ATM Transaction Security Using Fingerprint/OTP
|
|
|
- August Abner Norman
- 10 years ago
- Views:
Transcription
1 ATM Transaction Security Using Fingerprint/OTP 1 Krishna Nand Pandey, 2 Md. Masoom, 3 Supriya Kumari, 4 Preeti Dhiman 1,2,3,4 Electronics & Instrumentation Engineering, Galgotias College of Engineering & Technology Greater Noida, Uttar Pradesh , India Abstract- This paper deals with the solutions related to the ATM security. We are going to make use of fingerprint or One Time Password (OTP) verification along with the use of ATM pin. In this system, the user can have third party authentication either temporary or permanent. In the whole process, the first party i.e. the banker will maintain a database of the customer including fingerprint and mobile number. The banker will provide the ATM card along with its PIN. For the transaction after entering the ATM pin, the customer will be asked to choose an option either fingerprint or OTP verification. The OTP will be sent to the registered mobile number of the customer through GSM module connected to the system. After authorised verification, the customer will be able to proceed for transaction else after three successive wrong attempts, the ATM card will be blocked for 24 hours and a message will be sent to the registered mobile number. Keywords- ATM, OTP, fingerprint, ATM pin, mobile number, microcontroller. I. INTRODUCTION With the advent of modern technology, there is a drastic increase in fraud. One easy way is ATM fraud which includes fraudulent cash transactions so there is a need to regularly develop consumer favourable systems to deal with these frauds related to ATM transactions may be of several ways viz. Eavesdropping, Spoofing, Skimming Attack, Card Trapping, PIN Cracking, Phishing Attack, ATM Malware, ATM hacking [5],[6]. Several biometric authentication methods can be used to minimise such cases which includes fingerprints, face, iris before any transaction through ATM. Fig.1 Chart Representing Global Card Fraud One approach to deal with ATM frauds is face detection technology [1]. Here the transaction is allowed if and only if the face of the user is detectable. But it has a drawback that it does not authenticate the legal user of the ATM and instead it just asks for detectable face of suspects who tend to hide their face. Another approach is the iris recognition system. It has very high accuracy in verifying an individual s identity [2]. It works on four steps- image acquisition, segmentation, encoding and matching but work is still going on to make this technology feasible and cost effective. The third approach is Palm Vein Technology to run financial transactions. In this system, the user is required to provide his/her palm vein since these veins are unique for each individual. It is being practised in Japan. But it requires an overall update of database which is a tedious and costly process [3]. A better approach is a combination of fingerprint and One Time Password (OTP) authentication along with ATM pin. It is cost effective and user friendly method since all the required data is already available in the database of the banker [5],[7][8],[10]. In this system, the user is required to enter the ATM pin, after inserting the ATM card. Immediately after that the user will be asked to choose between two methods, either fingerprint or OTP. By selecting the fingerprint option the user will get two options- Admin mode and Transaction mode. The user may proceed with transaction mode to carry out financial transactions. In admin mode, user can add another authorised person by adding his/her fingerprint (only for transaction purpose). Also user can add/change the customer s registered mobile number [4],[5]. JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 448
2 If the user selects the OTP option, he/she will be authorised for financial transaction purpose only after OTP verification. The OTP will be received at the customer s registered mobile number. This OTP will be valid for only one transaction. In this mode the user does not have the admin control. After three successive wrong attempts in either fingerprint or OTP method the account will get automatically blocked for next 24 hours and an SMS will be sent to the registered mobile number. II. FINGERPRINT- AN OVERVIEW A fingerprint is a print made by an impression of the ridges in the skin of a finger; often used for biometric identification. A ridge is a raised portion of the epidermis on the fingers, toes and the palm of the hand. These epidermal ridges serve to amplify the vibrations, for example, when fingertips sweep across a rough surface, the signals are transmitted to sensory nerves involved in fine texture perception. Impressions of fingerprints may be left behind on a surface by the natural secretions of sweat from the eccrine glands that are present in friction ridge skin [3],[6]. Some of the fingerprint patterns is shown in fig.2&3. Fig.2 Different shapes of fingerprint impression A. Advantages of Fingerprint over other Biometric Methods (a) (b) Fig.3 (a) Greyscale fingerprint (b) Binarized fingerprint It is unique for every individual. Easy to install compared with other biometrics. Robust and easy to use. Low maintenance cost. Since is already available in the banker s database, so no extra cost for database management. A comparative survey of biometric methods as shown in fig.3, shows that the use of fingerprint dominates over other kinds of biometrics such as iris, face, palm vein, etc. for identification. JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 449
