Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
In present day world, mobile banking has emerged as a winner among various banking services. The major concern for mobile banking is its security. Since present authentication methods such as passwords, OTPs do not offer high level of security, there is always a risk of fraudulent attacks. To avoid this risk, reliable authentication procedures must be used. Biometric serves the purpose of reliable authentication mechanism. The paper gives the overview and quantitative comparative analysis of various physiological and behavioral biometric techniques that can be used in mobile banking. Various criteria that have been used for analysis are uniqueness, universality, permanence, circumvention, performance, and collectability and acceptability.
The objective of the proposed system is designed to perform Mobile Banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct measurements of a part of the human body and Behavioral is based on the action performed by the user. So, the author decided to use the face recognition method, it is purely based on the physiological characteristic of the human body. The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible with the small handheld devices. For the image capturing and forwarding process the Android mobile is used
The review paper is written with the objective to find the various different types of biometrics and the technologies within each type available as on-date that can be applied for authentication in e-banking. This study is pursued by performing a " KEYWORD SEARCH " on Journals, Articles, Published Thesis, Project Reports, Case studies related to biometrics as well as websites, brochures, products and services of biometric hardware and service providing companies, to collect information through a literature review. The study suggests the various different types of biometric types as well the technologies within each type available as on-date that can be used for authentication in e-banking.
Sensors
As smart devices have become commonly used to access internet banking applications, these devices constitute appealing targets for fraudsters. Impersonation attacks are an essential concern for internet banking providers. Therefore, user authentication countermeasures based on biometrics, whether physiological or behavioral, have been developed, including those based on touch dynamics biometrics. These measures take into account the unique behavior of a person when interacting with touchscreen devices, thus hindering identitification fraud because it is hard to impersonate natural user behaviors. Behavioral biometric measures also balance security and usability because they are important for human interfaces, thus requiring a measurement process that may be transparent to the user. This paper proposes an improvement to Biotouch, a supervised Machine Learning-based framework for continuous user authentication. The contributions of the proposal comprise the utilization of multiple sco...
Ijca Proceedings on International Conference on Recent Trends in Information Technology and Computer Science 2012, 2013
The PIN based single level authorization of Mobile Payment System suffers several security leakage problems. Integrating biometric identifier as one more level of authorization increases the robustness of the payment system. But as mobile device and wireless network has certain constraint, so it is not possible to use any biometric identifier for authentication. This paper presents a comparative study of using different biometric identifier in authorization process of mobile payment system, in context of developing country like India. In this paper we discussed the possible integration of face, fingerprint, iris, keystroke dynamics and voice as possible biometric identifier.
International Journal of Membrane Science and Technology
Online banking authentication has been recognized as a key factor in the security of online banking. nowadays, different methods have been developed for online banking validation which cause problems from hacker attacks and Internet theft. Our research showed that biometrics is appropriate options for dealing with these issues. In this article, different authentication protocols for online banking have been compered.
Lecture Notes in Computer Science, 2014
Online banking and electronic payment systems on the Internet are becoming increasingly advanced. On the machine level, transactions take place between client and server hosts through a secure channel protected with SSL/TLS. User authentication is typically based on two or more factors. Nevertheless, the development of various malwares and social engineering attacks transform the user's PC in an untrusted device and thereby making user authentication vulnerable. This paper investigates how user authentication with biometrics can be made more robust in the online banking context by using a specific device called OffPAD. This context requires that authentication is realized by the bank and not only by the user (or by the personal device) contrary to standard banking systems. More precisely, a new protocol for the generation of one-time passwords from biometric data is presented, ensuring the security and privacy of the entire transaction. Experimental results show an excellent performance considering with regard to false positives. The security analysis of our protocol also illustrates the benefits in terms of strengthened security.
In today's IT world, most of the communication is done through networking. So, security of information is very crucial. A lot of techniques have been developed for security which involves passwords, encryption, digital signatures etc. But there are chances of vulnerabilities in these techniques and hackers can break the security algorithms of these techniques. So, in this era, researchers have moved towards biometric techniques of security. It involves identification of people based on their physical characteristics or psychological behaviors. A choice of biometric method to be used is made depending on the level of security required and the goals of the system. Biometric identification is very excellent and secure way of authenticating people. But it can also suffer from security threats, if proper design considerations are not taken into account. This work presents details of biometric techniques and a detailed comparison of most famous biometric techniques.
