Credit Card Duplication and Crime Prevention Using Biometrics
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 1
Abstract
A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses.In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used are Palm vein technology, along with iris recognition. It is difficult to crack, because each person’s vein pattern is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. The experimental results show that the detection rate would prove 99.995% compared to traditional methods.
Authors and Affiliations
Prithika M
The impact of using Gregorian calendar dates in systems that adapt localization: In the case of Ethiopia
Ethiopian calendar has 13 months in which 12 months have 30 days equal and the 13th month has 5 or 6 days length. Date is one of the inputs for web or desktop applications. Java Development Kit(JDK) and JodaTime Date Tim...
Review of Various Text Categorization Methods
Abstract : Measuring the similarity between documents is an important operation in the text processing field.Text categorization (also known as text classification, or topic spotting) is the task of automatically s...
Enhancement of Bag-of-Words for Legal documents using Legal Statute
Abstract: In this paper Legal statute related to dowry acts has been processed to obtain a distinct set of legal keywords which don’t have a common occurrence in day to day dowry case judgments. This effort coupled with...
Implementation of AES Algorithm in MicroController Using PIC18F452
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encr...
Implementing Automatic Callback Using Session Initiation Protocol
TheSession Initiation Protocol (SIP), is an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. SIP is developed by SIP working gr...