SlideShare a Scribd company logo
1 of 9
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3 (Mar. - Apr. 2013), PP 51-59
www.iosrjournals.org
www.iosrjournals.org 51 | Page
Secure Authentication for Mobile Banking Using Facial
Recognition
Falaye Adeyinka Adesuyi1
, Osho Oluwafemi2
,
Alabi Isiaq Oludare3
, Adama Ndako Victor4
and Amanambu Victor Rick5
1
Department of Mathematics and Statistics, Federal University of Technology, Minna, Niger State, Nigeria
2
Department of Cyber Security Science, Federal University of Technology, Minna, Niger State, Nigeria
3
Department of Information and Media Technology, Federal University of Technology, Minna, Niger State,
Nigeria
4
Directorate for Collaboration, Affliation and Linkages, Federal University of Technology, Minna, Niger State,
Nigeria
5
Department of Mathematics and Statistics, Federal University of Technology, Minna, Niger State, Nigeria
ABSTRACT: THE CURRENT SYSTEM OF MOBILE BANKING IN NIGERIA CONSISTS OF TWO WAY AUTHENTICATION
(USERNAME AND PASSWORD) WHICH CAN BE FORGOTTEN OR STOLEN. THIS PAPER PROPOSES A SECURE
AUTHENTICATION FOR MOBILE BANKING USING FACIAL RECOGNITION TO THE EFFECT OF IMPROVING ON THE EXISTING
SYSTEM, AND THEREBY SUPPORTING THE ACTUALIZATION OF CASHLESS SOCIETY. AN OVERVIEW AND LIMITATIONS OF
THE CURRENT SYSTEM ARE PRESENTED. THE HIGH LEVEL DESIGNS OF THE PROPOSED SYSTEM ARE THEN PRESENTED.
THE SYSTEM IS THEN SIMULATED USING JAVA PROGRAMMING LANGUAGE AND TESTED USING SIMULATED DATABASES OF
NIGERIA COMMUNICATION COMMISSIONS (NCC) AND THE FACILITATING BANK. THE SYSTEM WAS FOUND TO PERFORM
WITH A MAXIMUM RESPONSE TIME OF SEVEN MINUTES, AND FALSE ACCEPTANCE RATE (FAR) OF 3%. COMBINING THIS
SYSTEM WITH ONE OR MORE OTHER FORMS OF BIOMETRIC TECHNOLOGIES SUCH AS FINGER VEIN, IRIS AMONG OTHERS
WILL NO DOUBT GIVE A FRAUD PROOF PLATFORM FOR MOBILE PHONE BANKING.
KEYWORDS: MOBILE BANKING, SECURITY, AUTHENTICATION, CASHLESS SOCIETY
I. INTRODUCTION
In the past decades, banking was done inside the banking hall which was tasking to both the customers
and the bankers. The long queues, paper-based data and even the time taken to perform even the smallest
transaction can be an uphill task. This has now been a thing of the past since the advent of the internet and
mobile phones. The Nigerian system of banking has evolved and following the trend as obtainable in the
western world. The number of online banking users has increased in Nigeria and indeed the world; this has led
to many experts in mobile banking software and mobile phone technology to research new and convenient
methods for customers to perform banking transactions remotely via their mobile phones. Mobile banking is
also known as mobile phone bank. It is referred to as the using mobile phone for banking related business [1]. It
offers convenience for customers to perform transactions. Its utilization is expected to increase as the cashless
society gets more hold in Nigeria vis-à-vis the fact that number of mobile phones users is also increasing. At the
moment Nigerian banks like GTB and Access bank provide mobile banking through SMS (Short Messaging
Service) using the WIG (Wireless Internet Gateway) and the WAP (Wireless Application Protocol) over GPRS
(General Packet Radio Service).
Security has become a primary concern in order to provide protected mobile transaction between the
clients and the bank servers. Secure authentication of client information depends on some fundamental security
approaches which will not jeopardize the client sensitive information. This has led to different researches
ranging from single-factor authentication, two-way authentication, and multifactor authentication. Bearing in
mind the cost of providing these services to clients, most banks are weary of balancing profit making and
security. In Nigeria today, most mobile banking applications use the single-factor authentication which consist
of the username and password.
Mobile authentication can be the glue that binds together online banking, mobile banking and mobile
payments in a way that couples security with convenience [2]. The single-factor authentication is prone to
attacks, in cases of theft or perceived trusted third parties, the security can be breached with ease. Password
hackers can easily break the security since most passwords are weak. Some customers using the online banking
system in Nigeria have experienced unauthorized access to their banking information and, in some cases,
unauthorized withdrawal from their accounts. Secure mobile banking will build confidence in customers
knowing that their information is secure and they can carry out secure transactions without fear of man-in-the-
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 52 | Page
middle attacks. Though the issue of theft strongly depends on how a client protects his/her mobile phone device
from third parties.
The future of Nigerian banking is mobile, due to the availability of mobile phones to remote customers
in the villages, towns and places where banks or ATMs are not in close reach for customers. The proposed
cashless society in Nigeria will propel this future as fast as possible for Nigeria to be recognized among world
players in financial and technological innovations. Based on the facts above, we have tried to improve on the
present security levels on mobile phone banking in Nigeria.
II. Literature Review
2.1. Mobile Banking
Mobile Banking simply involves performing banking transactions via a mobile device. Advancement in
mobile technology, over time, has dictated the nature of transactions that can be performed. Beginning from
services delivered only through SMS [3], today high-level transactions, including third-party transfer, bill
payment, to mention but two, can be conveniently performed from the comfort of a phone.
According to [4], there are three main methods employable for performing transactions and accessing
other banking services via a mobile phone. These include the Short Message Service (SMS), mobile web, and
mobile client application. Summarized below is the performance level of each technology, considering some
basic properties.
Table 1. Comparision Between Different Types Of Mobile Banking Architectures Table.
Types Ubiquity Ease of UI Affordabilty Security Rich App
SMS
Mobile Web
Mobile Client App
Strong
Moderate
Poor
Strong
Moderate
Good
Strong
Moderate
Moderate
Weak
Moderate
Strong
Poor
Weak
Strong
2.2. Authentication
It simply connotes the verification of a user’s identity, before access is granted. It is an access control
