Securing ATM Using Graphical Password Authentication Scheme
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 8, Issue 3
Abstract
In our day to day life ATMs are widely used and have brought so much relief to the financial world. Various problems were solved with the advent of these machines ranging from keeping the banking hall free of traffic with its attendant issues. But crime at ATMs has become a nationwide issue that faces not only customers, but also for bankers and this financial crime case rises repeatedly in recent years. To handle this issue, one solution can be the use of graphical password to overcome the problem of textual password. In this paper, we present and evaluate our contribution, i.e., the iChess password. The iChess password is a multifactor authentication scheme. We present an iChess Chess board virtual environment where the user navigates and interacts with various objects. The series of actions and interactions toward the objects inside the iChess environment constructs the user’s iChess password. The design of the iChess virtual environment and the type of objects selected determine the iChess password key space. Further for more security we are providing a random four digit number (flash code) on the respective users mobile which is new for every login.
Authors and Affiliations
Sonia Rathi , Raunak Chitnis , Ramakant Yadav , Mr s . M. V. Bhosle
M-Privacy Preserving Synergetic for Data Publishing
In this paper, our focus is on the study of Data mining is the extraction of interesting patterns or knowledge from huge amount of data. In recent years, with the explosivedevelopment in Internet, data storage and data...
Implementation of Integrating Sound Signature with Graphical Password System
Graphical password with supportive sound signature technology is to increase memorization of password. In this paper we are going to propose a system to recall the password that consists of sequence of some images in whi...
Distributed Observer Design for Leader following Control of Multi-Agent System with Pinning Technique
This paper is concerned with a leader–follower problem for a multi-agent system designed by the pinning control technique without assuming that the interaction graph is connected. Distributed observers are designed for t...
Efficient Data Gathering and Improving Network Lifetime in Wireless Sensor Networks
In large-scale wireless sensor networks the data-gathering mechanism to introducing mobility into the network. . We consider the location service in a WSN, where each sensor needs to maintain its location information by...
High Throughput and Less Area AMP Architecture for Audio Signal Restoration
Audio restoration is effectively achieved by using low complexity algorithm called AMP. This algorithm has fast convergence and has lower computation intensity making it suitable for audio recovery problems. This paper f...