• Tidak ada hasil yang ditemukan

Adopt biometric technology to create a system that can help enhancing the current security system in ATM

N/A
N/A
Protected

Academic year: 2023

Membagikan "Adopt biometric technology to create a system that can help enhancing the current security system in ATM"

Copied!
8
0
0

Teks penuh

(1)

BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA

Major Information Systems Sarjana Komputer Thesis Semester [Even] year 2007

BIOMETRIC AUTHENTICATION SYSTEM AS SECURITY ENHANCEMENT FOR AUTOMATED TELLER MACHINE

BIOMETRIC TECHNOLOGY ANALYSIS

Monica Gracia Angelina 0700710586

Abstract

ATM helps bank in providing better service to the customers. With ATM, customers do not have to go to the bank for doing simple transaction. In the implementation, ATM card and PIN become general security mechanism in ATM. However, some people feel this security mechanism is not safe enough as people who are not the real owner of the account can do trans action if they have ATM card and the PIN. Regarding this problem, ATM manufacturers are analyzing other security mechanism that could be implemented in ATM.

The main objective of this thesis is to provide ATM with a new method to grant authorize access based on person biometric characteristics. Adopt biometric technology to create a system that can help enhancing the current security system in ATM. Other objective is to provide basic knowledge about different kinds of biometric technology that might be implemented in ATM.

Methods used in this thesis are background reading or research, interviewing, questionnaire and naturalistic observation. Interviewing representatives of BCA, Mega Mall Pluit and one of the biggest ATM manufacturers to gather information needed to analyze the problem and create solution. Design a system that is simple and user- friendly; also analyze three biometric technologies that are considered for creating solution. Using touch screen technology to help creates design for the solution.

In conclusion, enhancing ATM current security system will help ATM in creating a better service to the customer. Increase in security also means reduced problems, less cost, and increase ATM credibility.

Key words: Biometric, ATM, security, touch screen

(2)

PREFACE

Thanks first to Him from whom all life flows. Without his kindness and blessing, author could not complete this thesis titled “Biometric Authentication System as Security Enhancement for Automated Teller Machine” in time.

A very special tha nks to Mr. Lukas as author’s supervisor, that brought the idea for creating this thesis, giving author guidance and supports for completing this thesis. Mr.

Andi Wenas as Head of School of Information System that gives advice and support for author in making this thesis

A special thank you to everyone at BiN us International, all the teachers that have share their knowledge and guidance to author that cannot be mentioned one by one, all the students that help in giving support and advice during completing this thesis.

Author cannot thank Hendy Prawiro and Willy enough for their advice, contribution, and encouragement in completing this thesis.

Thank you especially for all representatives of BCA, Mega Mall Pluit and one of ATM manufacturer that author cannot mention one by one.

.

(3)

Thank you for author parents and siblings that support during completion of this thesis, and all friends that author can mention, for giving help and support.

A special thank you to everyone participated in filling the questionnaire and joined the experiment with the author.

In the end, author hopes that this thesis can be useful for ATM manufacturer, reader and other student in the future.

(4)