mechanism that often precedes authorization, and its implementation is based on one or a combination of three
factors: what you have (these includes debit card, smart card), what you know (these include passwords,
usernames or pin numbers), and what you are (these requires biometric such as retina, fingerprints, facial
recognition etc) [5].
2.3. Biometrics
Biometric technology is a means of automatically authenticating a person by traits, that is, based on
what the person is. This includes fingerprints, hand geometry, signature, retina, iris, voice, thermal imaging etc
[6]. Usually, a person’s biometric data is acquired. The values of some defined parameters of the acquired data
are then compared with those previously acquired and domiciled in the database [7].
The characteristics used in grading different biometrics are: universality, uniqueness, permanence,
collectability, performance, acceptance and circumvention. For instance, considering one of the available
biometrics, face, we have the assessment below [8].
Table 2. Grading one of the available biometrics, face.
Biomet
rics
Universali
ty
Uniquenes
s
Permanen
ce
Collectabil
ity
Performanc
e
Acceptenc
e
Circumve
ntion
Face High Low Medium High Low High Low
III. Statement Of The Problem
Nigeria has over 120 million mobile subscribers [9]. It can be expected that a percentage of this
population, considering the government penchant for a cashless society, would embrace the mobile banking
option. From a survey carried out by [10], 20% of respondents revealed they employ mobile banking platform.
Though, the level of mobile banking adoption in the country is still relatively young, many of the banks
currently provide mobile banking platforms for customers [10]. From observations, the platforms provided by
these banks require only username and password to gain access.
Considering the fact that no system is perfect, mobile banking, like every other type of banking like
ATM, credit card, mobile money, despite its immense benefits, is also not immune to security challenges. Yet,
there is need for the available platforms to effectively control application and data access [11], hence the need
for multi-factor level of authentication. This is necessary to encourage customers to embrace mobile banking.
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 53 | Page
According to Nigeria Deposit Insurance Commission (NDIC) report on electronic and related frauds
for the quarter end of 2008 the incidence of frauds in banks maintained an upward surge. A typical example is
the bank-wide increase in cases of ATM fraud. This is in spite of efforts by interswitch and member banks to
raise awareness [12].
In 2008, the Economic and Financial Crimes Commission reports ranked Nigeria as the third among
top ten source of electronic related fraud in the world. A society like Nigeria would be engulfed by electronic
fraud if the system is not checked. These cases and statistics mentioned above have prompt the need to develop
a secured mobile banking platform. This is also in line with the Central Bank’s drive for a cashless society.
IV. Overview Of The Current System
The analysis of the current system will help determine the feasibility of the system. Since the advent of
mobile banking in Nigeria, the major goal of software designers has been to make mobile banking more secure
for end users. Achieving this goal however, has been met with many challenges.
For instance, Access Bank, one of the leading banks in the country, uses only the popular username and
password level of security (2-way authentication) which poses a level of security that cannot stand the test of
time. The features provided by the platform allow for account operations, like fund transfer, checking of
balance, bill payments. Also, it provides functionality for account administration. With such features, a security
level higher than the 2-way authentication is needed to provide optimum security to curb scam/theft on users’
account.
4.1. Problem Identification of the Current System
i. 2-Way Authentication consists of Username and password only.
ii. Poor level of security.
iii. It is easy for hackers to breach into the account.
iv. It is possible for hackers to clone the SIM card.
v. When SIM card is cloned, the bank server will assume the hacker as the authentic user.
vi. Prone to unauthorized access by perceived third parties.
vii. In case of theft, mobile phone can be hacked into, whilst the bank server would allow access into the
account assuming the hacker to be the authentic user.
V. OVERVIEW OF THE PROPOSED SYSTEM
The proposed system is expected to provide higher level of authentication (multifactor authentication)
which will bring unauthorized access to the barest minimum. Before access will be granted, the user will have to
take a facial photograph to have access to his/her account, the geometry of the face, distance of the eyes and the
nose is compared. This photograph will be compared with the photograph in the bank server and the NCC server
for verification, if it passes the verification, access will be granted, otherwise it will denied. In the event of
unauthorized access, a security alert message will be sent to the bank.
5.1. Advantages of the Proposed System
i. High security level.
ii. Facial recognition of user.
iii. Verification is compared within the NCC and bank server.
iv. Theft message alert is sent to the bank server.
v. It guarantees physical location of the user.
vi. The biometric trait is unforgettable.
vii. The biometric trait cannot be lost.
viii. The biometric trait cannot be shared.
ix. It can provide emergency identification
x. It prevents identity theft.
VI. SYSTEM COMPONENTS
6.1. New Account Creation
New users using the application for the first time can create a new account by filling out a form that
includes his/her name, sex, occupation, address, passport photograph, phone number, secret question and
answer. These details will be used when a new session is started.
6.2. New Session
A session starts when a customer logs in his/her username and password and takes a facial photograph.
If it matches the corresponding image in the NCC and bank databases, the customer is then allowed to proceed
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 54 | Page
to select a transaction he/she wishes to perform from the menu of possible transactions in each case. A session is
aborted when invalid entries exceed five trials. An intruder alert message will be sent to security operatives.
