SlideShare a Scribd company logo
1 of 7
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 1 (Mar. - Apr. 2013), PP 01-07
www.iosrjournals.org
www.iosrjournals.org 1 | Page
Credit Card Duplication and Crime Prevention Using Biometrics
Prithika.M#1
, P.Rajalakshmi#2
#
Computer Science and Engineering, R.M.K. Engineering College,Chennai, Tamil Nadu, India.
Abstract: A phenomenal growth in the number of credit card transactions, especially for on-line purchases,
has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to
conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life,
fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques
are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of
identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious
websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become
imperative for all credit card companies in order to minimize their losses.
In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will
help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used
are Palm vein technology, along with iris recognition. It is difficult to crack, because each person’s vein pattern
is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into
applications requiring user authentication. The experimental results show that the detection rate would prove
99.995% compared to traditional methods.
Index Terms - Credit Card Fraud, Iris Recognition, Palm Vein technology.
I. INTRODUCTION
Plastic money is the technology that enables customers to access banking and financial services
through the use of their credit/debit. Since the need for banking has greatly increased over the past few years,
banks and financial institutions allow customers to withdraw, transfer and deposit money using cards. Although
plastic money may offer benefits, there are risks involved. Card transaction like other types of traditional and
online banking systems, is susceptible to security breaches. Accessing financial services through credit/debit
cards may result in sensitive financial data falling into wrong hands. Also other risks include loss of a
customer's cards or theft of valuable PIN information.
Credit card fraud detection [1] has drawn a lot of research interest and a number of techniques, with
special emphasis on data mining. Credit card fraud can be defined as “Unauthorized access of credit card by a
person for his own use. The person using the card does not have any connection with the cardholder or issuer.
Credit card fraud can happen in a variety of ways, from low tech diving to high tech hacking.
To overcome the limitations mentioned above, in this paper we have proposed an idea of using two
techniques of biometric authentication. The palm vein technology is an authentication scheme that scans a
person’s palm and authorizes him based on his vein pattern. The device sends out infrared radiations that pass
deep into the person’s palm and scans his vein pattern.
The second technique that is to be used is digital signature. An algorithm is used to convert the
signature into a dot pattern. This information is encrypted and sent to the bank server along with the customer’s
account number. The bank server also has an encryption algorithm which is identical to encrypt signature to
make a match. This would make the use of credit card well secured. Also the already discussed risk of
possibility of others accessing one’s bank account when his credit card is stolen is eliminated since palm vein
technology is used for authentication of the user who login.
II. EXISTING SYSTEM
A. Personal Identification Number
A personal identification number (PIN, pronounced "pin") is a secret numeric password shared between
a user and a system that can be used to authenticate the user to the system. The user is granted access only when
the number entered matches with the number stored in the system. Hence, despite the name, a PIN does
not personally identify the user. Financial PINs are often four-digit numbers in the range 0000-9999, resulting in
10,000 possible numbers[2]. Many PIN verification systems allow three attempts, thereby giving a card thief a
0.06% probability of guessing the correct PIN before the card is blocked.
The significant disadvantage of using a PIN is that the number can be stolen using skimmers. Using
pre-fabricated geared device perfectly matched to the hardware of Bank ATMs, they will be able to read the
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 2 | Page
magnetic stripe off of victims' cards and even record victims punching in their PINs as shown in figure 1. After
this clones are made from their victims' cards, and are used with the recorded PIN.
Fig 1: Recording the PIN using skimmers
B. Mechanical Imprint
Until the introduction of Chip and PIN, all face-to-face credit or debit card transactions used
a magnetic stripe or mechanical imprint to read and record account data, and a signature for verification. Under
this system, the customer hands their card to the clerk at the point of sale, who either "swipes" the card through
a magnetic reader or makes an imprint from the raised text of the card. In the former case, the account details are
verified and a slip for the customer to sign is printed[3]. In the case of a mechanical imprint, the transaction
details are filled in and the customer signs the imprinted slip. In either case, the clerk verifies that the signature
matches that on the back of the card to authenticate the transaction. This system has proved to be ineffective,
because it has a number of security flaws, including the ability to steal a card in the post, or to learn to forge the
signature on the card. More recently, technology has become available on the black market for both reading and
writing the magnetic stripes, allowing cards to be easily cloned and used without the owner's knowledge.
C. Finger Print Authentication
Fingerprints are one of many techniques used to identify individuals and verify their identify.
Matching algorithms used to compare previously stored templates of fingerprints against candidate fingerprints
for authentication purposes. Pattern based algorithms compare the basic fingerprint patterns (arch, whole, and
loop) between a previously stored template and a candidate fingerprint. The candidate fingerprint image is
graphically compared with the template to determine the degree to which they match. The major disadvantage
here is that Finger print authentication cannot be successful if the user has a band aid on his finger. Another
disadvantage is fingerprint remains the same even if the person is unconscious or dead. This leads to
unauthorized use of a person’s fingerprint without his consent.
III. PROPOSED SYSTEM
To overcome the limitations of the existing authentication systems of the usage of credit cards, we
have proposed a new system of authentication in which authentication is done through two phases. The first
phase is verifying the identity of the user using iris recognition and the second phase is the authentication using
palm vein technology.
The entire process of our proposed PVDS recognition technology is shown in Fig 2.
Fig. 2: Block Diagram IRPV recognition technology
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 3 | Page
Initially the user will be asked to insert his card. The database is checked to verify if such an account exists. If
exists, the user will be authenticated using iris recognition. If the user is authenticated in this phase, he will then
be asked to stretch out his palm for the vein pattern authentication. This is compared with the stored pattern and
if it matches the user is, authenticated. A simple flowchart for the proposed system is shown in Fig 3.
Fig 3: Flowchart for IRPV recognition technology
A. Algorithm for PVDS technique:
Insert card
Checks if it is a valid account
If account exists
Enters iris recognition phase
Converts to data pattern using ICP algorithm
Compares scanned pattern with stored pattern
If patterns match
Show palm for authentication
Converts to data pattern using ICP algorithm
Compares scanned pattern with stored pattern
If patterns match
Transaction Occurs successfully
