Securing ATM Using Graphical Password Authentication Scheme
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 3
Abstract
In our day to day life ATMs are widely used and have brought so much relief to the financial world. Various problems were solved with the advent of these machines ranging from keeping the banking hall free of traffic with its attendant issues. But crime at ATMs has become a nationwide issue that faces not only customers, but also for bankers and this financial crime case rises repeatedly in recent years. To handle this issue, one solution can be the use of graphical password to overcome the problem of textual password. In this paper, we present and evaluate our contribution, i.e., the iChess password. The iChess password is a multifactor authentication scheme. We present an iChess Chess board virtual environment where the user navigates and interacts with various objects. The series of actions and interactions toward the objects inside the iChess environment constructs the user’s iChess password. The design of the iChess virtual environment and the type of objects selected determine the iChess password key space. Further for more security we are providing a random four digit number (flash code) on the respective users mobile which is new for every login.
Authors and Affiliations
Sonia Rathi , Raunak Chitnis , Ramakant Yadav , Mr s . M. V. Bhosle
Comparative Study of Sleep Mode Interleaving and Energy Efficiency Substream Allocation Algorithm
This paper deals with algorithms which provides solutions to energy saving. Energy saving is affected by the frequency allocation of bandwidth mechanisms. This problem is solved by two methods. First one is novel sleep-m...
Risk Management a t Universities Illegal Residents in Hostels & Fire Cases
Every organization/institution is exposed to some kinds of risks that can affect them in many ways. Risks like fire, theft, damage of assets, illegal intruders etc. can affect them strategically, financially and operatio...
A Study on Big Data Integration with Data Warehouse
The amount of data in world is exploding. Data is being collected and stored at unprecedented rates. The challenge is not only to store and manage the vast volume of data, but also to analyze and extract meaningful value...
Performance Estimation of 2*3 MIMO-MC-CDMA using Convolution Code
In this paper we estimate the performance of 2*3 MIMO-MC-CDMA system using convolution code in MATLAB which highly reduces BER by increasing the efficiency of system. MIMO and MC-CDMA system combination is used to reduce...
Meticulous Tasks of Various Cryptographic Techniques in Secure Communications
Our main intention of writing this paper is to provide a understandable knowledge about cryptographic techniques. This paper deals with various Message Authentication Codes, Hash functions and encryption techniques and p...