Biometric recognition refers to an automatic recognition of individuals based on feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirmer determine the identity of an individual. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified basedon "who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (Password, PIN). In this paper, a brief overview of biometric methods, both Unimodal andMultimodal, and their advantages and disadvantages are presented. The term "biometrics" is derived from the Greek words bio (life) and metric (to measure). Biometrics refers to the automatic identification of a person based on his/her physiological or behavioral characteristics. This method of identification is preferred over traditional methods involving passwords and PIN numbers for its accuracy and case sensitiveness. A biometric system is essentially a pattern recognition system which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. An important issue in designing a practical system is to determine how an individual is identified. Depending on the context, a biometric system can be either a verification (authentication) system or an identification system. Verification involves confirming or denying a person's claimed identity while in identification, one has to establish a person's identity. Biometric systems are divided on the basis of the authentication medium used. They are broadly divided as identifications of Hand Geometry, Vein Pattern, Voice Pattern, DNA, Signature Dynamics, Finger Prints, Iris Pattern and Face Detection. These methods are used on the basis of the scope of the testing medium, the accuracy required and speed required. Every medium of authentication has its own advantages and shortcomings. With the increased use of computers as vehicles of information technology, it is necessary to restrict unauthorized access to or fraudulent use of sensitive/personal data. Biometric techniques being potentially able to augment this restriction are enjoying a renewed interest.
PIJMT, 2015
In the ever-changing world of global data communications, and fast-paced software development, security is becoming more and more of an issue. No system can ever be completely secure, all one can do is make it increasingly difficult for someone to compromise the system. The more secure the system is, the more intrusive the security becomes. One needs to decide where in this balancing act the system will still be usable and secure for the purposes. Here we have discussed different Biometric tools and related security issues. Identity is to establish the identity of a person, or to ascertain the origin, nature or definitive characteristics of a particular person. To uniquely identify a person different types of information can be used with other sources. This concept is ancient, and has become much more important as information technology and the Internet have made it easier to collect identifiable documents. To identify a person, the recent trend is to use biometric. Different biometric features can distinctively identify a person unless there are identical twins. In case of identical twins many biometrics fail to distinguish them as separate person, but fingerprint still can distinguish. In recent technology more than one biometric feature is also being used in a combination to have more robust indentifying system. Several research projects have shown that multimodal biometrics (e.g. fingerprints and voiceprints combined) can improve the performance and reliability of biometric authentication.
In this paper biometric fingerprint technology will define and discuss as new best approach identification and authentication customers for online internet banking, and how biometric fingerprint will improve the internet banking protect its assets. Background will be produced to present how authentication and identification have developed and improved through the applications successful that have implemented biometric technology to protect its asset; then a case of major bank in Malaysia will be taken as a case study. By answering the question, why does biometric fingerprint need to come forefront as a great method of authentication in online banking environment? The findings have found that there are reasons and factors for higher security as a near perfect and biometric fingerprint authentication will be indicated to be the solution to answer this call.
2013
As the world is heading towards paperless communication and transaction, the correct and authentic personal recognition is important to ensure that only legitimate users have access to the rendered services or information. Automatic recognition of individuals on the basis of their physiological or behavioral characteristics known as Biometric recognition or biometrics is now frequently used by service providers to authenticate personal recognition. Biometrics makes it possible to recognize the person on the basis of what he has (characteristics) rather than what he possesses (Id cards etc.) This paper provides an insight into various biometric characteristics their advantages, disadvantages, limitations and strengths. A systematic review of literature is carried out to identify future areas of research.
Intelligent Systems Reference Library, 2014
Currently, mobile smartphone devices contain a critical and sensitive data. In addition, they provide access to other data, on cloud for exammple, and to services somewhere on the Internet. Mobile authentication aims to protect against unauthorized access The current operating systems of mobile smartphones offer different authentication mechanisms. Nonetheless, in some situations, these mechanisms are vulnerable and in other situations, they are not user friendly enough, thus not widely adopted. In this chapter, we will give an overview of the current mobile authentication mechanisms: traditional and biometric, and their most commonly used techniques in the mobile authentication environment. In addition, the pro and cons of these techniques will be highlighted. Moreover, a comparison among these techniques will be conducted. The chapter also discuss the other techniques which could much suitable for the current environment of the mobile applications. Furthermore, it discuss a number of open issues of the mobile authentication which needs further research in the future to improve the adoption of the biometric authentication in the smartphones environment.