Else
Mismatch in pattern
Transaction failed
Else
Mismatch in iris pattern
Transaction failed
Else
Account does not exist
B. Iris Recognition :
Users today mostly use textual passwords that follow an encryption algorithm. Mostly textual passwords,
nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 4 | Page
Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast
processors and many tools on the Internet this has become a Child's Play. Therefore we use Biometrics in our
authentication which is more customizable and very interesting way of authentication.
Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high-
resolution images of the iris of an individual's eyes. Iris systems have a very low False Accept Rate (FAR)
compared to other biometric traits; the False Reject Rate (FRR) of these systems can be rather high .Image
processing techniques can be employed to extract the unique iris pattern from a digitized image of the eye, and
encode it into a biometric template, which can be stored in a database. This biometric template contains an
objective mathematical representation of the unique information stored in the iris, and allows comparisons to be
made between templates.
Fig 4: Iris recognition
A typical iris recognition system in involves three
main modules:
Image acquisition
It is to capture a sequence of iris images from the
subject using a specifically designed sensor.
Preprocessing Stage
It includes determining the boundary of the iris within the eye image, and extracts the iris
portion from the image to facilitate its processing. It includes various stages such as:
a. Iris Segmentation
d. Iris Normalization
e. Image Enhancement
Feature extraction and Encoding
This is the most key component of an iris rrecognition system and determines the system’s
performance to a large extent. Iris recognition produces the correct result by extracting features of the
input images and matching these features with known patterns in the feature database.
i. Image acquisition
Image acquisition is considered the most critical step since all subsequent stages depend highly on the
image quality. In order to accomplish this, we set the resolution to 640x480, the type of the image to jpeg, and
the mode to white and black for greater details. Furthermore, we took the eye pictures while trying to maintain
appropriate settings such as lighting and distance to camera.
ii. Segmentation
The main purpose of this process is to locate the iris on the image and isolate it from the rest of the eye
image for further processing. Some other important tasks that are also performed in this iris segmentation block
include image quality enhancement, noise reduction, and emphasis of the ridges of the iris. The image was
filtered using Gaussian filter, which blurs the image and reduces effects due to noise. The iris inner and outer
boundaries are located by finding the edge image using the Canny edge detector, then using the Hough
transform to find the circles in the edge image. For every edge pixel, the points on the circles surrounding it at
different radius are taken, and their weights are increased if they are edge points too, and these weights are
added to the accumulator array. Thus, after all radiuses and edge pixels have been searched, the maximum from
the accumulator array is used to find the center of the circle and its radius according to the equation
Where X, Y are the center of the circle and r is the radius of the circle. The highest two points in the
Hough space correspond to the radius and center coordinates of the circle best defined by the edge points.
iii. Normalization
Once the iris region is segmented, the next stage is to normalize this part, to enable generation of the
"iris code" and their comparisons. Since variations in the eye, like optical size of the iris, position of pupil in the
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 5 | Page
iris, and the iris orientation change person to person, it is required to normalize the iris image so that the
representation is common to all with similar dimensions. Normalization process involves unwrapping the iris
and converting it into its polar equivalent.
Since in most cases the upper and lower parts of the iris area are occluded by eyelid, it was decided to
use only the left and right parts of the iris area for iris recognition. Therefore, the whole iris is not transformed in
the proposed system. Experiments were conducted by normalizing the iris ignoring both upper and lower eyelid
areas. The size of the rectangular block is reduced accordingly. Left and right images each one of size 112×60
are obtained. By applying this approach, detection time of upper and lower eyelids and 64.4% cost of the polar
transformation are saved. Results have shown that information in these portions of iris is subjective for iris
recognition.
iv. Feature extraction
The wavelets to signal and image processing have provided a very flexible tool for engineers to apply
in various fields such as speech and image processing. In an iris recognition system, the 2-D wavelet transform
is only used for preprocessing. The preprocessing helps to reduce the dimensionality of feature vector and to
remove noise. Nevertheless, the computational complexity is comparatively high.
The wavelet filters are used to decompose signals into high and low frequency by convolution. The
wavelet filters are used to decompose signals into high and low frequency by convolution.registered one or to
the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their
crossing points are all compared and, depending on verification, the person is either granted or denied access.
C. Palm Vein Technology:
Users today mostly use textual passwords that follow an encryption algorithm. Mostly textual
passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc.
Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology
change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we use
Biometrics in our authentication which is more customizable and very interesting way of authentication.
The vein matching, [4] also called vascular technology is a technique
of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the
skin. An individual first rests his wrist, on some devices, such that the palm is held centimeters above the
device's scanner, which flashes a near-infrared ray on the palm.
Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood
flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the
scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near-
infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near-
infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of
the palm.
Fig 5: Scanned vein pattern
An individual's palm vein image is converted by Iterative Closest Point algorithms into data points, which is
then compressed, encrypted, and stored by the software and registered along with the other details in his profile
as a reference for future comparison. Iterative Closest Point is an algorithm employed to minimize the difference
between two clouds of points. ICP is often used to reconstruct 2D or 3D surfaces from different scans, to
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 6 | Page
localize robots and achieve optimal path planning (especially when wheel odometry is unreliable due to slippery
terrain), to co-register bone models, etc. The algorithm as depicted in Fig 4 is conceptually simple and is
commonly used in real-time[5]. It iteratively revises the transformation (translation, rotation) needed to
minimize the distance between the points of two raw scans as in Fig 5.
Thus, each time a person logs in attempting to gain access by a palm scan to a particular bank account
or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or
to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their
crossing points are all compared and, depending on verification, the person is either granted or denied access.
Compared with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and
thus contains a wealth of differentiating features for personal identification. The palm is an ideal part of the
