ATM & Biometric Solutions: A Case Study

Yamna Sheikh, Dr. Muhammad Imran Majid


The paper highlights security features for biometric systems along with application specific to a bank in Pakistan. Further, a comprehensive view of retinal scanning and application within the Internet of Things (IoT) paradigm is discussed. Of the various forms of scanning techniques, fingerprint, iris, and facial have been selected as a security measure. However, the application of retinal scans for security within ATMs in Pakistan is novel. Retinal scans face many issues such as external pressures that can make the implementation of retinal scans difficult, proper technological advancements for implementing of retinal scans, costing and whether it will serve as a barrier and whether the overall concept of implementing retinal scans is a workable idea or not. The sample taken was of 80 close ended questionnaires filled along with 4 focus group discussions. The questions related to technology, economics and situational awareness concepts. The concept of automated houses and the use of objects with artificial intelligence were of special interest. It is shown that  external factors especially cost and technological limitations prohibit widespread adoption of biometric based retinal scans and implications for overall privacy and security that is present.


Biometric scans, retinal scans, ATMs, IoT

Full Text:

Full Paper


Abreu, V., Santin, A. O., Viegas, E. K., & Stihler, M. (2017). A multi-domain role activation model . Communications (ICC) 2017 IEEE International Conference, 1-6 . doi:ISSN 1938-1883.

Amin, N. F., Chong, S. E., Hashim, N. Z., & Chizari, H. (2015). Security Issues in ATM Smart Card Technology. International Journal of Mathematics and Computational Science, 1(4), 199-205.

Das, S. S., & Debbarma, S. J. (2011). Designing a biometric strategy (fingerprint) measure for enhancing ATM security in Indian e-banking system. International Journal of Information and Communication Technology Research, 1(5), 197-203.

Ganiyu, S. O., Alhassan, M. E., & Muhammad-Bello, B. L. (2015). An Enhanced ATM Security System using Second-Level Authentication. International Journal of Computer Applications, 111(5), 8 - 15.

Hota, J. R. (2012). Windows Based and Web Enabled ATMs: Issues and Scopes. IUP Journal of Information Technology, 8(4), 52-59.

Hota, J., Nasim, S., & Mishra, S. (2013). Automated Teller Machines in India: A Literature Review from Key Stakeholders Perspectives. Department of Management Studies, 1(1), 1086 - 1105.

Jaiswal, A. M., & Bartere, M. (2014). Enhancing ATM Security Using Fingerprint and GSM Technology. International Journal of Computer Science and Mobile Computing (IJCSMC), 3(4), 28 – 32.

Okereke, E., Ihekweaba, G., & Okpara, F. K. (2013). Facial verification technology for use in ATM transactions. American Journal of Engineering Research (AJER), 2(5), 188-193.

Oko, S., & Oruh, J. (2012). Enhanced ATM security system using biometrics. IJCSI International Journal of Computer Science Issues, 9(5(3)), 352-357.

Padmapriya, V., & Prakasam, S. (2013). Enhancing ATM security using fingerprint and GSM technology. International Journal of Computer Applications, 80(16), 43-46.

Prithika, M., & Rajalakshmi, P. (2013). Card duplication and crime prevention using biometrics. IOSR Journal of Computer Engineering (IOSR-JCE), 10(1), 1-7.

Ravikumar, S., Vaidyanathan, S., Thamotharan, S., & Ramakrishan, S. (2013). A new business model for ATM transaction security using fingerprint recognition. International Journal of Engineering and Technology (IJET), 5(3), 2041-2047.

Sagheer, A. M. (2012). Elliptic curves cryptographic techniques. Signal Processing and Communication Systems (ICSPCS). International Conference on. IEEE, .

Santhi, B., & Kumar, K. R. (2012). Novel hybrid technology in ATM security using biometrics. Journal of Theoretical and Applied Information Technology, 37(2), 217-223.

Saraswathi, K., Jayaram, B., & Balasubramanian, R. (2011). Retinal Biometrics based Authentication and Key Exchange System. International Journal of Computer Applications, 19(1), 1-7.

Stankovic, J. A. (2014). Research Directions for the Internet of Things. Life Fellow, IEEE.

Subha, R. (2017). Biometrics in Internet of Things (IoT) Security. International Journal of Engineering Research and General Science, 5(5), , Vol. 5 (5): p. 37 - 42.



  • There are currently no refbacks.

Copyright (c) 2019 International Journal of Experiential Learning & Case Studies

Creative Commons License

This work is licensed under a Creative Commons Attribution 4.0 International License.