TABLE OF CONTENTS

Title Page ... i

Ceritificate of Approval ...ii

Statement of Examiners ...iii

Abstract ... iv

Preface ... v

Table of Contents ...vii

List of Tables... x

List of Figures ... xi

CHAPTER 1 INTRODUCTION ...1

1.1 Background ...1

1.2 Scope ...3

1.3 Aims and Benefit...3

1.4 Structure ...4

CHAPTER 2 THEORETICAL FOUNDATION...6

2.1 Theoretical Foundation ...6

2.1.1 Security...6

2.1.1.1 Security Basic Components ...6

2.1.1.2 Authenticatio n ...7

2.1.1.3 Password...8

2.1.1.4 Tokens ...8

2.1.1.5 Cryptography...8

2.1.2 ATM ...9

2.1.2.1 History of ATM ...10

2.1.2.2 ATM Hardware ...11

2.1.2.3 Types of ATM Security...12

2.1.3 Biometric ...15

2.1.3.1 History of Biometrics...15

2.1.3.2 Biometric Usage ...16

2.1.3.3 Biometric Technology...17

2.1.3.3.1 Fingerprints ...17

2.1.3.3.2 Hand Geometry...18

2.1.3.3.3 Retina-Scan ...19

2.1.3.3.4 Iris Recognition...20

2.1.3.3.5 Facial Recognition...21

2.1.3.3.6 Voice Recognition...22

2.1.3.3.7 Signature Verification...23

2.1.3.3.8 Keystroke Dynamic ...23

2.1.3.3.9 Future Biometric Technology ...24

2.1.3.4 Biometric Performance Measurement...24

2.1.3 5 Trading Off Usability and Security...25

2.2 Theoretical Framework ...27

(5)

2.2.1 Information Engineering Models ...27

2.2.2 Requirement Analysis ...27

2.2.3 Fact Finding Techniques ...28

2.2.4 Generate and Evaluate Alternatives ...31

CHAPTER 3 SPECIFICATION OF RES EARCH OBJECT ...32

3.1 Biometric System...32

3.1.1 Process Decomposition Diagram ...32

3.1.1.1 Enrollment ...33

3.1.1.2 Authentication...36

3.1.2 Process Dependency Diagram...38

3.1.2.1 Enrollment ...38

3.1.2.2 Authentication...39

3.2 Biometric Technology...40

3.2.1 Fingerprint Technology...40

3.2.1.1 Fingerprint Pattern...40

3.2.1.2 Fingerprint Scanner...42

3.2.1.3 Fingerprint Technology Application...43

3.2.1.4 Fingerprint Market Analysis ...44

3.2.1.5 Fingerprint Technology Advantages and Disadvantages...46

3.2.1.6 Leading Fingerprint Technology Vendors ...47

3.2.1.7 Fingerprint Technology at BCA...47

3.2.2 Hand Geometry Technology ...50

3.2.2.1 Hand Geometry Measurements ...51

3.2.2.2 Hand Geometry Scanner ...51

3.2.2.3 Hand Geometry Technology Application...52

3.2.2.4 Hand Geometry Market Analysis...53

3.2.2.5 Hand Geometry Technology Advantages and Disadvantages ...54

3.2.2.6 Leading Hand Geometry Technology Vendors ...55

3.2.2.7 Hand Geometry Techno logy at Mega Mall...56

3.2.3 Finger Vein Technology...58

3.2.3.1 Finger Vein Scanner ...58

3.2.3.2 Finger Vein Technology Application...59

3.2.3.3 Finger Vein Market Analysis ...60

3.2.3.4 Finger Vein Technology Advantages and Disadvantages...61

3.2.3.5 Leading Finger Vein Technology Vendors ...62

3.2.4 Comparison on Three Major Techno logies...64

CHAPTER 4 BIOMETRIC ANALYSIS ...68

4.1 Research Data...68

4.2 Parameters Measurement ...70

4.2.1 Exception Condition...73

4.3 Experiment Result ...74

4.3.1 Enrollment Result...74

4.3.1.1 Alil Hand Parameters ...75

4.3.1.2 Amin Hand Parameters ...77

(6)

4.3.1.3 Dedy Hand Parameters ...79

4.3.1.4 Hendy Hand Parameters ...81

4.3.1.5 Kamal Hand Parameters ...83

4.3.1.6 Kirman Hand Parameters ...85

4.3.1.7 Monica Hand Parameters ...87

4.3.1.8 Mulyana Hand Parameters ...89

4.3.1.9 Rizal Hand Parameters...91

4.3.1.10 Willy Hand Parameters ...93

4.3.2 Verification Result ...97

4.4 Data Storage ...99

CHAPTER 5 CONCLUSION AND RECOMMENDATION...102

5.1 Conclusion...102

5.2 Recommendation...103

Reference...104

Curicculum Vitae ...108

Appendix. Hand Geometry Parameter Calculation Result ...109

(7)