6.3. Transaction
Before any transaction is started, every level of authentication must be obliged. At this level,
transaction is securely carried out either in form of fund transfer, bill payment, to mention but two.
6.4. Database Design
MySQL was used as the database because it is relational, cost effective, quick and powerful as well as
compatible.
VII. System Architecture Design
7.1. Entity Relationship Diagram
Figure 1. UML diagram of proposed system
7.2. Class Diagram
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 55 | Page
Figure 2. Class diagram of proposed systems
7.3. Database Transaction Sequence
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 56 | Page
Figure 3. Database transaction sequence of proposed system
7.4. Process/Procedure Design:
Figure 4. Flowchart of implementation procedure
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 57 | Page
VIII. System Implementation
Test case #1
Use Case: Create mobile Account
Background: Non-existing User want to fill form
Event Sequence:
1. Click Create account and submit.
2. Login as existing user.
Test case #2
Use Case : Take photograph
Background : User wants to take a photograph to authenticate genuine account holder.
Event Sequence:
1. Click on take photograph.
2. Hold phone to capture face.
Test case #3
Use Case : Perform transaction
Background : User wants to access bank account.
Event Sequence:
1. Click on transaction you want to perform.
Test case #4
Use Case : Disconnect to server
Background : User wants to close the session.
Event Sequence:
1. Click on logout option in menu
In this way we tested using different test cases that found lot of errors which were corrected by recoding of that
related procedures..
IX. Result And Discussion
On the program end, the security is multi-factored. A username and password level, a facial recognition
level and a secret question and answer level. Users are limited to five trials after which access is denied. Two
dependable databases are also used to authenticate genuine users; these databases are the NCC database and the
issuing bank database. In an advent of facial defection, users are advised to see their bank information
technology operators. The response time for a complete transaction is seven minutes maximum putting other
limiting factors into consideration; the false acceptance rate is 3%.the implication of false acceptance rate is
given by elements on image background and facial defects. The advantages of this system include;
i. Secure and transaction
ii. Cost effective
iii. Transaction can be done anywhere remotely (with availability of mobile network)
Figure 5. Login interface
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 58 | Page
Figure 6. Facial capture/recognition interface
Figure 7. Snapshot of a verified user
Figure 8. New user registration interface
Secure Authentication For Mobile Banking Using Facial Recognition
www.iosrjournals.org 59 | Page
X. Conclusion
In a bid to make the Nigerian economy cashless, attention should be focused on security. When the
security is trusted, it will build customer satisfaction and discourage the use of cash. The number of mobile
phone users increases by the day and the success of the security on mobile banking will encourage new users to
adopt the trend. Introducing this level of authentication using facial recognition on users’ account to authenticate
from the Nigeria Communication Commission’s database and the facilitating bank’s database, will no doubt
contribute to mitigate mobile banking fraud.
REFERENCES
[1] Sun, Z. W. (2009). Design And Implementation Of Mobile Payment Based On Multi-Interface Of Mobile Terminal. Zhejiang.
[2] Nagel, B. (2007). Mobile Authentication Marries Security With Covenience.
[3] http://en.wikipedia.org/wiki/Mobile_banking.
[4] Punithavathi, R. and Duraiswamy, K. (2011). Secure Authenticated Mobile Agent Based Mobile Banking System. European Journal
of Scientific Research. ISSN 1450-216X Vol.57 No.3 (2011), pp.494-501.
[5] Krutz, R. L. and Vines, R. D. (2003). The CISSP Prep Guide: Gold Edition. Wiley Publishing, Inc., Indianapolis, Indiana.
[6] Capoor. (2006). Electronic Banking Journal.
[7] Gafurov, D., Helkala, K., and Sondrol, T. (2006). Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers,
Vol. 1, No. 7, Oct./Nov. 2006, pp. 51-59.
[8] Povocnicu, A. (2009). Biometric Security for Cell Phones. Informatica Economica, vol. 13, no. 1/2009, pp 57-63.
[9] www2.ncc.gov.ng
[10] The Impact of Mobile Services in Nigeria. Pyramid Research, March 2010.
[11] Mobile Banking Overview (NA). Mobile Banking Association, January 2009.
[12] Komolafe, B., Agwuegbo, A., and Adegunlehin, T. (2009). Nigeria: Banks’ Customers Agonise as ATM Fraud Persist. Available on:
http://allafrica.com/stories/200911300313.html.
Authors
Falaye Adeyinka Adesuyi
Lecturer, Department of Mathematics/Statistics, Federal University of
Technology Minna
Falaye holds B.Tech (Mathematics/Computer Sc.) and M.Sc. (Computer Sc.). He is
a member of National mathematical Society (NMS) as well as Nigeria Computer
Society(NCS). His areas of interest are risk and security in Network Systems,
mobile and internet banking.
OSHO OLUWAFEMI holds an M.Tech in Mathematics. Formerly a banker,
where he headed the IT department, he presently lectures in the Department of
Cyber Security Science, Federal University of Technology, Minna, Nigeria. His
research interests include information security, data mining/machine learning, and
software development.
ALABI, ISIAQ OLUDARE is an industry-experienced IT professional and an academic. He
obtained his Bachelor’s degree at the University of Ibadan and Master in Information
Technology at Ladoke Akintola University of Technology, Ogbomoso, both in Nigeria.
Currently, he is teaching Database and Data mining in the department of Information and
Media technology, School of Information and Communication Technology (SICT) at Federal
University of Technology, Minna, Nigeria.
Adama Ndako Victor
System Analyst, Directorate for Coolaboratiion Affiliations and Linkages,
Federal University of Technology Minna.
Victor holds B.Tech (Mathematics/Computer Sc.) and is presently a System Analyst
at the Directorate for Collaboration Affiliations and Linkages FUT Minna. His areas
of interest are Software Engineering and Artificial Intelligence.
AMANAMBU VICTOR RICK has a B.Tech in Mathematics/Computer Science from the Department of
Mathematics, Federal University of Technology, Minna, Nigeria