body for this technology; it normally does not have hair which can be an obstacle for photographing the blood
vessel pattern, and it is less susceptible to a change in skin color, unlike a finger or the back of a hand. Even if
one has registered as a child, and uses it after a very long period, it still remains the same because the vein
pattern is established in the uterus even before birth.
Palm vein authentication has a high level of authentication due to the uniqueness and the complexity of
the vein pattern. It is better than finger print scanning because a fingerprint remains the same even if the person
is dead. Thus there are a lot of chances for the unauthorized user to hurt or kill the card holder for the finger
print.
Fig 6: General procedure of the ICP algorithm.
Whereas in the case of palm vein technology, killing a person for the authentication is of no use
because the vein pattern changes due to the stop of the flow of oxygenated and deoxygenated blood.
Using the data of 140,000 palms from 70,000 individuals, Fujitsu has confirmed that the system has a
false acceptance rate of less than 0.00008% and a false rejection rate of 0.01%, provided the hand is held over
the device three times during registration, with one retry for comparison during authentication. This data does
not vary even in various situations, including after drinking alcohol, taking a bath, going outside, and waking up
etc.
Fig 7: ATM for convenience stores with downsized palm vein pattern sensor unit
In ATM or credit card transaction, instead of entering the PIN number, we use palm vein technology for a
secure transaction.
IV. CONCLUSION
Traditional banking can be quite tedious. Hence the uses of credit, debit and ATM cards have been
introduced. In this paper, the various techniques of credit card fraud and the traditional method to overcome it
Credit Card Duplication And Crime Prevention Using Biometrics
www.iosrjournals.org 7 | Page
have been discussed. A IRPV recognition technology is being proposed which uses biometrics to completely
eradicate credit card fraud. Two different techniques are discussed which can be used separately or together in
order to completely reduce credit card fraud thus making the system more secure and robust.
V. FUTURE WORK
To enhance the security of the transaction and to reduce the percentage of credit card crime we propose
a future project where a person’s iris is scanned for authentication. The normal blink rate of a human is
assumed and pre entered in the super computer. This blink rate may vary from person to person. Hence a range
of assumed values is saved as the blink rate. When the customer uses a credit card for a transaction, the sensor
captures the blink rate of the person just to check if the card holder is blinking (to check if the cardholder who is
using the card is conscious or not). This can be achieved by using actuators and sensors. The sensor can be used
to check if the customer is blinking
The transaction will be carried if the blink rate is found to be normal, else if the customer doesn’t blink
at all (unconscious and is forcibly made to stay with eyes open) or if his blink rate is abnormal, then it results in
a transaction failure. This way, the transaction is made completely secure.
In total, by using this method, the transaction can in no way be carried without the consent of the card holder.
Thus it becomes 100% secure and credit card fraud and related crimes can be minimized greatly.
REFERENCES
[1] Benson Edwin Raj, S.; Portia, A.A.; , "Analysis on credit card fraud detection methods," Computer, Communication and Electrical
Technology (ICCCET), 2011 International Conference on , vol., no., pp.152-156, 18-19 March 2011
[2] Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike; , "Chip and PIN is Broken," Security and Privacy (SP), 2010 IEEE
Symposium on , vol., no., pp.433-446, 16-19 May 2010
[3] Nasir, M.H.N.; Hamid, S.; Hassan, H.; , "Thread-Level Parallelism & Shared-Memory Pool Techniques for Authorization of Credit
Card System," Communications and Information Technologies, 2008. ISCIT 2008. International Symposium on , vol., no., pp.447-
452, 21-23 Oct. 2008
[4] Xiangqian Wu; Enying Gao; Youbao Tang; Kuanquan Wang; , "A Novel Biometric System Based on Hand Vein," Frontier of
Computer Science and Technology (FCST), 2010 Fifth International Conference on , vol., no., pp.522-526, 18-22 Aug. 2010
[5] Shitu Luo; Yanling Wang; Yin Liu; Xiaopin Hu; , "Research on geomagnetic-matching technology based on improved ICP
algorithm," Information and Automation, 2008. ICIA 2008. International Conference on , vol., no., pp.815-819, 20-23 June 2008
[6] Nguyen, M.H.; Ho, D.N.; Luu, D.H.; Moldovyan, A.A.; Moldovyan, N.A.; , "On functionality extension of the digital signature
standards," Advanced Technologies for Communications (ATC), 2011 International Conference on , vol., no., pp.6-9, 2-4 Aug. 2011
[7] Zuguang Xuan; Zhenjun Du; Rong Chen; , "Comparison Research on Digital Signature Algorithms in Mobile Web
Services," Management and Service Science, 2009. MASS '09. International Conference on , vol., no., pp.1-4, 20-22 Sept. 2009
doi: 10.1109/ICMSS.2009.
[8] “Statistics for General and On-Line Card Fraud,” http://www.epaynews.com/statistics/fraud.html , Mar. 2007.
[9] S. Ghosh and D.L. Reilly, “Credit Card Fraud Detection with a Neural-Network,” Proc. 27th Hawaii Int’l Conf. System Sciences:
Information Systems: Decision Support and Knowledge-Based Systems,vol. 3, pp. 621-630, 1994.
[10] M. Syeda, Y.Q. Zhang, and Y. Pan, “Parallel Granular Networks for Fast Credit Card Fraud Detection,” Proc. IEEE Int’l Conf.
Fuzzy Systems, pp. 572-577, 2002.
[11] Organism Information Visualization Technology Editing Committee Edition: Organism Information Visualization Technology. (in
Japanese), Corona Publication Co., Ltd., p.235 (1997).
[12] The Federation of Bankers Associations of Japan: Statistics from the Questionnaire on the Number of Withdrawals and the Amount
of Money Withdrawn Using Stolen Passbooks. http://www.zenginkyo.or.jp/en/news/index.html
[13] “Palm Vein Authentication Technology” white paper, Bioguard, Innovative Biometric Solutions, March, 2007.
[14] Yuhang Ding, Dayan Zhuang and Kejun Wang, “A Study of Hand Vein Recognition Method”, The IEEE International Conference on
Mechatronics & Automation Niagara Falls, Canada, July 2005.
[15] [10] Shi Zhao, Yiding Wang and Yunhong Wang, “Extracting Hand Vein Patterns from Low-Quality Images: A New Biometric
Technique Using Low-Cost Devices”, Fourth International Conference on Image and Graphics, 2007.
[16] H. Proença, and A. Alexandre, "Towards noncooperative iris recognition: A classification approach using multiple signatures". IEEE
Trans. vol. 29, pp. 607-612, 2007
[17] Masaki Watanabe, Toshio Endoh,Morito Shiohara, and Shigeru Sasaki,” Palm vein authentication technology and its applications”,
The Biometric Consortium Conference, September 19-21, 2005,USA, pp1-2.
[18] Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel, ”Biometric Authentication Using Fast Correlation of Near Infrared Hand
Vein Patterns”, International Journal of Biological and Medical Sciences, vol 2,No.1,winter 2007, pp. 141-148.
[19] K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, “Image understanding for iris biometrics: A survey,” Computer Vision and Image
Understanding, vol. 110, no. 2, pp. 281–307, 2008.
[20] J. Daugman, “Probing the Uniqueness and Randomness of Iris Codes:Results from 200 Billion Iris Pair Comparisons,” Proceedings
of the IEEE, vol. 94, no. 11, 2006.
[21] E. M. Newton, P. J. Phillips, “Meta-Analysis of Third-Party Evaluations of Iris Recognition,” IEEE Transactions on Systems, Man,
and Cybernetics, vol. 39, no. 1, pp. 4–11, 2009.
[22] J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Robust Face Recognition via Sparse Representation,” IEEE Transactions
on Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 210–227, 2009.
[23] H. Proenca and L. A. Alexandre, “Iris segmentation methodology for
non-cooperative recognition,” In IEEE Proceedings on Vision, Image and Signal Processing, vol. 153, pages 199-205, 2006.

