Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2023
…
7 pages
1 file
In the present day world, online shopping using WAP enabled mobile phone has widely come into use. Credit cards serve as the currency during e-business and E-Shopping. As technology has advanced in the negative side also hackers and spoofers steal misuse credit card numbers, even though the network has been made secure. So, in this paper, we have proposed a multi-biometric model (integrating voice, fingerprint and facial scanning) that can be embedded in a mobile phone, this making e-transactions more secure. The model is very cost effective as we have tried to use the hardware already present in the phone.This paper uses for image processing or facial reorganization and finger print. We have also simulated a few graphs for voice recognition and facial verification using MATLAB 6.0
Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA).
The rapid development of Information and Communication Technology has had an impact on all social aspects of society. Currently, there are many various forms of electronic money (e-money) that have used in buying and selling transactions both in traditional markets and in the online market. Various companies have issued their own electronic money. Initially the use of electronic money is still in the company's cooperation network. Thus, electronic payment transactions will continue to increase. This is a necessary mechanism of security that can make sure a sense of security for consumers in making payment transactions electronically. A security solution could be developed using consumer biometric elements. So in making payment transactions will be safer because biometric for everyone is not the same.
International Journal of Computer Applications, 2017
The e-banking systems in Nigeria is witnessing a large number of users, thereby encouraging the cashless economy policy proposed by the Central Bank of Nigeria (CBN). Hence, these systems need to be highly secured and reliable. This is because any compromise by this system can breach the customer's trust in using such systems for making transactions thereby discouraging the cashless policy agenda. Based on this the CBN is proposing the use of fingerprint biometric as a means of identification of any bank customer in Nigeria. However, since most fingerprint biometric systems can accept and grant access to artificial fingerprint, it is therefore clear that only fingerprint will not be suitable in securing banking system. Thus, the primary research objective of this paper is to propose a multifactor biometric model that would assist in creating a highly secured banking application in Nigeria using human physiological features. Based on the verification carried out on the model presented in this paper, it can therefore be sanctify to providing highly secured banking system in Nigeria if fully implemented.
The objective of the proposed system is designed to perform Mobile Banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct measurements of a part of the human body and Behavioral is based on the action performed by the user. So, the author decided to use the face recognition method, it is purely based on the physiological characteristic of the human body. The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible with the small handheld devices. For the image capturing and forwarding process the Android mobile is used
Now a day's mobile phone became smart phone with lot of features. Smart phone comes with high resolution cameras and support high speed internet. This tends to increase the use of online transactions. But these is secured only by ID no. & password, this is not so secured. Biometric characteristics like fingerprint are changes person to person. So to increase the security of online transactions we use Fingerprint recognition with credit card/debit card transaction. Smart phone with high pixel camera function are capable of capturing image & processing task. In this proposed system cell phones cameras capturing fingerprint images as biometric traits. No need of extra module for fingerprint recognition. Everyday a lot of new mobile phones called as smart phones come in a market with various features like embedded cameras, Fast processors, pocket high speed Internet & many more. By using embedded camera we can take photos & shoot videos. Some of embedded cameras have high resolution & high picture quality images more than 5 Mega-Pixels. Due to high speed internet almost all banking technology has changed to online. So the traditional way of shopping is changed to Internet shopping also we can pay the various bills, transfer the money by using online transactions. But security of online transactions is a big issue. Now days this system is secured only by credit card/debit card no/ ID no, CVC no. & OTP (one time password) which is send on registered mobile no. Moreover, the services which can be accessed via smart phones (e.g., m-banking and m-commerce etc.) represent a major value. Therefore, the danger of a mobile device ending up in the wrong hands presents a serious threat to information security and user privacy. According to the latest research from Halifax Home Insurance claims, 390 million British pounds a year is lost in Britain due to the theft of smart phones. With the average handset costing more than 100 British pounds, it is perhaps not surprising that there are more than 2 million stolen in the UK [1] & India every year. Biometric characteristics like fingerprint, voice pattern, iris etc cannot be stolen or forgotten & also biometric characteristics are unique & remain same even fingerprints of twins are different. So it's most promising technology for authentication. Approximately from 14 th century fingerprints were stamping on paper using ink for