More Related Content

What's hot

IRJET- Review Paper on – Smart Wallet
IRJET-  	  Review Paper on – Smart WalletIRJET-  	  Review Paper on – Smart Wallet
IRJET- Review Paper on – Smart WalletIRJET Journal
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometricijtsrd
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking sathyananda prabhu
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGvishal dineshkumar soni
 
Dynamic in indian banking
Dynamic in indian bankingDynamic in indian banking
Dynamic in indian bankingbhatimani
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET Journal
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transactionIJARIIT
 
3213ijist01
3213ijist013213ijist01
3213ijist01jh1234jh
 
E banking & security
E banking & securityE banking & security
E banking & securitySumeer Sharma
 
management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online bankingRanjeet Patel
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...Alexander Decker
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-bankingAlexander Decker
 

What's hot (19)

Ijetr042177
Ijetr042177Ijetr042177
Ijetr042177
 
IRJET- Review Paper on – Smart Wallet
IRJET-  	  Review Paper on – Smart WalletIRJET-  	  Review Paper on – Smart Wallet
IRJET- Review Paper on – Smart Wallet
 
Pay-Cloak:Biometric
Pay-Cloak:BiometricPay-Cloak:Biometric
Pay-Cloak:Biometric
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKINGROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
ROLE OF ARTIFICIAL INTELLIGENCE IN COMBATING CYBER THREATS IN BANKING
 
Dynamic in indian banking
Dynamic in indian bankingDynamic in indian banking
Dynamic in indian banking
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
Bio metrics in secure e transaction
Bio metrics in secure e transactionBio metrics in secure e transaction
Bio metrics in secure e transaction
 
21595
2159521595
21595
 
Research Article
Research ArticleResearch Article
Research Article
 
3213ijist01
3213ijist013213ijist01
3213ijist01
 
E banking & security
E banking & securityE banking & security
E banking & security
 
E banking & security concern
E banking & security concernE banking & security concern
E banking & security concern
 
management issues in online banking
management issues in online bankingmanagement issues in online banking
management issues in online banking
 
An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...An evaluation of the efficacy of information technology on the performance of...
An evaluation of the efficacy of information technology on the performance of...
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking
 
Litrature reviews
Litrature reviews Litrature reviews
Litrature reviews
 
E banking and M-banking
E banking and M-bankingE banking and M-banking
E banking and M-banking
 

Viewers also liked

Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...IOSR Journals
 
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...IOSR Journals
 
A Test presentation for slide share
A Test presentation for slide shareA Test presentation for slide share
A Test presentation for slide shareMichael Espinoza
 
A Design of Framework for AGRI-CLOUD
A Design of Framework for AGRI-CLOUDA Design of Framework for AGRI-CLOUD
A Design of Framework for AGRI-CLOUDIOSR Journals
 
царскосельский лицей а.с.пушкина
царскосельский лицей а.с.пушкинацарскосельский лицей а.с.пушкина
царскосельский лицей а.с.пушкинаNatalya Dyrda
 
Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Natalya Dyrda
 
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...IOSR Journals
 
Static Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachStatic Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachIOSR Journals
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...IOSR Journals
 
Low ict competencies in language teaching
Low ict competencies in language teachingLow ict competencies in language teaching
Low ict competencies in language teachingblueseaqnu
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.combelieve52
 

Viewers also liked (20)

Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
 
A0960104
A0960104A0960104
A0960104
 
Q7
Q7Q7
Q7
 
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...
Performance Appraisal and Ranking of DCCBs through Malmquist Index and Super-...
 