More Related Content

What's hot

Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)spy007s
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...IJECEIAES
 
nonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainnonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainBilcareltd
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesIRJET Journal
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONPankaj Rane
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPijtsrd
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET Journal
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...IRJET Journal
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric SolutionTanvir Ahmed
 
Fingerpay
FingerpayFingerpay
FingerpayAnand B
 

What's hot (20)

Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
Ict project (1)
Ict project (1)Ict project (1)
Ict project (1)
 
Research Article
Research ArticleResearch Article
Research Article
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...Fingereye: improvising security and optimizing ATM transaction time based on ...
Fingereye: improvising security and optimizing ATM transaction time based on ...
 
nonClonableID™ for the Banking Domain
nonClonableID™ for the Banking DomainnonClonableID™ for the Banking Domain
nonClonableID™ for the Banking Domain
 
A Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM servicesA Survey: Fusion of Fingerprint and Iris for ATM services
A Survey: Fusion of Fingerprint and Iris for ATM services
 
Payment Tokenization
Payment TokenizationPayment Tokenization
Payment Tokenization
 
E banking security
E banking securityE banking security
E banking security
 
Atm theft
Atm theftAtm theft
Atm theft
 
Secure Online Banking
Secure Online BankingSecure Online Banking
Secure Online Banking
 
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATIONCASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
CASE STUDY ON PKI & BIOMETRIC BASED APPLICATION
 
E Authentication System with QR Code and OTP
E Authentication System with QR Code and OTPE Authentication System with QR Code and OTP
E Authentication System with QR Code and OTP
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
Multimodal Biometric endorsement for secure Internet banking using Skin Spect...
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Enterprise Biometric Solution
Enterprise Biometric SolutionEnterprise Biometric Solution
Enterprise Biometric Solution
 
Fingerpay
FingerpayFingerpay
Fingerpay
 

Viewers also liked

Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Thomas Gottron
 
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...Anastasia Lanina
 
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMDESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMIOSR Journals
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...IOSR Journals
 
Media pitch
Media pitchMedia pitch
Media pitchHMonan
 
Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?believe52
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2lucaminetti
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speakerinvestnewwest
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitIOSR Journals
 

Viewers also liked (20)

Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data Perplexity of Index Models over Evolving Linked Data
Perplexity of Index Models over Evolving Linked Data
 
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...
Презентация Ямпольского РРЦГ "Результаты работы ІІ Фазы Проекта МРГ в Ямпольс...
 
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEMDESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
DESIGN OF A MODE DECOUPLING FOR VOLTAGE CONTROL OF WIND-DRIVEN IG SYSTEM
 
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
Design Test-bed for assessing load utilising using Multicast Forwarding Appro...
 
I0315257
I0315257I0315257
I0315257
 
E0561719
E0561719E0561719
E0561719
 
C0611219
C0611219C0611219
C0611219
 
J0564651
J0564651J0564651
J0564651
 
K0216571
K0216571K0216571
K0216571
 
Media pitch
Media pitchMedia pitch
Media pitch
 
Ostorozhno doroga
Ostorozhno dorogaOstorozhno doroga
Ostorozhno doroga
 
Q6
Q6Q6
Q6
 
Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?Are you interested in increasing your Google PageRank?
Are you interested in increasing your Google PageRank?
 
