Credit Card Fraud Detection Using Hidden Markov Model, Dempster–Shafer Theory and Bayesian Learning a Better Approach to Credit Fraud Detection
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 5
Abstract
Internet banking is a very common means of payments these days. It allows the users to instantly pay their dues but at the same time it also has some disadvantages; like online payment uses the credentials of the credit card holder to make the payment but if these details get leaked, then the funds can be misused by the hacker. Therefore we propose a credit card fraud detection system using a Dempster-Shafer adder and Bayesian learning and Hidden Markov Model. If an Incoming credit card transaction is not accepted by the trained DBM with sufficiently high probability, it is considered to be fraudulent. At the same time, we try to ensure that genuine transactions are not rejected. The developed system is simpler to implement and requires no training, when compared to the complex techniques like SVM and neural networks. The proposed algorithm is capable of updating the user’s withdrawal behavior in real time. The development of such a system will not increase the faith of people in online transactions but at the same time will also encourage several small businesses and merchants to run their businesses online to earn better profits’.
Authors and Affiliations
Montek Singh, Ashraf Zakee
slugAn Enhanced Video Watermarking Approach for Robustness And Security Using Pixel And Transform Domain in An Uncompressed Video
It has been observed that many numbers of researches has been done in field of digital video watermarking using transformation technique. Digital media protection and security is major concern in today’s world because o...
Trip Attraction Models for Shopping Malls: A Case Study
Trip attraction is an important parameter in planning of transportation facilities. It aims at forecasting total number of trips generated or attracted towards zones of study area. It is important for the traffic engine...
Prevention of DOS and Black Hole Attack in AODV
Mobile Ad Hoc Network (MANET) is a self-configuring, gathering of wireless devices and infrastructure-less network technology used to create a wireless network without wire using mobile nodes. In MANET all devices are f...
Optimal Side Lobes Reduction of Linear Array Antenna Using Crow Search Algorithm
The aim of this paper is to introduce the novel metaheuristic crow search Optimization algorithm (CSA) to the electromagnetic and antenna community. Crow search algorithm is a population based method, mimicking the inte...
Alerting About the Rise in Water Level and Controlling Motor Through Wireless Network
Floods occurred due to torrential rain hit and global environmental changes such as melting of snow in cold region, all these factors makes water crosses its usual flow then flooding take place, people leaving near the...