Three Factor Authentication using Webcam for securing Online Transaction
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2014, Vol 14, Issue 2
Abstract
There are a continuously growing number of customers who use Online Transaction facility due to its convenience. But the security and privacy of Information may be one of the biggest concerns to the users. In face of the current security issues and the growing number of attacks and consequent frauds, new systems should be designed as to provide better authentication and identification methods. A generic and secure framework is proposed to upgrade two-factor authentication to three-factor authentication. A well designed three-factor authentication protocol authentication system can greatly improve the information assurance at low cost. In three-factor authentication, in addition to furnishing their regular password and an OTP, users will be asked to provide biometric information would irrefutably prove their identity. This fingerprint biometric information can be captured by using low cost sensors such as Web Cam. In this paper, we investigate new technique to suitably process camera images of fingertips in order to produce image which are as similar as possible to the ones coming from dedicated sensors. The proposed technique encompasses a segmentation, enhancement and matching of the fingertip image for the person's identifiaction.
Authors and Affiliations
Vaishali Hirlekar
EFFECT OF NON-IMAGE FEATURES ON RECOGNITION OF HANDWRITTEN ALPHA-NUMERIC CHARACTERS
Handwritten character recognition has applications in several industries such as Banking for reading of cheques and Libraries/ National archives for digital searchable storage of historic texts. The main feature typicall...
An Analysis of the PROMISE and ISBSG Software Engineering Data Repositories
There exist two ongoing large repositories of software projects in the software engineering community: the repository of the International Software Benchmarking Standards Group (ISBSG) and the Repository referred to as P...
Performance Analysis of Random Forests with SVM and KNN in Classification of Ancient Kannada Scripts
Ancient inscriptions which reveal the details of yester years are difficult to interpret by modern readers and efforts are being made in automating such tasks of deciphering historical records. The Kannada script which i...
AN APPROACH TO GENERATE MST WITHOUT CHECKING CYCLE
Abstract: A minimum spanning tree of an undirected graph can be easily obtained using classical algorithms by Prim or Kruskal. MST generation is a NP hard problem. Now this paper represents an algorithm to find minimum s...
A Review of Feature Reduction in Intrusion Detection System Based on Artificial Immune System and Neural Network
Feature reduction plays an important role in intrusion detection system. The large amount of feature in network as well as host data effect the performance of intrusion detection method. Various authors are research prop...