3 III. PROPOSED METHOD Fig.4 A comparative study of different types of biometrics used After complete analysis of the advantages of the fingerprint biometrics system, we propose an advanced ATM security system by making combined use of fingerprint with One Time Password (OTP) authentication. Here we are going to explain our hardware and software model. A. Hardware Description We are going to design this model after analysing all the existing embedded ATM client authentication system. We have studied all previously used components of existing designs and we are proposing the best hardware description. We make use of S3C2440 chip and the LCD, keyboard, alarm, fingerprint scanner are connected to this chip along with SRAM and FLASH. 1) LCD Module: OMAP5910 is used in this module as a LCD controller; it supported 1024*1024 image of 15 Grey-scale or 3375 colours. 2) Keyboard Module: It is of numeric type to input numeric values. 3) SRAM and FLASH: A 16-bit FLASH chip and a 32-bit SRAM chip are used to store the running code, the information of fingerprint and the algorithm. 4) Fingerprint Scanner Module: A 500dpi resolution, anti-press, anti-static fingerprint scanner is used. 5) Ethernet Switch Controller: A 10/100 Mbps RMII Ethernet port is used to connect with the remote data server. 6) GSM module: A GSM modem is used to send the OTP to the registered mobile number. The proposed hardware model of this system is shown in fig.5. Fig.5 Hardware model of the system JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 450
4 B. Software Model The software design includes two stages. First of all the first module of code will be designed for user interface with ATM machine and other module of code will be for scanning and matching of fingerprint. The overall flow diagram of software design is given in fig.6. C. Process Of Scanning And Matching Of Fingerprint When the finger is pressed over the fingerprint scanner, this linear sensor captures the fingerprint image. This captured image is matched with the database on the remote server. This whole process is controlled by the central microcontroller chip. During the matching process the information is stored in SRAM. The flow diagram of the fingerprint recognition process is shown in fig.7. IV. CONCLUSION AND COMPARISON The method used in this paper is of significant use. As a result of the work proposed there will be benefit to human beings for the purpose of ATM security. The review paper submitted here is plan of our project which is still to be completed. As a result of this project, there will be tremendous change in ATM security system. As the research work in this area is still going on, we can expect a better outcome through our project than previous existing ones. Several works have been done in the field of ATM transaction security. A 3D password based system was proposed in 2008 but it was still traceable. In 2010, a face recognition based system was proposed which was only helpful for tracking suspects and it did not authorise the legal card holder. Again in 2012, a system was proposed using fingerprint and OTP together to authorise the user but there was no backup plan to overcome the failure of fingerprint or OTP system. Another method was proposed in 2012 using iris recognition technology, though it is highly accurate and secure but it has a high installation and maintenance cost. A system using only OTP as authentication purpose was also proposed in 2013, as mobile connectivity was necessary for such type of system therefore it was not reliable for every region. The detailed comparison of previous works along with their limitations is discussed briefly in table 1 [9],[1],[6],[2],[10]. Fig.6 Flowchart of overall software model JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 451
5 Fig.7 Flow diagram for fingerprint scanning V. FUTURE SCOPE According to latest scenario ATM fraud is a very grave problem for banks. This project leads to establish authentication results which can be used by banks as well as various organisations. Now a days security system used in ATMs is completely based on PIN security system which is vulnerable. Banks provide four digit PIN to the user which can be changed later by the user. After first use, user usually changes the password and keeps password quite guessable. This is the main drawback of this PIN type ATM system. When ATM card is lost or stolen it is required to close the ATM card by contacting the bank immediately. To avoid the above stated problem a security model is being proposed. This system includes application of either fingerprint or OTP authentication. The user can choose between either of the methods according to his/her convenience. The main advantage of this method over the existing and other proposed methods is that it has low installation and maintenance cost and user friendly with a backup plan in case of a failure of one of the methods. In future this technology can be beneficial for each type of user and can be used for authentication in both banks as well industries wherever individual s identification is required. Title Three Dimensional password for more secure information Face Recognizability Evaluation for ATM applications with exceptional occlusion handling ATM security using fingerprint recognition and