C0552124
C0552124C0552124
C0552124
 
Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2Presentazione city sound 2012msagimp2
Presentazione city sound 2012msagimp2
 
Shakira 4 1
Shakira 4 1Shakira 4 1
Shakira 4 1
 
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel SpeakerThe NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
The NEW New West Economic Forum: Dr. Scott McAlpine, Panel Speaker
 
Transport1
Transport1Transport1
Transport1
 
Compromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploitCompromising windows 8 with metasploit’s exploit
Compromising windows 8 with metasploit’s exploit
 
Reimagine
ReimagineReimagine
Reimagine
 

Similar to Credit Card Duplication and Crime Prevention Using Biometrics

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfVLink Inc
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...ijtsrd
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmIRJET Journal
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_applicationBilcareltd
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...IRJET Journal
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyIJMER
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionIOSR Journals
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Hai Nguyen
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniquesijsrd.com
 
Biometric technology
Biometric technologyBiometric technology
Biometric technologyDharmik
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALASaikiran Panjala
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersCognizant
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...Eswar Publications
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSIRJET Journal
 

Similar to Credit Card Duplication and Crime Prevention Using Biometrics (20)

The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
How AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdfHow AI is impacting digital identity security.pdf
How AI is impacting digital identity security.pdf
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
Credit Cards Frauds and Cybersecurity Threats Machine Learning Detection Algo...
 
Credit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning AlgorithmCredit Card Fraud Detection System Using Machine Learning Algorithm
Credit Card Fraud Detection System Using Machine Learning Algorithm
 
Info 01 16_4_banking_application
Info 01 16_4_banking_applicationInfo 01 16_4_banking_application
Info 01 16_4_banking_application
 
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
A Comparative Study on Online Transaction Fraud Detection by using Machine Le...
 
Credit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A SurveyCredit Card Fraud Detection System: A Survey
Credit Card Fraud Detection System: A Survey
 
J017216164
J017216164J017216164
J017216164
 
Analysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud DetectionAnalysis of Spending Pattern on Credit Card Fraud Detection
Analysis of Spending Pattern on Credit Card Fraud Detection
 
Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462Ijcsi 9-4-2-457-462
Ijcsi 9-4-2-457-462
 
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining TechniquesSurvey on Credit Card Fraud Detection Using Different Data Mining Techniques
Survey on Credit Card Fraud Detection Using Different Data Mining Techniques
 
Biometric technology
Biometric technologyBiometric technology
Biometric technology
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of FraudstersSecure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
Secure Payments: How Card Issuers and Merchants Can Stay Ahead of Fraudsters
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
An Enhanced Automated Teller Machine Security Prototype using Fingerprint Bio...
 
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONSFRAUD DETECTION IN CREDIT CARD TRANSACTIONS
FRAUD DETECTION IN CREDIT CARD TRANSACTIONS
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxnuruddin69
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfsmsksolar
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...Health
 

Recently uploaded (20)

Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Rums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdfRums floating Omkareshwar FSPV IM_16112021.pdf
Rums floating Omkareshwar FSPV IM_16112021.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
+97470301568>> buy weed in qatar,buy thc oil qatar,buy weed and vape oil in d...
 

