SlideShare a Scribd company logo
1 of 5
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2206
ADVANCED TWO FACTOR AUTHENTICATION
USING IMAGE PROCESSING
S. Jeyalakshmi1, H. Vaitheeswaran2, S. Vashanth3, G. Vignesh kumar4, S. Vijayan5
1Asst. Prof, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu
2,3,4,5B. Tech, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Mobile commerce is an emerging trend. Mobile
commerce provides users to perform shopping, order food, m-
payments, etc. These increasingtrendleadstosecuritythreats.
This paper is focused on users authentication and security.
Existing system used for mobile payment services in handheld
devices doesn’t involve biometric authentication. Hence
leading to misuse and confusion among m-commerce users,
User authentication is performed by usingfingerprintanalysis
invoking fusion of 2 algorithms namely Minutiae Maps (MM)
and Orientation Map (OM). Also to enhance and provide more
security we integrate IRIS recognition of the users.
Fingerprints are the most used biometrics in mobile
applications at recent but it has not been implemented in
mobile transactions. Thisprojectimplementstheidentification
procedure. It matches one fingerprintamongNfingerprints. It
uses minutiae points based algorithms. In the enrollmentstep,
the points are extracted from the print. Later on, during the
authentication step, the points are matched. They are
implemented using fingerprint enhancement and minutiae
filtering. Then for IRIS recognition, K-NN classifiers are used.
For effective encryption and decryption we implement the
algorithms among RC4, AES, DES, 3DES. For PIN generation
we are using PIN distribution technique and for message
authentication purpose we are using more secured algorithm
like SHA algorithm.
Key words: K-NN Classifier, MM – Minutiae maps, OM-
Orientation maps, PIN – Personal IdentificationNumber
1. INTRODUCTION:
Online banking transaction isdevelopingandmostlyusedby
every merchant user in recent times. More than millions of
customers using online transactions. Authentication is the
only process to validate and verify the users. One time
password (OTP) is the only security added in present time
for authenticating users. As the users increases, intruders
and security breaches also increases. To increase more
security we can adopt our bio-metricsfortheauthentication.
The main objective of this research project was to create a
performing and accurate program for fingerprint
identification. Also to enhance and provide security we
integrate IRIS recognition of the users. For IRIS recognition,
we used K-NN classifier algorithm. For effective encryption
and decryption we are using the algorithms such as RC4,
AES, DES, 3DES. For PIN generation we are using PIN
distribution technique. Message authentication purpose, we
are using more secured algorithm like SHA algorithm. I
choose the subject of fingerprints because it involves
different fields like pattern recognition, statistical tests,
minutiae detection, performing algorithm programming.
Fingerprint recognition stands for me as a stereotype in
pattern recognition and detection. Techniques used in this
field can be reused in other applications. Added to that, high
security issues led to a lot of research on fingerprint
recognition, meaning that the techniques we used are
advanced.
2. OBJECTIVE
This project is proposed to provide greater security in
online transactions.
 And our main motive is to minimizethepossibilityof
security breach in Authentication scheme.
 Then to provide secure forwarding infrastructure
and to provide useful privacy and secure public
policy framework.
 Finally we had developed to enhance the
confidentiality and integrity in online banking
transactions.
3. RELATED WORK:
Online banking dealings were developing and largely
employed by each people in gift year. Over scores of
customer’svictimizationon-linetransactions.Authentication
is that the solely method to validate and verify the users.
Only once secret (OTP) is that the solely security value-
added in nowadays for authenticating users. Because the
users will increase, intruders and security breaches
conjointly will increase. To extend a lot of security we are
able to adopt our bio-metrics for the authentication. We
choose the topic of fingerprints as a result of it involves
completely different fields: pattern recognition, applied
mathematics tests trivialities detection, playacting formula
programming. Fingerprint recognition stands on behalf of
me as a stereotype in pattern recognition and detection.
Techniques employed in this field will be reused in
alternative applications. additional to it, high securityissues
diode to plenty of analysis on fingerprint recognition, For
encryption and decryption we used differentalgorithmslike
RC4, AES, DES, 3DES. Thus finally we used Pin distribution
algorithm for distributing the PIN. Thus, Our project
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2207
promotes and focuses onthe usersauthenticationinsafeand
secured way for safeguarding the usersinbank transactions.