LIST OF TABLES

Table 3.1: Comparison three biometric technologies...65

Table 4.1: Alil’s Hand Parameter Value ...76

Table 4.2: Amin’s Hand Parameter Value. ...78

Table 4.3: Dedy’s Hand Parameter Value...80

Table 4.4: Hendy’s Hand Parameter Value...82

Table 4.5: Kamal’s Hand Parameter Value...84

Table 4.6: Kirman’s Hand Parameter Value ...86

Table 4.7: Monica’s Hand Parameter Value ...88

Table 4.8: Mulyana’s hand parameter value ...90

Table 4.9: Rizal’s Hand Parameter Value ...92

Table 4.10: Willy’s Hand Parameter Value ...94

Table 4.11: Standard Deviation Summaries from The Samples ...95

Table 4.12: Verification Test Result from 3 People ...98

Table 4.13: Data Storage Needed for Biometric Signature...100

Table 4.14: Monica’s Binary Value Data...101

(8)

LIST OF FIGURES

Figure 2.1: Relation among three characteristics [2] ...7

Figure 2.2: Cryptographic Operation [4]...9

Figure 2.3: ATM Machine [7]...11

Figure 2.4: ROC Curve[3]...26

Figure 3.1: Process Decomposition Diagram - Part 1 ...33

Figure 3.2: Process Decomposition Diagram - Part 2 ...36

Figure 3.3: Process Dependency Diagram - Part 1 ...38

Figure 3.4: Process Dependency Diagram – Part 2...39

Figure 3.5: Fingerprint image with features [18] ...41

Figure 3.6: Fingerprint Patterns [19]...42

Figure 3.7: Identix TouchLock II [20] ...48

Figure 3.8: Identix V20 Finger-scan [21]...48

Figure 3.9: Example hand geometry measurement [22] ...52

Figure 3.10: Hand including mirror image as seen by CCD camera [22]...52

Figure 3.11: Hand Key II Recognition Systems [23]...56

Figure 3.12: Inner View of Finger Vein Device with Finger [24] ...58

Figure 3.13: Biometric technology revenue in 1999...63

Figure 3.14: Biometric market by technology in 2007 ...63

Figure 4.1: Parameters Measurement Method from a Hand Image ...70

Figure 4.2: No Spot 2 in The Hand Image ...73

Figure 4.3: Alil’s Hand Parameters Measurement ...75

Figure 4.4: Amin’s Hand Parameters Measurement ...77

Figure 4.5: Dedy’s Hand Parameters Measurement ...79

Figure 4.6: Hendy’s Hand Parameters Measurement ...81

Figure 4.7: Kamal’s Hand Parameters Measurement ...83

Figure 4.8: Kirman’s Hand Parameters Measurement ...85

Figure 4.9: Monica’s Hand Parameters Measurement ...87

Figure 4.10: Mulyana’s Hand Parameters Measurement ...89

Figure 4.11: Rizal’s Hand Parameters Measurement...91

Figure 4.12: Willy’s Hand Parameters Measurement ...93

Referensi

Dokumen terkait

[r]

Effect of initial concentration of metal solution on adsorption efficiency of Cr(III) by polycalix[6]arene.. This fact can be explained on the basis of surface characteristics of

Sehubungan dengan tahapan Evaluasi Klarifikasi dan Negosiasi Teknis dan Biaya, maka dengan ini diundang kepada Saudara untuk hadir dengan membawa berkas asli sesuai yang

Mereka cenderung mempertahankan apa yang sudah ada dalam hukum internasional (status quo). Sementara negara berkembang mempunyai sikap reformis, menghendaki adanya

a) Diditujukan kepada Pokja Konstruksi I ULP Kabupaten Kepulauan Aru sesuai dengan ketentuan Dokumen Pengadaan dan Adendum Dokumen Pengadaan dan Lembar

Apabila Pimpinan Perusahaan tidak bisa/berhalangan hadir dapat di wakilkan oleh Pengurus yang tercantum dalam Akte Perusahaan dengan membawa surat Kuasa/ Tugas bermaterai

Metode Drill dalam pembelajaran Al- Qur’an Hadits adalah kemampuan guru dalam memperaktekan metode Drill kepada siswa dalam proses belajar mengajar untuk memberikan

Hasil yang didapat dari proses skrining fitokimia, maka dilakukan prosedur uji dengan Kromatografi Lapis Tipis (KLT). Sedangkan untuk elusidasi struktur senyawa aktif