A Test presentation for slide share
A Test presentation for slide shareA Test presentation for slide share
A Test presentation for slide share
 
B0150711
B0150711B0150711
B0150711
 
H0154448
H0154448H0154448
H0154448
 
D0551821
D0551821D0551821
D0551821
 
A Design of Framework for AGRI-CLOUD
A Design of Framework for AGRI-CLOUDA Design of Framework for AGRI-CLOUD
A Design of Framework for AGRI-CLOUD
 
F0513644
F0513644F0513644
F0513644
 
A0350104
A0350104A0350104
A0350104
 
H0413437
H0413437H0413437
H0413437
 
Jeopardy
JeopardyJeopardy
Jeopardy
 
царскосельский лицей а.с.пушкина
царскосельский лицей а.с.пушкинацарскосельский лицей а.с.пушкина
царскосельский лицей а.с.пушкина
 
Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"Поэма А.С. Пушкина "Руслан и Людмила"
Поэма А.С. Пушкина "Руслан и Людмила"
 
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...
Incidence of Methicillin-Resistant Staphylococcus aureus (MRSA) In a Small Po...
 
Static Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic ApproachStatic Slicing Technique with Algorithmic Approach
Static Slicing Technique with Algorithmic Approach
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
Low ict competencies in language teaching
Low ict competencies in language teachingLow ict competencies in language teaching
Low ict competencies in language teaching
 
Tracking your emails with mailtracking.com
Tracking your emails with mailtracking.comTracking your emails with mailtracking.com
Tracking your emails with mailtracking.com
 

Similar to Secure Authentication for Mobile Banking Using Facial Recognition

A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...IJNSA Journal
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...IJNSA Journal
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemIJCSIS Research Publications
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemIJCSIS Research Publications
 
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGYSYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGYPARAMASIVANCHELLIAH
 
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ PerspectiveIRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ PerspectiveIRJET Journal
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in indiasilky712
 
Mobile banking
Mobile bankingMobile banking
Mobile bankingNalini K
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsManzurul Hassan Zumman
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
 
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesImplementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesIOSR Journals
 
Blueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBlueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBenjamin Wyrick
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...IOSR Journals
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?VISTA InfoSec
 
Study on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechStudy on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechIRJET Journal
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusWaqas Tariq
 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingCSCJournals
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...ijistjournal
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 

Similar to Secure Authentication for Mobile Banking Using Facial Recognition (20)

A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
A NEED FOR PEER-TO-PEER STRONG LOCAL AUTHENTICATION PROTOCOL (P2PSLAP) IN MOB...
 
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
A need for peer to-peer strong local authentication protocol (p2 pslap) in mo...
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking System
 
A Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking SystemA Cancelable Biometric Based Security Protocol for Online Banking System
A Cancelable Biometric Based Security Protocol for Online Banking System
 
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGYSYSTEMATIC LITERATURE REVIEW ON BANKING  INNOVATION THROUGH TECHNOLOGY
SYSTEMATIC LITERATURE REVIEW ON BANKING INNOVATION THROUGH TECHNOLOGY
 
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ PerspectiveIRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
IRJET- Issues & Challenges in Mobile Banking in Pune: A Customers’ Perspective
 
A study of mobile banking in india
A study of mobile banking in indiaA study of mobile banking in india
A study of mobile banking in india
 
Mobile banking
Mobile bankingMobile banking
Mobile banking
 
Four ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometricsFour ways to secure banking transaction by biometrics
Four ways to secure banking transaction by biometrics
 
Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...Conceptual model of internet banking adoption with perceived risk and trust f...
Conceptual model of internet banking adoption with perceived risk and trust f...
 
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and ChallengesImplementation of Mobile Banking in Bangladesh: Opportunities and Challenges
Implementation of Mobile Banking in Bangladesh: Opportunities and Challenges
 
Blueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-WhitepaperBlueprint-for-SecuringMobileBankingApplications-Whitepaper
Blueprint-for-SecuringMobileBankingApplications-Whitepaper
 
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
Study of Online Banking Security Mechanism in India: Take ICICI Bank as an Ex...
 
Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?Are Mobile Banking Apps Safe?
Are Mobile Banking Apps Safe?
 
Study on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of FintechStudy on The Impact And Social Implications of Fintech
Study on The Impact And Social Implications of Fintech
 
Customer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in MauritiusCustomer Adoption of Internet Banking in Mauritius
Customer Adoption of Internet Banking in Mauritius
 
The Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-BankingThe Impact of Customer Knowledge on the Security of E-Banking
The Impact of Customer Knowledge on the Security of E-Banking
 
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
DOI : 10.5121/ijist.2013.3201 1 CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN N...
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