Credit Card Duplication and Crime Prevention Using Biometrics

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 1 (Mar. - Apr. 2013), PP 01-07 www.iosrjournals.org www.iosrjournals.org 1 | Page Credit Card Duplication and Crime Prevention Using Biometrics Prithika.M#1 , P.Rajalakshmi#2 # Computer Science and Engineering, R.M.K. Engineering College,Chennai, Tamil Nadu, India. Abstract: A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses. In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used are Palm vein technology, along with iris recognition. It is difficult to crack, because each person’s vein pattern is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. The experimental results show that the detection rate would prove 99.995% compared to traditional methods. Index Terms - Credit Card Fraud, Iris Recognition, Palm Vein technology. I. INTRODUCTION Plastic money is the technology that enables customers to access banking and financial services through the use of their credit/debit. Since the need for banking has greatly increased over the past few years, banks and financial institutions allow customers to withdraw, transfer and deposit money using cards. Although plastic money may offer benefits, there are risks involved. Card transaction like other types of traditional and online banking systems, is susceptible to security breaches. Accessing financial services through credit/debit cards may result in sensitive financial data falling into wrong hands. Also other risks include loss of a customer's cards or theft of valuable PIN information. Credit card fraud detection [1] has drawn a lot of research interest and a number of techniques, with special emphasis on data mining. Credit card fraud can be defined as “Unauthorized access of credit card by a person for his own use. The person using the card does not have any connection with the cardholder or issuer. Credit card fraud can happen in a variety of ways, from low tech diving to high tech hacking. To overcome the limitations mentioned above, in this paper we have proposed an idea of using two techniques of biometric authentication. The palm vein technology is an authentication scheme that scans a person’s palm and authorizes him based on his vein pattern. The device sends out infrared radiations that pass deep into the person’s palm and scans his vein pattern. The second technique that is to be used is digital signature. An algorithm is used to convert the signature into a dot pattern. This information is encrypted and sent to the bank server along with the customer’s account number. The bank server also has an encryption algorithm which is identical to encrypt signature to make a match. This would make the use of credit card well secured. Also the already discussed risk of possibility of others accessing one’s bank account when his credit card is stolen is eliminated since palm vein technology is used for authentication of the user who login. II. EXISTING SYSTEM A. Personal Identification Number A personal identification number (PIN, pronounced "pin") is a secret numeric password shared between a user and a system that can be used to authenticate the user to the system. The user is granted access only when the number entered matches with the number stored in the system. Hence, despite the name, a PIN does not personally identify the user. Financial PINs are often four-digit numbers in the range 0000-9999, resulting in 10,000 possible numbers[2]. Many PIN verification systems allow three attempts, thereby giving a card thief a 0.06% probability of guessing the correct PIN before the card is blocked. The significant disadvantage of using a PIN is that the number can be stolen using skimmers. Using pre-fabricated geared device perfectly matched to the hardware of Bank ATMs, they will be able to read the
  • 2. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 2 | Page magnetic stripe off of victims' cards and even record victims punching in their PINs as shown in figure 1. After this clones are made from their victims' cards, and are used with the recorded PIN. Fig 1: Recording the PIN using skimmers B. Mechanical Imprint Until the introduction of Chip and PIN, all face-to-face credit or debit card transactions used a magnetic stripe or mechanical imprint to read and record account data, and a signature for verification. Under this system, the customer hands their card to the clerk at the point of sale, who either "swipes" the card through a magnetic reader or makes an imprint from the raised text of the card. In the former case, the account details are verified and a slip for the customer to sign is printed[3]. In the case of a mechanical imprint, the transaction details are filled in and the customer signs the imprinted slip. In either case, the clerk verifies that the signature matches that on the back of the card to authenticate the transaction. This system has proved to be ineffective, because it has a number of security flaws, including the ability to steal a card in the post, or to learn to forge the signature on the card. More recently, technology has become available on the black market for both reading and writing the magnetic stripes, allowing cards to be easily cloned and used without the owner's knowledge. C. Finger Print Authentication Fingerprints are one of many techniques used to identify individuals and verify their identify. Matching algorithms used to compare previously stored templates of fingerprints against candidate fingerprints for authentication purposes. Pattern based algorithms compare the basic fingerprint patterns (arch, whole, and loop) between a previously stored template and a candidate fingerprint. The candidate fingerprint image is graphically compared with the template to determine the degree to which they match. The major disadvantage here is that Finger print authentication cannot be successful if the user has a band aid on his finger. Another disadvantage is fingerprint remains the same even if the person is unconscious or dead. This leads to unauthorized use of a person’s fingerprint without his consent. III. PROPOSED SYSTEM To overcome the limitations of the existing authentication systems of the usage of credit cards, we have proposed a new system of authentication in which authentication is done through two phases. The first phase is verifying the identity of the user using iris recognition and the second phase is the authentication using palm vein technology. The entire process of our proposed PVDS recognition technology is shown in Fig 2. Fig. 2: Block Diagram IRPV recognition technology
  • 3. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 3 | Page Initially the user will be asked to insert his card. The database is checked to verify if such an account exists. If exists, the user will be authenticated using iris recognition. If the user is authenticated in this phase, he will then be asked to stretch out his palm for the vein pattern authentication. This is compared with the stored pattern and if it matches the user is, authenticated. A simple flowchart for the proposed system is shown in Fig 3. Fig 3: Flowchart for IRPV recognition technology A. Algorithm for PVDS technique: Insert card Checks if it is a valid account If account exists Enters iris recognition phase Converts to data pattern using ICP algorithm Compares scanned pattern with stored pattern If patterns match Show palm for authentication Converts to data pattern using ICP algorithm Compares scanned pattern with stored pattern If patterns match Transaction Occurs successfully Else Mismatch in pattern Transaction failed Else Mismatch in iris pattern Transaction failed Else Account does not exist B. Iris Recognition : Users today mostly use textual passwords that follow an encryption algorithm. Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back