GSM Recognition technique for ATM based on IRIS technology TABLE I. COMPARATIVE STUDY OF PREVIOUS WORKS Author (Year of Publication) Fawaz A. Alsulaiman (08) Sungmin Eum (10) Pennam Krishnamurthy (12) K. Laxmi Narshima Rao (12) Method Significance Strength Limitations 3-D password Face Recognition Fingerprint and OTP Iris recognition Generation of graphical password using combination of alphanumeric-special characters Transaction proceeds only after recognizing the face of the user Both fingerprint and OTP are required at the time of transaction Iris of the user is verified Strong password Helpful in tracking of suspects Secure High accuracy and secure Possibility of password being traced. Does not authenticate the legal card holder. No backup plan suggested to overcome the failure of fingerprint or OTP system. High installation and maintenance cost Protected cash withdrawal in ATM using Mobile phone M. R. Dinesh Kumar (13) One Time Password (OTP) Sends an OTP to the registered mobile phone Secure Not feasible for everyone. JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 452
6 REFERENCES [1] Sungmin Eum, Jae Kyu Suhr, and Jaihie Kim Face Recognizability Evaluation for ATM Applications With Exceptional Occlusion Handling School of Electrical and Electronic Engineering, Yonsei University,Republic of Korea [2] K. Laxmi Narshima Rao Recognition Technique for ATM Based on Iris Technology International Journal of Engineering Research and Development e-issn: X, p-issn: X, Volume 3, Issue 11 (September 2012), PP [3] K. Lavanya A Comparative Study on ATM Security with Multimodal Biometric System International Journal of Computer Science & Engineering Technology (IJCSET) ISSN : Vol. 4 No.06 Jun 2013 [4] Lin Hong, Wan Yifei, Anil Jain. Fingerprint image enhancement: algorithm and performance evaluation. IEEE Transactions on Pattern Analysis and Machine intelligence. 1998, 20(8): [5] Mahesh A. Patil ATM Transaction Using Biometric Fingerprint Technology International Journal of Electronics, Communication & Soft Computing Science and Engineering ISSN: , Volume 2, Issue 6. [6] Pennam Krishnamurthy, Mr. M. Maddhusudhan Redddy, Implementation of ATM Security by Using Fingerprint recognition and GSM, International Journal of Electronics Communication and Computer Engineering Volume 3, Issue (1) NCRTCST, ISSN X,(2012). [7] G.Sambasiva Rao, C. NagaRaju, L. S. S. Reddy and E. V. Prasad, A Novel Fingerprints Identification System Based on the Edge Detection, International Journal of Computer Science and Network Security, vol. 8, pp , (2008). [8] Jinwei Gu, Jie Zhou, and Chunyu Yang, Fingerprint Recognition by Combining Global Structure and Local Cues, IEEE Transactions on Image Processing, vol. 15, no. 7, pp , (2006). [9] Fawaz A. Alsulaiman and Abdulmotaleb El Saddik Three-Dimensional Password for More Secure Authentication IEEE Transactions On Instrumentation And Measurement, Vol. 57, No. 9, September [10] M.R.Dineshkumar Protected Cash Withdrawal in Atm Using Mobile Phone International Journal Of Engineering And Computer Science ISSN: Volume 2 Issue 4 April, 2013 Page No JETIR Journal of Emerging Technologies and Innovative Research (JETIR) 453
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
Microcontroller Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Bharath K M, Rohit C V Student of B.E Electronics and Communication Coorg Institute of Technology,
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology
ARM7 Based Smart ATM Access & Security System Using Fingerprint Recognition & GSM Technology Khatmode Ranjit P 1, Kulkarni Ramchandra V 2, Ghodke Bharat S 3, Prof. P. P. Chitte 4, Prof. Anap S. D 5 1 Student
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
An Embedded ATM Security Design using ARM Processor with Fingerprint recognition and GSM
International Journal of Advanced and Innovative Research ISSN: 2278-7844 Available online at http://ijair.jctjournals.com Volume 1, Issue 2, July 2012 An Embedded ATM Security Design using ARM Processor
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES ATM SECURITY IMPROVEMENT USING FINGER PRINT Neelam Verma 1, Rakesh Patel 2, Priya Bag 3 Student,B.E.(IT) Kirodimal Institute of Technology,Raigarh(C.G.),India
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
A Comparative Study on ATM Security with Multimodal Biometric System
A Comparative Study on ATM Security with Multimodal Biometric System K.Lavanya Assistant Professor in IT L.B.R.College of Engineering, Mylavaram. [email protected] C.Naga Raju Associate Professor
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2
Cardless Cash Access Using Biometric ATM Security System Neenu Preetam. I 1, Harsh Gupta 2 1, 2 M.Tech. (Microelectronics), Department of ECE, SEEC, Manipal University Jaipur (MUJ), Rajasthan, India Abstract:
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
RFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS 1 S.Naveen Kumar, 2 A.Mohammed Arif, 3 S.Naveen Kumar and 4 Mr.S.VijayMurugan,M.E.,(PhD.,), 1,2,3 Student Department of ECE, Adhiyamaan College
Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner
Secure Authentication with 3D Password Vishal Kolhe, Vipul Gunjal, Sayali Kalasakar, Pranjal Rathod Department of Computer Engineering, Amrutvahini Collage of Engineering, Sangamner Abstract Providing
ATM Transaction Using Biometric Fingerprint Technology Mr. Mahesh A. Patil Mr.Sachin P.Wanere Mr.Rupesh P.Maighane Mr.Aashay R.