Secure Authentication for Mobile Banking Using Facial Recognition

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 10, Issue 3 (Mar. - Apr. 2013), PP 51-59 www.iosrjournals.org www.iosrjournals.org 51 | Page Secure Authentication for Mobile Banking Using Facial Recognition Falaye Adeyinka Adesuyi1 , Osho Oluwafemi2 , Alabi Isiaq Oludare3 , Adama Ndako Victor4 and Amanambu Victor Rick5 1 Department of Mathematics and Statistics, Federal University of Technology, Minna, Niger State, Nigeria 2 Department of Cyber Security Science, Federal University of Technology, Minna, Niger State, Nigeria 3 Department of Information and Media Technology, Federal University of Technology, Minna, Niger State, Nigeria 4 Directorate for Collaboration, Affliation and Linkages, Federal University of Technology, Minna, Niger State, Nigeria 5 Department of Mathematics and Statistics, Federal University of Technology, Minna, Niger State, Nigeria ABSTRACT: THE CURRENT SYSTEM OF MOBILE BANKING IN NIGERIA CONSISTS OF TWO WAY AUTHENTICATION (USERNAME AND PASSWORD) WHICH CAN BE FORGOTTEN OR STOLEN. THIS PAPER PROPOSES A SECURE AUTHENTICATION FOR MOBILE BANKING USING FACIAL RECOGNITION TO THE EFFECT OF IMPROVING ON THE EXISTING SYSTEM, AND THEREBY SUPPORTING THE ACTUALIZATION OF CASHLESS SOCIETY. AN OVERVIEW AND LIMITATIONS OF THE CURRENT SYSTEM ARE PRESENTED. THE HIGH LEVEL DESIGNS OF THE PROPOSED SYSTEM ARE THEN PRESENTED. THE SYSTEM IS THEN SIMULATED USING JAVA PROGRAMMING LANGUAGE AND TESTED USING SIMULATED DATABASES OF NIGERIA COMMUNICATION COMMISSIONS (NCC) AND THE FACILITATING BANK. THE SYSTEM WAS FOUND TO PERFORM WITH A MAXIMUM RESPONSE TIME OF SEVEN MINUTES, AND FALSE ACCEPTANCE RATE (FAR) OF 3%. COMBINING THIS SYSTEM WITH ONE OR MORE OTHER FORMS OF BIOMETRIC TECHNOLOGIES SUCH AS FINGER VEIN, IRIS AMONG OTHERS WILL NO DOUBT GIVE A FRAUD PROOF PLATFORM FOR MOBILE PHONE BANKING. KEYWORDS: MOBILE BANKING, SECURITY, AUTHENTICATION, CASHLESS SOCIETY I. INTRODUCTION In the past decades, banking was done inside the banking hall which was tasking to both the customers and the bankers. The long queues, paper-based data and even the time taken to perform even the smallest transaction can be an uphill task. This has now been a thing of the past since the advent of the internet and mobile phones. The Nigerian system of banking has evolved and following the trend as obtainable in the western world. The number of online banking users has increased in Nigeria and indeed the world; this has led to many experts in mobile banking software and mobile phone technology to research new and convenient methods for customers to perform banking transactions remotely via their mobile phones. Mobile banking is also known as mobile phone bank. It is referred to as the using mobile phone for banking related business [1]. It offers convenience for customers to perform transactions. Its utilization is expected to increase as the cashless society gets more hold in Nigeria vis-à-vis the fact that number of mobile phones users is also increasing. At the moment Nigerian banks like GTB and Access bank provide mobile banking through SMS (Short Messaging Service) using the WIG (Wireless Internet Gateway) and the WAP (Wireless Application Protocol) over GPRS (General Packet Radio Service). Security has become a primary concern in order to provide protected mobile transaction between the clients and the bank servers. Secure authentication of client information depends on some fundamental security approaches which will not jeopardize the client sensitive information. This has led to different researches ranging from single-factor authentication, two-way authentication, and multifactor authentication. Bearing in mind the cost of providing these services to clients, most banks are weary of balancing profit making and security. In Nigeria today, most mobile banking applications use the single-factor authentication which consist of the username and password. Mobile authentication can be the glue that binds together online banking, mobile banking and mobile payments in a way that couples security with convenience [2]. The single-factor authentication is prone to attacks, in cases of theft or perceived trusted third parties, the security can be breached with ease. Password hackers can easily break the security since most passwords are weak. Some customers using the online banking system in Nigeria have experienced unauthorized access to their banking information and, in some cases, unauthorized withdrawal from their accounts. Secure mobile banking will build confidence in customers knowing that their information is secure and they can carry out secure transactions without fear of man-in-the-
  • 2. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 52 | Page middle attacks. Though the issue of theft strongly depends on how a client protects his/her mobile phone device from third parties. The future of Nigerian banking is mobile, due to the availability of mobile phones to remote customers in the villages, towns and places where banks or ATMs are not in close reach for customers. The proposed cashless society in Nigeria will propel this future as fast as possible for Nigeria to be recognized among world players in financial and technological innovations. Based on the facts above, we have tried to improve on the present security levels on mobile phone banking in Nigeria. II. Literature Review 2.1. Mobile Banking Mobile Banking simply involves performing banking transactions via a mobile device. Advancement in mobile technology, over time, has dictated the nature of transactions that can be performed. Beginning from services delivered only through SMS [3], today high-level transactions, including third-party transfer, bill payment, to mention but two, can be conveniently performed from the comfort of a phone. According to [4], there are three main methods employable for performing transactions and accessing other banking services via a mobile phone. These include the Short Message Service (SMS), mobile web, and mobile client application. Summarized below is the performance level of each technology, considering some basic properties. Table 1. Comparision Between Different Types Of Mobile Banking Architectures Table. Types Ubiquity Ease of UI Affordabilty Security Rich App SMS Mobile Web Mobile Client App Strong Moderate Poor Strong Moderate Good Strong Moderate Moderate Weak Moderate Strong Poor Weak Strong 2.2. Authentication It simply connotes the verification of a user’s identity, before access is granted. It is an access control mechanism that often precedes authorization, and its implementation is based on one or a combination of three factors: what you have (these includes debit card, smart card), what you know (these include passwords, usernames or pin numbers), and what you are (these requires biometric such as retina, fingerprints, facial recognition etc) [5]. 