  • 4. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 4 | Page Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we use Biometrics in our authentication which is more customizable and very interesting way of authentication. Iris recognition is a method of biometric authentication that uses pattern recognition techniques based on high- resolution images of the iris of an individual's eyes. Iris systems have a very low False Accept Rate (FAR) compared to other biometric traits; the False Reject Rate (FRR) of these systems can be rather high .Image processing techniques can be employed to extract the unique iris pattern from a digitized image of the eye, and encode it into a biometric template, which can be stored in a database. This biometric template contains an objective mathematical representation of the unique information stored in the iris, and allows comparisons to be made between templates. Fig 4: Iris recognition A typical iris recognition system in involves three main modules: Image acquisition It is to capture a sequence of iris images from the subject using a specifically designed sensor. Preprocessing Stage It includes determining the boundary of the iris within the eye image, and extracts the iris portion from the image to facilitate its processing. It includes various stages such as: a. Iris Segmentation d. Iris Normalization e. Image Enhancement Feature extraction and Encoding This is the most key component of an iris rrecognition system and determines the system’s performance to a large extent. Iris recognition produces the correct result by extracting features of the input images and matching these features with known patterns in the feature database. i. Image acquisition Image acquisition is considered the most critical step since all subsequent stages depend highly on the image quality. In order to accomplish this, we set the resolution to 640x480, the type of the image to jpeg, and the mode to white and black for greater details. Furthermore, we took the eye pictures while trying to maintain appropriate settings such as lighting and distance to camera. ii. Segmentation The main purpose of this process is to locate the iris on the image and isolate it from the rest of the eye image for further processing. Some other important tasks that are also performed in this iris segmentation block include image quality enhancement, noise reduction, and emphasis of the ridges of the iris. The image was filtered using Gaussian filter, which blurs the image and reduces effects due to noise. The iris inner and outer boundaries are located by finding the edge image using the Canny edge detector, then using the Hough transform to find the circles in the edge image. For every edge pixel, the points on the circles surrounding it at different radius are taken, and their weights are increased if they are edge points too, and these weights are added to the accumulator array. Thus, after all radiuses and edge pixels have been searched, the maximum from the accumulator array is used to find the center of the circle and its radius according to the equation Where X, Y are the center of the circle and r is the radius of the circle. The highest two points in the Hough space correspond to the radius and center coordinates of the circle best defined by the edge points. iii. Normalization Once the iris region is segmented, the next stage is to normalize this part, to enable generation of the "iris code" and their comparisons. Since variations in the eye, like optical size of the iris, position of pupil in the
  • 5. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 5 | Page iris, and the iris orientation change person to person, it is required to normalize the iris image so that the representation is common to all with similar dimensions. Normalization process involves unwrapping the iris and converting it into its polar equivalent. Since in most cases the upper and lower parts of the iris area are occluded by eyelid, it was decided to use only the left and right parts of the iris area for iris recognition. Therefore, the whole iris is not transformed in the proposed system. Experiments were conducted by normalizing the iris ignoring both upper and lower eyelid areas. The size of the rectangular block is reduced accordingly. Left and right images each one of size 112×60 are obtained. By applying this approach, detection time of upper and lower eyelids and 64.4% cost of the polar transformation are saved. Results have shown that information in these portions of iris is subjective for iris recognition. iv. Feature extraction The wavelets to signal and image processing have provided a very flexible tool for engineers to apply in various fields such as speech and image processing. In an iris recognition system, the 2-D wavelet transform is only used for preprocessing. The preprocessing helps to reduce the dimensionality of feature vector and to remove noise. Nevertheless, the computational complexity is comparatively high. The wavelet filters are used to decompose signals into high and low frequency by convolution. The wavelet filters are used to decompose signals into high and low frequency by convolution.registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access. C. Palm Vein Technology: Users today mostly use textual passwords that follow an encryption algorithm. Mostly textual passwords, nowadays, are kept very simple say a word from the dictionary or their pet names, girlfriends etc. Years back Klein performed such tests and he could crack 10-15 passwords per day. Now with the technology change, fast processors and many tools on the Internet this has become a Child's Play. Therefore we use Biometrics in our authentication which is more customizable and very interesting way of authentication. The vein matching, [4] also called vascular technology is a technique of biometric identification through the analysis of the patterns of blood vessels visible from the surface of the skin. An individual first rests his wrist, on some devices, such that the palm is held centimeters above the device's scanner, which flashes a near-infrared ray on the palm. Unlike the skin, through which near-infrared light passes, deoxygenated hemoglobin in the blood flowing through the veins absorbs near-infrared rays, illuminating the hemoglobin, causing it to be visible to the scanner. Arteries and capillaries, whose blood contains oxygenated hemoglobin, which does not absorb near- infrared light, are invisible to the sensor. The still image captured by the camera, which photographs in the near- infrared range, appears as a black network, reflecting the palm's vein pattern against the lighter background of the palm. Fig 5: Scanned vein pattern An individual's palm vein image is converted by Iterative Closest Point algorithms into data points, which is then compressed, encrypted, and stored by the software and registered along with the other details in his profile as a reference for future comparison. Iterative Closest Point is an algorithm employed to minimize the difference between two clouds of points. ICP is often used to reconstruct 2D or 3D surfaces from different scans, to