identification of person. Now days they are captured as live-scan digital images acquired by directly sensing the fingerprint surface with an electronic fingerprint scanner. The fingerprint pattern displays different features at different levels. Some smart phone has inbuilt fingerprint scanner. But they are very costly. Many fingerprint recognition algorithms perform well on databases that had been collected with high-resolution cameras and in highly controlled situations [2]. In this paper we present fingerprint recognition as means of verifying the identity of the user using embedded camera. We use Fingerprint of user as a password for online transactions. The image of fingerprint is captured by using embedded camera of smart phone. Mostly more than 5 Mega-pixel cameras are used for capturing the image of fingerprint traits. This image is compared with the database. If the image is matched with the database then user can do the online transactions. This is the most secure and easy method. The main purpose of this paper is to lower down the user effort while keeping the error rates in an acceptable and practical range. Therefore, this proposal is a realistic approach to be implemented in mobile devices for user authentication. II Fingerprint Recognition Fingerprint recognition is the most matured approach among all the biometric techniques. With its success of use in different applications, it is today used in many access controls applications as each individual has a unique fingerprint. The hand skin or the finger skin consists of the so called friction ridges with pores. The ridges are already created in the ninth week of an individual's fetal development life [3], and remains the same all life long, only growing up to adult size, but if severe injuries occur the skin may be reconstructed the same as before. Researchers have found out that identical twins have fingerprints that are quite different and that in the forensic community it is believed that no two people have the same fingerprint [4].
International Journal of Information Technology Convergence and Services, 2011
Mobile payments have become an important application in daily activities. The unique advantage of mobile payments over traditional payments has led to tremendous growth of mobile phones. The strong demand of mobile applications raised increased concern on the security of mobile applications as well as devices. New mobile devices are developed to serve various functions like storing sensitive information, accessing this information as well transacting this information through payment systems. In order to protect this information and mobile devices, a well defined authentication system is mandatory. Biometric authentication is much more safe and secure and very easy to use. In this paper we propose a multi modal biometric authentication procedure with respect to payment systems and integrate this model with our previous work. The aim of this paper is to integrate the proposed payment model with multi server authentication model for the purpose of maintaining security and accessing different servers (websites). The system providing resources to be accessed over the network often consists of many different servers through out the world. The distribution of the remote system hardware in different places makes the user access the resources more efficiently and conveniently.
Ijca Proceedings on International Conference on Recent Trends in Information Technology and Computer Science 2012, 2013
The PIN based single level authorization of Mobile Payment System suffers several security leakage problems. Integrating biometric identifier as one more level of authorization increases the robustness of the payment system. But as mobile device and wireless network has certain constraint, so it is not possible to use any biometric identifier for authentication. This paper presents a comparative study of using different biometric identifier in authorization process of mobile payment system, in context of developing country like India. In this paper we discussed the possible integration of face, fingerprint, iris, keystroke dynamics and voice as possible biometric identifier.
IFAC-PapersOnLine, 2019
Today's mobile devices are the most common investment in the technology industry as it is almost impossible to find a person who does not own a personal phone. Being the weakest point of nearly every user, as the data stored in it is essential, increased phone access security has been achieved by using biometric authentication modalities on these mobile devices. Here, the biometric modules that are most commonly used for authentication and how they are shared, the process of access and the weaknesses of each of these biometric modalities will be elaborated. Also indicate what are the potential attacks and problems that can be encountered in each of the biometric authentication methods on mobile devices.
2019
Authentication techniques and biometric systems have occupied a major industrial area today. People have moved from big devices to small portable devices like mobile phones. Ample amount of systems requires relaibility as an important factor as they want that the access should be given only to the genuine users. Technology revolution has bought biometric systems to become more secure and highly user friendly. This paper is highlighting on various biometric technology available and their comparative analysis, strength, and related privacy issues with biometric system.
Mobile Multimedia/Image Processing, Security, and Applications 2010, 2010
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
2013 6th International Congress on Image and Signal Processing (CISP), 2013
International Journal of Communication, 2018
KnE Engineering, 2018
A. M. Bojamma, B. Nithya & Prasad. C. N, 2013