2.3. Biometrics Biometric technology is a means of automatically authenticating a person by traits, that is, based on what the person is. This includes fingerprints, hand geometry, signature, retina, iris, voice, thermal imaging etc [6]. Usually, a person’s biometric data is acquired. The values of some defined parameters of the acquired data are then compared with those previously acquired and domiciled in the database [7]. The characteristics used in grading different biometrics are: universality, uniqueness, permanence, collectability, performance, acceptance and circumvention. For instance, considering one of the available biometrics, face, we have the assessment below [8]. Table 2. Grading one of the available biometrics, face. Biomet rics Universali ty Uniquenes s Permanen ce Collectabil ity Performanc e Acceptenc e Circumve ntion Face High Low Medium High Low High Low III. Statement Of The Problem Nigeria has over 120 million mobile subscribers [9]. It can be expected that a percentage of this population, considering the government penchant for a cashless society, would embrace the mobile banking option. From a survey carried out by [10], 20% of respondents revealed they employ mobile banking platform. Though, the level of mobile banking adoption in the country is still relatively young, many of the banks currently provide mobile banking platforms for customers [10]. From observations, the platforms provided by these banks require only username and password to gain access. Considering the fact that no system is perfect, mobile banking, like every other type of banking like ATM, credit card, mobile money, despite its immense benefits, is also not immune to security challenges. Yet, there is need for the available platforms to effectively control application and data access [11], hence the need for multi-factor level of authentication. This is necessary to encourage customers to embrace mobile banking.
  • 3. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 53 | Page According to Nigeria Deposit Insurance Commission (NDIC) report on electronic and related frauds for the quarter end of 2008 the incidence of frauds in banks maintained an upward surge. A typical example is the bank-wide increase in cases of ATM fraud. This is in spite of efforts by interswitch and member banks to raise awareness [12]. In 2008, the Economic and Financial Crimes Commission reports ranked Nigeria as the third among top ten source of electronic related fraud in the world. A society like Nigeria would be engulfed by electronic fraud if the system is not checked. These cases and statistics mentioned above have prompt the need to develop a secured mobile banking platform. This is also in line with the Central Bank’s drive for a cashless society. IV. Overview Of The Current System The analysis of the current system will help determine the feasibility of the system. Since the advent of mobile banking in Nigeria, the major goal of software designers has been to make mobile banking more secure for end users. Achieving this goal however, has been met with many challenges. For instance, Access Bank, one of the leading banks in the country, uses only the popular username and password level of security (2-way authentication) which poses a level of security that cannot stand the test of time. The features provided by the platform allow for account operations, like fund transfer, checking of balance, bill payments. Also, it provides functionality for account administration. With such features, a security level higher than the 2-way authentication is needed to provide optimum security to curb scam/theft on users’ account. 4.1. Problem Identification of the Current System i. 2-Way Authentication consists of Username and password only. ii. Poor level of security. iii. It is easy for hackers to breach into the account. iv. It is possible for hackers to clone the SIM card. v. When SIM card is cloned, the bank server will assume the hacker as the authentic user. vi. Prone to unauthorized access by perceived third parties. vii. In case of theft, mobile phone can be hacked into, whilst the bank server would allow access into the account assuming the hacker to be the authentic user. V. OVERVIEW OF THE PROPOSED SYSTEM The proposed system is expected to provide higher level of authentication (multifactor authentication) which will bring unauthorized access to the barest minimum. Before access will be granted, the user will have to take a facial photograph to have access to his/her account, the geometry of the face, distance of the eyes and the nose is compared. This photograph will be compared with the photograph in the bank server and the NCC server for verification, if it passes the verification, access will be granted, otherwise it will denied. In the event of unauthorized access, a security alert message will be sent to the bank. 5.1. Advantages of the Proposed System i. High security level. ii. Facial recognition of user. iii. Verification is compared within the NCC and bank server. iv. Theft message alert is sent to the bank server. v. It guarantees physical location of the user. vi. The biometric trait is unforgettable. vii. The biometric trait cannot be lost. viii. The biometric trait cannot be shared. ix. It can provide emergency identification x. It prevents identity theft. VI. SYSTEM COMPONENTS 6.1. New Account Creation New users using the application for the first time can create a new account by filling out a form that includes his/her name, sex, occupation, address, passport photograph, phone number, secret question and answer. These details will be used when a new session is started. 6.2. New Session A session starts when a customer logs in his/her username and password and takes a facial photograph. If it matches the corresponding image in the NCC and bank databases, the customer is then allowed to proceed
