses more parameters and demands higher computational resources. This heightened capacity equips EfficientNet B7 to tackle more intricate tasks and datasets, delivering elevated levels of accuracy. The architecture of EfficientNet B7 retains the foundational building blocks characteristic of other EfficientNet models, encompassing squeeze-and-excitation blocks, judicious dimension scaling, and depthwise separable convolutions. EfficientNet includes versions from B0 to B7 where each with diverse constraints. The segmentation issues were successfully resolved by the transfer learning model [30].
Given its larger dimensions and capabilities, EfficientNet B7 finds suitability in scenarios necessitating remarkable accuracy. It shines in tasks where sufficient computational resources are accessible to accommodate its augmented model complexity. Nevertheless, it’s essential to acknowledge that leveraging such expansive models could entail greater memory usage, processing potency, and extended training durations. Figure 2 shows the architecture diagram for Multichannel EfficientNet B7.
Architecture diagram for Multichannel EfficientNet B7.
One critical application is in the realm of ATM transactions, where user identity verification plays a pivotal role in safeguarding financial transactions and personal information. To address the challenges of enhancing both security and efficiency, a cutting-edge solution called the MEB7-AM for ATM Transaction Authentication has been developed. The attention mechanism is explained below.
Attention Mechanism [31]: Within this framework, the attention vector, denoted as
Expanding upon this, the keys serve as a pivotal function for the value matrix, as delineated in Eq. (1).
In this context, the parameterization is denoted as
These magnitudes are subsequently employed in both weight determination and the computation of the weighted sum of value vectors. This computation
Furthermore, the attention mechanism has introduced a mechanism for enabling the direct selection of detection, contingent upon subsets of pertinent tokens. This mechanism is facilitated through the function involving the concatenation of
MEB7-AM authentication system represents a groundbreaking approach to enhancing the security and efficiency of ATM transactions. Here the collected data
Architecture diagram of proposed MEB7-AM for ATM authentication.
The primary goal of the system is to enhance the security of ATM transactions by implementing a novel multimodal biometric-based authentication approach. This approach combines multiple biometric factors face, retina, fingerprint, and spectrogram to ensure a higher level of security and accuracy, reducing the risks associated with traditional card and PIN methods. This helps to prevent various fraudulent activities, such as card theft and PIN compromise.
The system aims to integrate multiple banks’ access into a single ATM card provided by a Multi-Bank Provider. This eliminates the need for individuals to carry multiple cards for different banks, simplifying the user experience and making ATM transactions more convenient.
The proposed MEB7-AM is designed to efficiently process and analyze biometric information from various sources (face, retina, fingerprint, and spectrogram). This mechanism ensures that each channel’s data contributes effectively to the authentication process, thereby increasing accuracy and reducing false positives. After successful multimodal authentication, the system streamlines the transaction process.
Users only need to enter a single PIN to select the desired bank. Once the bank is selected and proper credentials are provided, the ATM machine facilitates the withdrawal of money seamlessly. The proposed system aims to assess its efficacy using a comprehensive set of performance measures. Figure 4 shows the flowchart for the proposed authentication for the ATM transaction system.
Flowchart for proposed authentication for ATM transaction system.
Simulation setup
Python was used for the implementation of Authentication for the ATM Transaction system, and the analysis will be carried out. Some of the classifiers like LSTM [32], RNN [33], ResNet [34], CNN [35], and EfficientNet B7 [29] were assimilated in this newly proposed model. The loss function used for the deep learning models was discussed as follows. The loss function used for the LSTM and RNN model is a mean squared error. Accordingly, the loss functions for the ResNet and EfficientNet B7 models are binary cross-entropy and categorical cross-entropy. The simulation parameters of the models like LSTM, RNN, ResNet, CNN, and EfficientNet B7 are shown in Table 2.
Simulation parameters of the models like LSTM, RNN, ResNet, CNN, and EfficientNet B7
Simulation parameters of the models like LSTM, RNN, ResNet, CNN, and EfficientNet B7
Within the scope of this research, biometric data from bank users is gathered and employed. Specifically, samples of biometric information encompassing fingerprints, facial features, retinal patterns, and speech characteristics are compiled from an online dataset. The subsequent section provides a concise overview of this data collection process.
Fingerprint Data: The biometric data pertaining to the fingerprints of bank users is procured from a dataset known as the “Sokoto Coventry Fingerprint Dataset (SOCOFing).” This dataset can be accessed through the URL “
Face Data: The facial data is obtained from the “Georgia Tech face database,” accessible via the link “
Retina Data: The dataset containing retina image data is sourced from the “Retinal Vessel Segmentation” dataset, which was accessed on August 16, 2023; via the URL “
Speech Signal: The speech signal examples are collected from the “TIMIT Corpus Sample (LDC93S1)” dataset, acquired from the link “
The fingerprint input is symbolized by the term
In the procedure of recognizing speech signals, noise reduction is implemented to eliminate extraneous sounds from the speech signal. Furthermore, the transformation of the signal into spectrogram images
Samples of face, finger, retina, speech.