International Journal of Computer Applications, 2017
The e-banking systems in Nigeria is witnessing a large number of users, thereby encouraging the cashless economy policy proposed by the Central Bank of Nigeria (CBN). Hence, these systems need to be highly secured and reliable. This is because any compromise by this system can breach the customer's trust in using such systems for making transactions thereby discouraging the cashless policy agenda. Based on this the CBN is proposing the use of fingerprint biometric as a means of identification of any bank customer in Nigeria. However, since most fingerprint biometric systems can accept and grant access to artificial fingerprint, it is therefore clear that only fingerprint will not be suitable in securing banking system. Thus, the primary research objective of this paper is to propose a multifactor biometric model that would assist in creating a highly secured banking application in Nigeria using human physiological features. Based on the verification carried out on the model presented in this paper, it can therefore be sanctify to providing highly secured banking system in Nigeria if fully implemented.
2013
Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. In order to deal with security, Authentication plays an important role. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on "who she/he is" rather than "what she/he has" (card, token, key) or "what she/he knows" (password, PIN). We have also outlined opinions about the usability of biometric authentication systems, limitation, comparison between different techniques and their advantages and disadvantages in this paper. Present study deals with new innovative model ...
Abstract: With the increasing concerns for security, automated systems for authorization and authentication have become enormously important in every sector today. The need to secure information, services, and systems has increased. Conventional methods of authentications are knowledge based like passwords and PIN or object based like tokens, ID. Problem with these methods is that passwords can be cracked, ID can be stolen, and PIN can be forgotten. But Biometric systems that are currently available today examine fingerprints, handprints, iris and retina patterns, and face. Biometric cannot be borrowed; stolen, or forgotten and forging one is also very difficult. Biometrics can be categorized as behavioral and physiological. The main aim of this study is to make a comparative study of multimodal biometrics and declare the best effective method of biometrics that offers both security and convenience. Keywords: biometrics, identification, verification, Applications. Title: Comparative Study of Security Mechanism of Biometric Technologies Author: R.Vidhya lakshmi, R.Shobana International Journal of Computer Science and Information Technology Research ISSN 2348-120X (online), ISSN 2348-1196 (print) Research Publish Journals
We would like to outline our opinions about the usability of biometric authentication systems. We outline the position of biometrics in the current field of computer security in the first section of our paper. The second chapter introduces a more systematic view of the process of biometric authentication -a layer model (of the biometric authentication process). The third section discusses the advantages and disadvantages of biometric authentication systems. We also propose a classification of biometric systems that would allow us to compare the biometrics systems reasonably, along similar lines to Common Criteria [1] or FIPS 140-1/2 [4]. We conclude this paper with some suggestions where we would suggest to use biometric systems and where not.
— Biometrics is becoming very essential in computer security world. Biometrics refers to an automated system that can identify a person by measuring their physical and behavioral uniqueness or patterns, and comparing it. By using biometric techniques a person can be identified/verified based on " who she/he is " rather than " what she/he has " (card, token, key) or " what she/he/ knows " (password, PIN). In this paper, present a review of biometric standards, both unique and multi model, and their advantages and disadvantages will be presented.
Journal of Internet Banking and Commerce, 2011
The providers of Internet banking services must be more responsive towards security requirements. While there is no doubt that Internet banking transaction should have layered protection against security threats, the providers should approach security considerations as part of their service offerings. Biometric based authentication and identification systems are the new solutions to address the issues of security and privacy. Using biometrics for identification restrict individuals from access to physical spaces and electronic services An effective authentication method should have customer acceptance, reliable performance, scalability to accommodate growth, and interoperability with existing systems and future plans. In this study, the security threats in Internet banking, its solutions in biometrics and its acceptance in the consumer market are studied using descriptive and exploratory research. The methods of descriptive research are used to obtain information concerning the major security issues in e-Banking. The research had been completed on the basis of secondary data (online databases, scientific journals, surveys, news).
2014
Biometrics is the process of automated recognition of individuals based on their behavioral and physiological characteristics. Biometrical authentication is the process of making sure that the person is who he claims to be. Physiological biometric traits include face and retina structures, fingerprint (whorls minutia), hand geometry, iris (pattern), ear (structure of the cartilaginous tissue of the pinna), palm vein and DNA structures etc where as Behavioral biometric traits include gait patterns, signatures, keystroke and odor etc. Biometric is a very accurate and reliable method as compared to traditional knowledge based (e.g., passwords) and token based (e.g., ID cards) mechanisms. Various biometrics are used on the basis of the scope of the testing medium, the accuracy required and speed required. Every medium of authentication has its own advantages and shortcomings.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.