TABLE OF CONTENTS
TABLE PAGE
COVER PAGE i
THESIS PAGE ii
DECLARATION iii
CERTIFICATION iv
ACKNOWLEDGEMENT v
ABSTRACT vi
TABLE OF CONTENT vii
LIST OF TABLE viii
LIST OF FIGURE ix
CHAPTER ONE: INTRODUCTION
1.0 Introduction 1
1.1 Background of Study 1
1.2 Statement of the Problem 4
1.3 Aim and Objectives of studies 4
1.4 Significance of Study 5
1.5 Scope of the Study 6
1.6 Limitations of study 6
Definition of Terms 7
CHAPTER TWO: LITERATURE REVIEW
2.0 Introduction 9
2.1 Review of literature 10
2.2 The Automated Teller Machine 13
2.3 Types of ATM Fraud 15
2.4 Categories of Biometric 16
2.5 Types of Biometric 17
2.5.1 Fingerprint 17
2.5.2 Voice 18
2.5.3 Facial 19
2.5.4 Retina 21
2.6 Biometric Accuracy Criteria 22
2.7 Summary of Review 23
CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN
3.0 Introduction 25
3.1 Analysis of Existing System 26
3.2 Limitation of the Existing System 26
3.3 Justification of the New System 27
3.4 Methodology 27
3.5 Data collection 29
3.6 Proposed New System 30
3.7 Components of the New System 34
3.8 Representation of the System 35
3.8.1 Use case Diagram 35
3.8.2 Activity Diagram 36
3.8.3 Flow Chart Diagram 37
CHAPTER FOUR: SYSTEM IMPLEMENTATION AND TESTING
4.0 Introduction 40
4.1 Choice of programming language 40
4.1.1 Visual Basic 2010 40
4.1.1 Microsoft .Net Framework 41
4.1.2 Microsoft Server 2008 42
4.2 System Main Menu and Implementation 43
4.3 Implementation of the Subsystem 46
4.3.1 Account Holder Information 46
4.3.2 Card Holder Information 46
4.3.3 Alternate ATM user Detail 47
4.3.4 ATM Card form 48
4.4 Query Subsystem Implementation 52
4.5 System Testing and Integration 54
4.5.1 Testing 54
4.5.2 Integration 54
4.6 The Test Data 55
4.6.1 Hardware Requirement For the System 56
4.6.2 Software Requirement for the System 56
4.6.3 System Documentation 57
4.6.4 Software Maintenance 57
CHAPTER FIVE: SUMMARY, RECOMMENDATION AND CONCLUSION
5.0 Summary 58
5.1 Findings and Discussion 58
5.2 Suggestion for Future Work 59
5.4: Recommendation 49
5.3: Conclusion 60
REFERENCE 61
APPENDIX 63
LIST OF TABLES
TABLE PAGE
Table 3.1 Analysis of Questionnaire 29
Table 3.2 Account Holder Information 33
Table 3.3 Card Holder Information 33
Table 3.4 Alternate User information 34
LIST OF FIGURE
FIGURE PAGE
Figure 2.1 Types of Finger Print 18
Figure 2.2 Sample of a voice Pattern 19
Figure 2.3 Sample of a Facial Recognition Pattern 21
Figure 2.4 Sample of Retina Images 22
Figure 3.1 Diagram of a client Server Architecture 28
Figure 3.2 Pie Chart Showing Result of the Questionnaire 29
Figure 3.3 Numeric Input Diagram 32
Figure 3.4 Biometric Input 32
Figure 3.5 Use Case Diagram of an ATM Processes 36
Figure 3.6 Activity Diagram 37
Figure 3.7 Flow chart Diagram 38
Figure 4.1 Start Page 43
Figure 4.2AdminLogin Interface 44
Figure 4.3 New account opening Form 45
Figure 4.4 Account Holder Information 46
Figure 4.5card holder Information 47
Figure 4.6Alternate User Detail 48
Figure 4.7 ATM Card Form 49
Figure 4.8 Insertion of ATM Card 50
Figure 4.9 Insertion of Password 51
Figure 4.10 Insertion of Finger Print 51
Figure 4.11 Admin Login 52
Figure 4.12 Incorrect password 53
Figure 4.13Test Data 55
CHAPTER ONE
INTRODUCTION
1.1 Background to the Study
In the olden days, financial institution in Nigeria did almost all their transactions manually, to allow customers perform their financial transactions and other banking processes. The customers have to form a queue which ends up consuming a lot of consumer’s time and is not always efficient. In view of this and the fast wind of IT sweeping through Nigeria, had lead the bank to the utilization of an electronic device known as Automatic Teller Machine (ATM) for performing transaction without the physical presence of a bank delegate. Automated teller machine is a mechanical device that has its roots embedded in the accounts and records of a banking institution. It is a machine that allows the bank customers to carry out banking transactions like deposits, transfers, balance enquiries, mini statement, withdrawal and fast cash e.t.c. The ATM has gained wide utilization due to the 24 hours service it provides to customers. Khatmode R. K. et al,(2014).
Nearly 10 years since its introduction in Nigeria, the ATM has become the favored channel of financial transaction by most Nigerians. However, the expanding and wide acceptance of the ATM by the member of the public has led to a need to further build and enhance the security and integrity of the system. Utilization of ATM (Automatic Teller Machine) is helpful for monetary transaction. ATM transaction is initiated by inserting the ATM card and typing the PIN (Personal Identification Number) of that specific card. Despite the fact that bank allows their customers to choose their PIN, this system is not safe to use because anybody can access the system if they have the card and PIN number. The system looks at the code against a stored list of approved authorized passwords and users. PIN typically in a form of four digit combination of numbers that is entered via the ATM panel. If the code is genuine, the system permits access at the security level approved for the owner of the account. The strength of PIN as a security system is weakened and the likelihood of the code leaking to other people is high. In recent time, due to fraudsters advancements and technological improvement it is now possible to fix ATM Card scanners in ATM Machine to acquire encoded information from ATM Card, which is again used to create a copy of the ATM card and to make fraudulent transactions. This is the primary impediment of the current system. Conventional ATM systems authentication method has some limitations. Using A
.