ATM Transaction Using Biometric Fingerprint Technology Mr. Mahesh A. Patil Mr.Sachin P.Wanere Mr.Rupesh P.Maighane Mr.Aashay R.Tiwari Abstract- The main objective of this system is to develop an system,
Voice Authentication for ATM Security
Voice Authentication for ATM Security Rahul R. Sharma Department of Computer Engineering Fr. CRIT, Vashi Navi Mumbai, India [email protected] Abstract: Voice authentication system captures the
Intelligent Home Automation and Security System
Intelligent Home Automation and Security System Ms. Radhamani N Department of Electronics and communication, VVIET, Mysore, India ABSTRACT: In todays scenario safer home security is required, As the technology
Keywords ATM Terminal, Finger Print Recognition, Biometric Verification, PIN
ATM Terminal Security Using Fingerprint Reconition. Prof. B.Jolad, Tejshree Salunkhe, Rutuja Patil, Puja Shindgi Padmashree Dr. D. Y. Patil Institute Of Engineering and Technology,Pimpri,Pune - 411018
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols
A Reliable ATM Protocol and Comparative Analysis on Various Parameters with Other ATM Protocols Anurag Anand Duvey 1, Dinesh Goyal 2, Dr. Naveen Hemrajani 3 1, 2, 3 Suresh Gyan Vihar University, Jaipur
Design of Highly Secured Automatic Teller Machine System by Using Aadhaar Card and Fingerprint
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 3 Issue 5ǁ May 2014 ǁ PP.22-26 Design of Highly Secured Automatic Teller Machine System by
How To Design A Code Lock System With A Status Display On A Cell Phone And A Password Code On A Smart Phone
ISSN (e): 2250 3005 Vol, 04 Issue, 7 July 2014 International Journal of Computational Engineering Research (IJCER) Enhanced Wireless Security System With Digital code lock using RF &GSM Technology 1 E.Supraja,
Development of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725
Review Paper on Two Factor Authentication Using Mobile Phone (Android) ISSN 2319-9725 Rahul Kale Neha Gore Kavita Nilesh Jadhav Mr. Swapnil Shinde Bachelor s Degree program in Information Technology Engineering
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY
AN EMBEDDED REAL TIME FINGER VEIN RECOGNITION SYSTEM FOR ATM SECURITY SHANMATHY D, SRINIVASAN J ME-CSE, ARUNAI COLLEGE OF ENGINEERING TIRUVANNAMALAI TAMILNADU INDIA Abstract -Nowadays ATMs are used by
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Keywords: GPS, GSM, AVR Microcontroller, SMS.
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A System for Car Accident
An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach
, pp.203-214 http://dx.doi.org/10.14257/ijsia.2015.9.2.19 An Algorithm for Electronic Money Transaction Security (Three Layer Security): A New Approach Md. Syeful Islam Samsung Research Institute Bangladesh
Keywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
Accessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: [email protected] [1], [email protected]
True Identity solution
Identify yourself securely. True Identity solution True Identity authentication and authorization for groundbreaking security across multiple applications including all online transactions Biogy Inc. Copyright
How To Improve Security Of An Atm
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Proposed Security
Raghavendra Reddy D 1, G Kumara Swamy 2
Car Accident Detection, Communication And Tracking Using ARM7 Controller Raghavendra Reddy D 1, G Kumara Swamy 2 1 PG Scholar, Dept of ECE, Malla Reddy Engineering College (Autonomous), Hyderabad, India.
