AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS
Journal Title: International Journal on Computer Science and Engineering - Year 2015, Vol 7, Issue 4
Abstract
One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks made on the 4-digit pin (Personal Identification Number)which is being used as a password for authentication in ATM.The attacks such as shoulder surfing and recording attacksare becoming more common in ATM. The PIN number is not given proper security to overcome such attacks.The proposed method uses the pin entry methods which are resistant to such attacks.The pin entry methods that used in the proposed system are black white method, improved black white method and session key method. The main aim of the proposed system is to create an android application which performs the ATM transactions that can be installed in a smart phone. The concept of virtual money is also used. The hash function is used to send the PIN securely through the public channels.
Authors and Affiliations
KAVITHA V , Dr. G. UMARANI SRIKANTH
Applying moving boundary to compute the alluvium transport and testing the results by remote sensing
To compute the alluvium transport, we use a current model based on a 2D finite-difference grid and a sediment transport model. The first one gives the velocity distribution on the surface of water body and in the case of...
Web Log Clustering Approaches – A Survey
As more organization rely on the Internet and the World Wide Web to conduct business, the proposed strategies and techniques for market analysis need to be revisited in this context. We therefore present a survey of the...
Augmentation of Block Truncation Coding based Image Retrieval by using Even and Odd Images with Sundry Colour Spaces
The augmentation to block truncation coding (BTC) based image retrieval techniques using Even and Odd images with ten different colour spaces is the theme of work given in the paper. Here the original image is reflected...
Query Optimization on Compressed and Decompressed Object-Oriented Database Using Operators
In this paper, we present an approach using various database operators that permits to enrich technique of query ptimization existing in the objectoriented databases and the comparative analysis of query optimization of...
Analysis QoS Parameters for MANETs Routing Protocols
A Mobile Ad-Hoc Network (MANET) is a decentralized network of autonomous mobile nodes able to communicate with each other over wireless links. We selected three routing protocols DSDV, DSR and AODV for measuring QoS par...