  • 6. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 6 | Page localize robots and achieve optimal path planning (especially when wheel odometry is unreliable due to slippery terrain), to co-register bone models, etc. The algorithm as depicted in Fig 4 is conceptually simple and is commonly used in real-time[5]. It iteratively revises the transformation (translation, rotation) needed to minimize the distance between the points of two raw scans as in Fig 5. Thus, each time a person logs in attempting to gain access by a palm scan to a particular bank account or secured entryway, etc., the newly captured image is likewise processed and compared to the registered one or to the bank of stored files for verification, all in a period of seconds. Numbers and positions of veins and their crossing points are all compared and, depending on verification, the person is either granted or denied access. Compared with a finger or the back of a hand, a palm has a broader and more complicated vascular pattern and thus contains a wealth of differentiating features for personal identification. The palm is an ideal part of the body for this technology; it normally does not have hair which can be an obstacle for photographing the blood vessel pattern, and it is less susceptible to a change in skin color, unlike a finger or the back of a hand. Even if one has registered as a child, and uses it after a very long period, it still remains the same because the vein pattern is established in the uterus even before birth. Palm vein authentication has a high level of authentication due to the uniqueness and the complexity of the vein pattern. It is better than finger print scanning because a fingerprint remains the same even if the person is dead. Thus there are a lot of chances for the unauthorized user to hurt or kill the card holder for the finger print. Fig 6: General procedure of the ICP algorithm. Whereas in the case of palm vein technology, killing a person for the authentication is of no use because the vein pattern changes due to the stop of the flow of oxygenated and deoxygenated blood. Using the data of 140,000 palms from 70,000 individuals, Fujitsu has confirmed that the system has a false acceptance rate of less than 0.00008% and a false rejection rate of 0.01%, provided the hand is held over the device three times during registration, with one retry for comparison during authentication. This data does not vary even in various situations, including after drinking alcohol, taking a bath, going outside, and waking up etc. Fig 7: ATM for convenience stores with downsized palm vein pattern sensor unit In ATM or credit card transaction, instead of entering the PIN number, we use palm vein technology for a secure transaction. IV. CONCLUSION Traditional banking can be quite tedious. Hence the uses of credit, debit and ATM cards have been introduced. In this paper, the various techniques of credit card fraud and the traditional method to overcome it
  • 7. Credit Card Duplication And Crime Prevention Using Biometrics www.iosrjournals.org 7 | Page have been discussed. A IRPV recognition technology is being proposed which uses biometrics to completely eradicate credit card fraud. Two different techniques are discussed which can be used separately or together in order to completely reduce credit card fraud thus making the system more secure and robust. V. FUTURE WORK To enhance the security of the transaction and to reduce the percentage of credit card crime we propose a future project where a person’s iris is scanned for authentication. The normal blink rate of a human is assumed and pre entered in the super computer. This blink rate may vary from person to person. Hence a range of assumed values is saved as the blink rate. When the customer uses a credit card for a transaction, the sensor captures the blink rate of the person just to check if the card holder is blinking (to check if the cardholder who is using the card is conscious or not). This can be achieved by using actuators and sensors. The sensor can be used to check if the customer is blinking The transaction will be carried if the blink rate is found to be normal, else if the customer doesn’t blink at all (unconscious and is forcibly made to stay with eyes open) or if his blink rate is abnormal, then it results in a transaction failure. This way, the transaction is made completely secure. In total, by using this method, the transaction can in no way be carried without the consent of the card holder. Thus it becomes 100% secure and credit card fraud and related crimes can be minimized greatly. REFERENCES [1] Benson Edwin Raj, S.; Portia, A.A.; , "Analysis on credit card fraud detection methods," Computer, Communication and Electrical Technology (ICCCET), 2011 International Conference on , vol., no., pp.152-156, 18-19 March 2011 [2] Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike; , "Chip and PIN is Broken," Security and Privacy (SP), 2010 IEEE Symposium on , vol., no., pp.433-446, 16-19 May 2010 [3] Nasir, M.H.N.; Hamid, S.; Hassan, H.; , "Thread-Level Parallelism & Shared-Memory Pool Techniques for Authorization of Credit Card System," Communications and Information Technologies, 2008. ISCIT 2008. International Symposium on , vol., no., pp.447- 452, 21-23 Oct. 2008 [4] Xiangqian Wu; Enying Gao; Youbao Tang; Kuanquan Wang; , "A Novel Biometric System Based on Hand Vein," Frontier of Computer Science and Technology (FCST), 2010 Fifth International Conference on , vol., no., pp.522-526, 18-22 Aug. 2010 [5] Shitu Luo; Yanling Wang; Yin Liu; Xiaopin Hu; , "Research on geomagnetic-matching technology based on improved ICP algorithm," Information and Automation, 2008. ICIA 2008. International Conference on , vol., no., pp.815-819, 20-23 June 2008 [6] Nguyen, M.H.; Ho, D.N.; Luu, D.H.; Moldovyan, A.A.; Moldovyan, N.A.; , "On functionality extension of the digital signature standards," Advanced Technologies for Communications (ATC), 2011 International Conference on , vol., no., pp.6-9, 2-4 Aug. 2011 [7] Zuguang Xuan; Zhenjun Du; Rong Chen; , "Comparison Research on Digital Signature Algorithms in Mobile Web Services," Management and Service Science, 2009. MASS '09. International Conference on , vol., no., pp.1-4, 20-22 Sept. 2009 doi: 10.1109/ICMSS.2009. [8] “Statistics for General and On-Line Card Fraud,” http://www.epaynews.com/statistics/fraud.html , Mar. 2007. [9] S. Ghosh and D.L. Reilly, “Credit Card Fraud Detection with a Neural-Network,” Proc. 27th Hawaii Int’l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems,vol. 3, pp. 621-630, 1994. [10] M. Syeda, Y.Q. Zhang, and Y. Pan, “Parallel Granular Networks for Fast Credit Card Fraud Detection,” Proc. IEEE Int’l Conf. Fuzzy Systems, pp. 572-577, 2002. [11] Organism Information Visualization Technology Editing Committee Edition: Organism Information Visualization Technology. (in Japanese), Corona Publication Co., Ltd., p.235 (1997). [12] The Federation of Bankers Associations of Japan: Statistics from the Questionnaire on the Number of Withdrawals and the Amount of Money Withdrawn Using Stolen Passbooks. http://www.zenginkyo.or.jp/en/news/index.html [13] “Palm Vein Authentication Technology” white paper, Bioguard, Innovative Biometric Solutions, March, 2007. [14] Yuhang Ding, Dayan Zhuang and Kejun Wang, “A Study of Hand Vein Recognition Method”, The IEEE International Conference on Mechatronics & Automation Niagara Falls, Canada, July 2005. [15] [10] Shi Zhao, Yiding Wang and Yunhong Wang, “Extracting Hand Vein Patterns from Low-Quality Images: A New Biometric Technique Using Low-Cost Devices”, Fourth International Conference on Image and Graphics, 2007. [16] H. Proença, and A. Alexandre, "Towards noncooperative iris recognition: A classification approach using multiple signatures". IEEE Trans. vol. 29, pp. 607-612, 2007 [17] Masaki Watanabe, Toshio Endoh,Morito Shiohara, and Shigeru Sasaki,” Palm vein authentication technology and its applications”, The Biometric Consortium Conference, September 19-21, 2005,USA, pp1-2. [18] Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel, ”Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns”, International Journal of Biological and Medical Sciences, vol 2,No.1,winter 2007, pp. 141-148. [19] K. W. Bowyer, K. Hollingsworth, and P. J. Flynn, “Image understanding for iris biometrics: A survey,” Computer Vision and Image Understanding, vol. 110, no. 2, pp. 281–307, 2008. [20] J. Daugman, “Probing the Uniqueness and Randomness of Iris Codes:Results from 200 Billion Iris Pair Comparisons,” Proceedings of the IEEE, vol. 94, no. 11, 2006. [21] E. M. Newton, P. J. Phillips, “Meta-Analysis of Third-Party Evaluations of Iris Recognition,” IEEE Transactions on Systems, Man, and Cybernetics, vol. 39, no. 1, pp. 4–11, 2009. [22] J. Wright, A. Y. Yang, A. Ganesh, S. S. Sastry, and Y. Ma, “Robust Face Recognition via Sparse Representation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 2, pp. 210–227, 2009. [23] H. Proenca and L. A. Alexandre, “Iris segmentation methodology for non-cooperative recognition,” In IEEE Proceedings on Vision, Image and Signal Processing, vol. 153, pages 199-205, 2006.