3D PASSWORD. Snehal Kognule Dept. of Comp. Sc., Padmabhushan Vasantdada Patil Pratishthan s College of Engineering, Mumbai University, India
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
An Implementation of Secure Online Voting System
An Implementation of Secure Online Voting System Prof. Anisaara Nadaph 1, Rakhi Bondre 2, Ashmita Katiyar 3, Durgesh Goswami 4, Tushar Naidu 5 1 Pune University, Trinity college of Eng. And res., [email protected]
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS
FINGERPRINT BASED STUDENT ATTENDANCE SYSTEM WITH SMS ALERT TO PARENTS K.Jaikumar 1, M.Santhosh Kumar 2, S.Rajkumar 3, A.Sakthivel 4 1 Asst. Professor-ECE, P. A. College of Engineering and Technology 2
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE
ONLINE HEALTH MONITORING SYSTEM USING ZIGBEE S.Josephine Selvarani ECE Department, Karunya University, Coimbatore. Abstract - An on-line health monitoring of physiological signals of humans such as temperature
Design of Wireless Home automation and security system using PIC Microcontroller
IJCAES ISSN: 2231-4946 Volume III, Special Issue, August 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on National Conference on Information and Communication
SECUDROID - A Secured Authentication in Android Phones Using 3D Password
SECUDROID - A Secured Authentication in Android Phones Using 3D Password Ms. Chandra Prabha K M.E. Ph.D. 1, Mohamed Nowfel 2 E S, Jr., Gowtham V 3, Dhinakaran V 4 1, 2, 3, 4 Department of CSE, K.S.Rangasamy
EaSy: Efficient and Secure System for Utility Service Registration
EaSy: Efficient and Secure System for Utility Service Registration 1 Nor Zaidi Haron, 2 Siti Aisah Md Junos@Yunus, 3 Mohd Sa'ari Mohamad Isa, 4 Azmi Awang Md Isa *1 Universiti Teknikal Malaysia Melaka,
solutions Biometrics integration
Biometrics integration Challenges Demanding access control and identity authentication requirements drive the need for biometrics. Regulations such as Sarbanes-Oxley (SOX), Health Insurance Portability
Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology
Automatic Ration Material Distributions and Payment System Based on GSM and RFID Technology R. Senthil Kumar [1] Assistant professor, Dept. of ECE Jay Shriram Group of Institutions, Tirupur [email protected]
Penetration Testing Biometric System
Penetration Testing Biometric System A Penetration Testers Guide to Finger Print Authentication [FB1H2S aka Rahul Sasi] http://fb1h2s.com http://www.garage4hackers.com Presented @ NullCon International
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
Smart Queue Management System Using GSM Technology
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 941-950 Research India Publications http://www.ripublication.com/aeee.htm Smart Queue Management System Using
Security Issues in ATM Smart Card Technology
International Journal of Mathematics and Computational Science Vol. 1, No. 4, 2015, pp. 199-205 http://www.aiscience.org/journal/ijmcs Security Issues in ATM Smart Card Technology Nor Fazlina Mohd Amin,
Enhanced Cloud Security through KFAC
Enhanced Cloud Security through KFAC Mahesh S Darak, Dr. N. K. Deshmukh Assistant Professor, School of Computational Sciences, S. R. T. M. University, Nanded, Maharashtra, India ABSTRACT: The current era
Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS
Development of Customized Bank Software and Survey on Customized Design Phase Issues on BMS S. Prabu School of Computing Science & Engineering Vellore Institute of Technology Vellore, Tamilnadu, India
WHITE PAPER. Let s do BI (Biometric Identification)
WHITE PAPER Let s do BI (Biometric Identification) Fingerprint authentication makes life easier by doing away with PINs, passwords and hint questions and answers. Since each fingerprint is unique to an
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin S. Khan
International Journal of Scientific & Engineering Research, Volume 5, Issue 7, July-2014 1410 Secured Authentication Using Mobile Phone as Security Token Monalisa P. Kini, Kavita V. Sonawane, Shamsuddin
SMS banking using Cell phone
International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 3 No. 2 June 2013, pp. 463-469 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ SMS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS
KEYSTROKE DYNAMIC BIOMETRIC AUTHENTICATION FOR WEB PORTALS Plurilock Security Solutions Inc. www.plurilock.com [email protected] 2 H IGHLIGHTS: PluriPass is Plurilock static keystroke dynamic biometric
May 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: [email protected] www.bsia.co.uk Form No. 181.