Performance measures are below.
where the terms
Confusion matrix analysis of proposed authentication for ATM transaction model compared over the classical model.
The system’s evaluation involved the application of a confusion matrix for the MEB7-AM model, and the results are illustrated in Fig. 6. The evaluation criteria, including metrics such as accuracy, were assessed using this confusion matrix. Figure 6 shows the confusion matrix for ATM cards with PIN, the values range from 0 to 400, potentially denoting the spectrum of data points or categories under classification. This range signifies how accurately the system’s predictions align with the true labels. The proposed model exhibits proficient categorization, indicating its robust performance in terms of categorization capabilities, as indicated by the metrics depicted in the visual representation.
Evaluation of the ROC analysis for the created model for authentication for the ATM transaction system
The Receiver operating characteristic (ROC) curve serves as a visual tool for evaluating and gauging the accuracy of classification models, specifically in scenarios involving binary classification tasks. It visually presents the interplay between the true positive rate and the false positive rate, which pivots around the shifting threshold of a classification model. The ROC curve is employed to compare the efficacy of a proposed model against an established classifier, as depicted in Fig. 7. This comparison entails a comprehensive exploration of potential models, encompassing the spectrum of false and true positive measures spanning from 0 to 1. In essence, this evaluation approach involves analyzing how the models’ performance characteristics unfold across different threshold settings, illuminating the dynamics of their true positive and false positive rates.
Receiver operating characteristic (ROC) analysis of proposed authentication for ATM transaction model compared over the classical model.
Overall determination for the proposed ATM authentication model regarding the classifiers
K-fold evaluation of the designed model.
Continued.
The effectiveness of the suggested approach is evaluated using various classifiers are shown in Fig. 8. Here, the entire dataset is divided into 5 sets. While considering the 100% data for processing at the 1-fold includes 1–20, 2-fold contains 21–40, 3-fold includes 41–60, 4-fold contains 61–80, and 4-fold which includes 81–100. Initially, if the 1-fold analysis has been considered, where testing is made on the 1st set and then the other sets of data are utilized for the training stage. Based on this procedure the whole implementation is done. With the accuracy of Fingerprint, the proposed system outperforms other methods with notable differences: The accuracy of the suggested model stands at 2.3%, 4.4%, 7%, 6.7%, and 6.5% in relation to LSTM, RNN, ResNet, CNN, and EfficientNet B7 respectively. This accuracy is comparatively lower than that of the proposed MEB7-AM model. This emphasizes that a higher accuracy value contributes to the proficient identification of an ATM authentication system, making it a more effective tool for authentication.
Overall validation of the proposed ATM authentication model using diverse algorithms and classifiers
Table 3 illustrates the evaluation of the proposed ATM authentication model across various classifier models. When compared to alternative classifiers such as LSTM, RNN, ResNet, CNN, and EfficientNet B7, the MEB7-AM model demonstrates an MCC (Matthews Correlation Coefficient) value that respectively 18%, 14%, 11%, 3.4%, and 6% higher. This outcome substantiates the efficacy of the provided ATM authentication model.
Conclusion
Biometric-based Authentication for ATM transactions by the MEB7-AM model was carried out using Python. The proposed system comprised several phases, with its core objective being the enhancement of ATM transaction security through the implementation of an innovative multimodal biometric-based authentication approach. This method synergized various biometric factors such as face, retina, fingerprint, and spectrogram to ensure a heightened level of security and precision, mitigating the vulnerabilities inherent in conventional card and PIN techniques. The introduction of MEB7-AM aims to optimize the processing and evaluation of biometric data from diverse sources. This mechanism guaranteed the effective integration of data from each channel, thus augmenting accuracy and diminishing instances of false positives. Following successful multimodal authentication, the system optimized the transaction procedure, requiring users to input a sole PIN for bank selection. Upon selecting the bank and providing valid credentials, the ATM machine facilitated seamless money withdrawal. The proposed system’s effectiveness was evaluated through a comprehensive set of performance metrics. By juxtaposing outcomes against established authentication methods, the system’s superiority and efficacy in terms of accuracy, speed, and reliability can be ascertained. The accuracy of the suggested model stands at 7.3%, 8.4%, 7%, 3.7%, and 7.5% in relation to LSTM, RNN, ResNet, CNN, and EfficientNet B7 respectively. This accuracy was comparatively lower than that of the proposed MEB7-AM model. This emphasized that a higher accuracy value contributes to the proficient identification of an ATM authentication system, making it a more effective tool for authentication. Biometric data is highly sensitive, and ensuring its privacy and security is a critical challenge. Protecting biometric information from theft, unauthorized access, and potential breaches is essential. The proposed biometric-based authentication system using the MEB7-AM model presents exciting opportunities to enhance ATM transaction security. However, it also faces challenges related to data privacy, robustness, and practical implementation. Addressing these challenges and exploring future advancements can pave the way for more secure and user-friendly authentication solutions in the financial sector.
Footnotes
Author’s Bios
CRC Press, Taylor & Francis. His area of interest include Cloud Computing, Security, IoT, and Machine Learning. ORCID: 0009-0006-8267-8393.
