Credit Card Duplication and Crime Prevention Using Biometrics
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 10, Issue 1
Abstract
A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses.In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used are Palm vein technology, along with iris recognition. It is difficult to crack, because each person’s vein pattern is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. The experimental results show that the detection rate would prove 99.995% compared to traditional methods.
Authors and Affiliations
Prithika M
Core Based Group Communication with Qos Support
The present day is demanding more and more quality of service in broadband group communication to support huge access of internet service and multimedia application. The core based solution is able to full fill &...
Cloud Computing Networks with Poisson Arrival Process-Dynamic Resource Allocation
Abstract: In this article we considered a cloud computing network model which acts as a tool for dynamic resource allocation problem in cloud computing. Every successful servicing of cloud paradigm need an optima...
Energy using optimization in wireless sensor networks using the hybrid algorithm
Abstract: Energy limitation is one the most important issues in wireless sensor networks design. Data integration and their multi-step and hierarchical transition is an effective method for reducing energy consumption a...
Graphical Password Strength in Cloud Computing
Abstract: In a Network we have various issues to work with our services & data (maintenances) & today Cloud computing provides convenient on-demand network access to a shared pool of configurable enumerate resour...
An SPRT Procedure for an Ungrouped Data using MMLE Approach
Sequential Analysis of statistical science could be adopted in order to decide up on the reliable/unreliable of the developed software very quickly. Sequential analysis is different from classical hypothesis te...