Artificial Neural Network and Location Coordinates based Security in Credit Cards
Artificial Neural Network and Location Coordinates based Security in Credit Cards 1 Hakam Singh, 2 Vandna Thakur Department of Computer Science Career Point University Hamirpur Himachal Pradesh,India Abstract
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm
Wireless Medical History Tracker and Token Generator Using Finger Biometric Technology and Arm Mohit M. Jungare, Prof.V.G.Girhepunje M. Tech Student, Dept of Electronics and Telecommunication, Priyadarshini
Trends in Finger Vein Authentication and Deployment in Europe
Hitachi Review Vol. 64 (2015), No. 5 275 Featured Articles Trends in Finger Vein Authentication and Deployment in Europe Yuji Nakamaru Makiko Oshina Shuichi Murakami Ben Edgington Ravi Ahluwalia OVERVIEW:
Use of biometrics to tackle ATM fraud
2010 International Conference on Business and Economics Research vol.1 (2011) (2011) IACSIT Press, Kuala Lumpur, Malaysia Use of biometrics to tackle ATM fraud Lawan Ahmed Mohammed King Fahd University
Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM)
Automated Biometric Voice-Based Access Control in Automatic Teller Machine (ATM) Yekini N.A. Department of Computer Technology Yaba College of Technology, Lagos Nigeria. Itegboje A.O. PHD Candidate, SMED
DEVELOPMENT OF E-PUBLIC DISTRIBUTION SYSTEM (E-PDS) USING SMART CARD
DEVELOPMENT OF E-PUBLIC DISTRIBUTION SYSTEM (E-PDS) USING SMART CARD Mr. Nishant P. Khot 1, Dr. Mahadev S. Patil 2 1 M.Tech-Electronics, 2 Head of Program, Department of Electronics and Telecommunication
Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Automated Profile Vehicle Using GSM Modem, GPS and Media Processor DM642 Muhammad
Development of Low Cost Private Office Access Control System(OACS)
Development of Low Cost Private Office Access Control System(OACS) Sadeque Reza Khan Prime University, Department of Electrical and Electronic Engineering, Dhaka-1216, Bangladesh [email protected]
International Journal of Software and Web Sciences (IJSWS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International
IDENTITY MANAGEMENT. February 2008. The Government of the Hong Kong Special Administrative Region
IDENTITY MANAGEMENT February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication
Securing e-government Web Portal Access Using Enhanced Two Factor Authentication Ahmed Arara 1, El-Bahlul Emhemed Fgee 2, and Hamdi Ahmed Jaber 3 Abstract This paper suggests an advanced two-factor authentication
How To Build A Gps Vehicle Tracking System On Android App.Com
International Journal of Emerging Engineering Research and Technology Volume 2, Issue 7, October 2014, PP 71-75 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) GPS Vehicle Tracking System Shital Mohol
An Enhanced ATM Security System using Second-Level Authentication
An Enhanced ATM Security System using Second-Level Authentication Muhammad-Bello B.L. Information and Media Technology Department School of Information and Communications Technology Federal University
Development of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
- BIOMETRIC. Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected]
Security & Time Attendance System - BIOMETRIC LiteStar Singapore Pte Ltd LiteStar Singapore Pte Ltd Tel : +65-6286 8300 Website : www.litestar.com.sg [email protected] Biometric Systems Biometrics
An Intelligent Parking Guidance and Information System by using image processing technique
An Intelligent Parking Guidance and Information System by using image processing technique P.DharmaReddy 1, A. RajeshwarRao 2, Dr. Syed Musthak Ahmed 3 M. Tech Student, Embedded Systems, SR Engineering
Design and Implementation of an Accidental Fall Detection System for Elderly
Design and Implementation of an Accidental Fall Detection System for Elderly Enku Yosef Kefyalew 1, Abubakr Rahmtalla Abdalla Mohamed 2 Department of Electronic Engineering, Tianjin University of Technology
Multi-factor authentication