  • 4. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 54 | Page to select a transaction he/she wishes to perform from the menu of possible transactions in each case. A session is aborted when invalid entries exceed five trials. An intruder alert message will be sent to security operatives. 6.3. Transaction Before any transaction is started, every level of authentication must be obliged. At this level, transaction is securely carried out either in form of fund transfer, bill payment, to mention but two. 6.4. Database Design MySQL was used as the database because it is relational, cost effective, quick and powerful as well as compatible. VII. System Architecture Design 7.1. Entity Relationship Diagram Figure 1. UML diagram of proposed system 7.2. Class Diagram
  • 5. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 55 | Page Figure 2. Class diagram of proposed systems 7.3. Database Transaction Sequence
  • 6. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 56 | Page Figure 3. Database transaction sequence of proposed system 7.4. Process/Procedure Design: Figure 4. Flowchart of implementation procedure
  • 7. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 57 | Page VIII. System Implementation Test case #1 Use Case: Create mobile Account Background: Non-existing User want to fill form Event Sequence: 1. Click Create account and submit. 2. Login as existing user. Test case #2 Use Case : Take photograph Background : User wants to take a photograph to authenticate genuine account holder. Event Sequence: 1. Click on take photograph. 2. Hold phone to capture face. Test case #3 Use Case : Perform transaction Background : User wants to access bank account. Event Sequence: 1. Click on transaction you want to perform. Test case #4 Use Case : Disconnect to server Background : User wants to close the session. Event Sequence: 1. Click on logout option in menu In this way we tested using different test cases that found lot of errors which were corrected by recoding of that related procedures.. IX. Result And Discussion On the program end, the security is multi-factored. A username and password level, a facial recognition level and a secret question and answer level. Users are limited to five trials after which access is denied. Two dependable databases are also used to authenticate genuine users; these databases are the NCC database and the issuing bank database. In an advent of facial defection, users are advised to see their bank information technology operators. The response time for a complete transaction is seven minutes maximum putting other limiting factors into consideration; the false acceptance rate is 3%.the implication of false acceptance rate is given by elements on image background and facial defects. The advantages of this system include; i. Secure and transaction ii. Cost effective iii. Transaction can be done anywhere remotely (with availability of mobile network) Figure 5. Login interface
  • 8. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 58 | Page Figure 6. Facial capture/recognition interface Figure 7. Snapshot of a verified user Figure 8. New user registration interface
  • 9. Secure Authentication For Mobile Banking Using Facial Recognition www.iosrjournals.org 59 | Page X. Conclusion In a bid to make the Nigerian economy cashless, attention should be focused on security. When the security is trusted, it will build customer satisfaction and discourage the use of cash. The number of mobile phone users increases by the day and the success of the security on mobile banking will encourage new users to adopt the trend. Introducing this level of authentication using facial recognition on users’ account to authenticate from the Nigeria Communication Commission’s database and the facilitating bank’s database, will no doubt contribute to mitigate mobile banking fraud. REFERENCES [1] Sun, Z. W. (2009). Design And Implementation Of Mobile Payment Based On Multi-Interface Of Mobile Terminal. Zhejiang. [2] Nagel, B. (2007). Mobile Authentication Marries Security With Covenience. [3] http://en.wikipedia.org/wiki/Mobile_banking. [4] Punithavathi, R. and Duraiswamy, K. (2011). Secure Authenticated Mobile Agent Based Mobile Banking System. European Journal of Scientific Research. ISSN 1450-216X Vol.57 No.3 (2011), pp.494-501. [5] Krutz, R. L. and Vines, R. D. (2003). The CISSP Prep Guide: Gold Edition. Wiley Publishing, Inc., Indianapolis, Indiana. [6] Capoor. (2006). Electronic Banking Journal. [7] Gafurov, D., Helkala, K., and Sondrol, T. (2006). Biometric Gait Authentication Using Accelerometer Sensor. Journal of Computers, Vol. 1, No. 7, Oct./Nov. 2006, pp. 51-59. [8] Povocnicu, A. (2009). Biometric Security for Cell Phones. Informatica Economica, vol. 13, no. 1/2009, pp 57-63. [9] www2.ncc.gov.ng [10] The Impact of Mobile Services in Nigeria. Pyramid Research, March 2010. [11] Mobile Banking Overview (NA). Mobile Banking Association, January 2009. [12] Komolafe, B., Agwuegbo, A., and Adegunlehin, T. (2009). Nigeria: Banks’ Customers Agonise as ATM Fraud Persist. Available on: http://allafrica.com/stories/200911300313.html. Authors Falaye Adeyinka Adesuyi Lecturer, Department of Mathematics/Statistics, Federal University of Technology Minna Falaye holds B.Tech (Mathematics/Computer Sc.) and M.Sc. (Computer Sc.). He is a member of National mathematical Society (NMS) as well as Nigeria Computer Society(NCS). His areas of interest are risk and security in Network Systems, mobile and internet banking. OSHO OLUWAFEMI holds an M.Tech in Mathematics. Formerly a banker, where he headed the IT department, he presently lectures in the Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria. His research interests include information security, data mining/machine learning, and software development. ALABI, ISIAQ OLUDARE is an industry-experienced IT professional and an academic. He obtained his Bachelor’s degree at the University of Ibadan and Master in Information Technology at Ladoke Akintola University of Technology, Ogbomoso, both in Nigeria. Currently, he is teaching Database and Data mining in the department of Information and Media technology, School of Information and Communication Technology (SICT) at Federal University of Technology, Minna, Nigeria. Adama Ndako Victor System Analyst, Directorate for Coolaboratiion Affiliations and Linkages, Federal University of Technology Minna. Victor holds B.Tech (Mathematics/Computer Sc.) and is presently a System Analyst at the Directorate for Collaboration Affiliations and Linkages FUT Minna. His areas of interest are Software Engineering and Artificial Intelligence. AMANAMBU VICTOR RICK has a B.Tech in Mathematics/Computer Science from the Department of Mathematics, Federal University of Technology, Minna, Nigeria