CYBER SECURITY OPERATIONS CENTRE (UPDATED) 201 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Fig. 1 BAN Architecture III. ATMEL BOARD
Volume 2, Issue 9, September 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Fingerprint Based Biometric Attendance System
Fingerprint Based Biometric Attendance System Team Members Vaibhav Shukla Ali Kazmi Amit Waghmare Ravi Ranka Email Id [email protected] [email protected] Contact Numbers 8097031667 9167689265
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester
Leonardo Journal of Sciences ISSN 1583-0233 Issue 20, January-June 2012 p. 31-36 Microcontroller Based Low Cost Portable PC Mouse and Keyboard Tester Ganesh Sunil NHIVEKAR *, and Ravidra Ramchandra MUDHOLKAR
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Original Research Articles
Original Research Articles Researchers Mr.Ramchandra K. Gurav, Prof. Mahesh S. Kumbhar Department of Electronics & Telecommunication, Rajarambapu Institute of Technology, Sakharale, M.S., INDIA Email-
How To Protect An Atm From Fraud
2015 IJSRST Volume 1 Issue 2 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Engineering and Technology Face Recognition as a Biometric Security for Secondary Password for ATM Users. A Comprehensive
Android based Secured Vehicle Key Finder System
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Android based Secured Vehicle Key Finder System Sindhoori S. 1, Dr. N. Sathish Kumar 2 *(M.E. Embedded System Technologies, Sri
A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES
Journal homepage:http://www.journalijar.com INTERNATIONAL JOURNAL OF ADVANCED RESEARCH RESEARCH ARTICLE A MASSIVE VEHICLE THEFT CONTROL SYSTEM USING EMBEDDED AND MOBILE TECHNOLOGIES Pranesh.S 1, Mr. P.
Face Reorganization Method for Cyber Security System in Financial Sector Using FPGA Implementation
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 2, Ver. I (Mar - Apr. 2014), PP 63-67 Face Reorganization Method for Cyber Security
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Secured Employee Attendance Management System Using Fingerprint
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 1, Ver. III (Jan. 2014), PP 32-37 Secured Employee Attendance Management System Using Fingerprint Chiwa,
www.rohos.com Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon
Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon Secure Windows and Mac login by USB key www.rohos.com Rohos Logon Key Secure two-factor
Implementation of Knock Based Security System
Implementation of Knock Based Security System Gunjan Jewani Student, Department of Computer science & Engineering, Nagpur Institute of Technology, Nagpur, India ABSTRACT: Security is one of the most critical
ATM FRAUD AND COUNTER MEASURES
ATM FRAUD AND COUNTER MEASURES GENESIS OF ATMs An automated teller machine was first introduced in 1960 by City Bank of New York on a trial basis. The concept of this machine was for customers to pay utility
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
ARM 7 BASED MULTI LEVEL SECURITY FOR ATM ACCESS USING FINGER PRINT AND GSM TECHNOLOGY
http:// ARM 7 BASED MULTI LEVEL SECURITY FOR ATM ACCESS USING FINGER PRINT AND GSM TECHNOLOGY M.S.Umamaheswari 1, Mr.G.Rama krishan 2 1 M.Tech II Yr (Embedded systems), 2 Professor, Dept of ECE, SVCET,
Real Time Vehicle Theft Identity and Control System Based on ARM 9
Real Time Vehicle Theft Identity and Control System Based on ARM 9 D.Narendar Singh Associate Professor, M.tech,Ph.d Department of Electronics and Communication Engineering Anurag group of Institutions,
W.A.R.N. Passive Biometric ID Card Solution
W.A.R.N. Passive Biometric ID Card Solution Updated November, 2007 Biometric technology has advanced so quickly in the last decade that questions and facts about its cost, use, and accuracy are often confused
Intelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
Secure Data Exchange Solution
Secure Data Exchange Solution I. CONTENTS I. CONTENTS... 1 II. INTRODUCTION... 2 OVERVIEW... 2 COPYRIGHTS AND TRADEMARKS... 2 III. SECURE DOCUMENT EXCHANGE SOLUTIONS... 3 INTRODUCTION... 3 Certificates