In [1] “A Brief Review of the Iris Recognition Systems for
Developing a User-Friendly Biometric Application”, IEEE
International Conference on Energy, Communication, Data
Analytics and SoftComputing(ICECDS-2017)byJagadeeshN
and Dr. Chandrasekhar M. Patil in 2017: A biometric system
offers automatic identification of a human being based on
the unique feature or characteristic whichisbeingpossessed
by the individual. A number of biometric techniquesexistsin
the current scenario, viz., finger print, iris, face, etc. The iris
segmentation is one of the most dominant type used in all
Aadhar card applications & has its ownmajorapplicationsin
the field of surveillance as well as in security purposes. The
performance of an iris recognition systems depends heavily
on the feature extraction, histogram, and segmentation with
normalization techniques.
In [2] “A Survey on Iris Recognition System”, International
Conference on Electrical, Electronics, and Optimization
Techniques (ICEEOT) – 2016 by Sandeep Patil, Shreya
Gudasalamani, Nalini C. Iyer in 2016: Biometricsrecognition
is the use of physiological and behavioral traitstoidentify an
individual. Many biometric traits have been developed and
are being used to authenticate the person's identity. Iris
recognition systems are widely used and have been proved
to be efficient at individual recognition with high accuracy
and nearly perfect matching. the Iris images are gathered
from the publically available Iris database TheIrisfeature of
two eyes of same person are not similar making it more
secured way of authentication compared to other Biometric
recognition systems. The various stages of processing
involved in the design of
Iris recognition system are Localization of eye, Boundary
segmentations of Iris and pupil, Normalization,Local feature
extractions and Matching.
In [3] “Fingerprint Based Biometric ATM Authentication
system”, IEEE International Journal of Engineering
Inventions, e-ISSN: 2278-7461, p-ISSN: 2319-6491, Volume
3, Issue 11 (2014) PP: 22-28 by Dhiraj Sunehra in 2014:
Biometrics are automated methods of recognizing a person
based on a physiological or behavioral characteristic.
Biometric-based solutions are able to provide for
confidential financial transactionsandpersonal data privacy.
The various features used are face, fingerprints, hand
geometry, handwriting, iris, retina, vein and voice. All
fingerprints have unique characteristics and patterns. A
normal fingerprint pattern is made up of lines and spaces.
These lines are called ridges while the spaces between the
ridges are called valleys. It is through the pattern of these
ridges and valleys that a unique fingerprint is matched for
verification and authorization. These unique fingerprint
traits are termed “minutiae” and comparisons are made
based on these traits.
In [4] “An improved algorithm for feature extraction from a
fingerprint fuzzy image”, by kamil surmacz*, khalid saeed,
piotr rapta in 2013: Proper fingerprint feature extraction is
crucial in fingerprint-matching algorithms. permanently
results, different items of knowledge a couple of fingerprint
image, like ridge orientation and frequency,must bethought
of. it's usually necessary to boost the standard of a
fingerprint image so as for the feature extraction method to
figure properly. During this paper we tend to gift an entire
(fully implemented) improved algorithmic program for
fingerprint feature extraction, supported various papers on
this topic. The paper describes a fingerprint recognition
system consisting of image preprocessing, filtration, feature
extraction and matching for recognition. The image
preprocessing includes normalization supported mean and
variation. The orientation field is extracted and physicist
filter is employed to organize the fingerprint image for
additional process
4. PROPOSED SYSTEM:
This project is mainly focused on Fingerprint recognition,
IRIS recognition and PIN authentication. Thus fingerprint
recognition provides more security for online transactions.
Then IRIS recognition integrationprovideshighsecurity and
avoid fake users. Thus two steps are done to perfectly
validate the users and avoid fake users. The biometricimage
of the user is sent safely to biometric server via WAP
gateway. Effective finger print extraction algorithm like OM,
MM, Core point detection, Gabor filter, OCM are used and
they are used to identify the fingerprint. IRIS recognition is
implemented using K-NN classifier. PIN distribution
technique are used to finally verify the users. Weresearched
on implementing effective encryption algorithms among
RC4, AES, DES.
5. SYSTEM ARCHITECTURE:
Fig- 1: System Architecture diagram
The above diagram clearly explains that the customer or
user wants to purchase some products or items they should
place the products in a cart and then wants to pay the
appropriate amount for the product. Hence, The product
merchant confirmstheorder.Themerchantgatewayinvokes
the biometric server for money transaction. Then the
biometric server request the user to givethebiometrics.Asa
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2208
response the user gives the biometrics. They are
acknowledged to the payment gateway merchant that the
biometrics are given and they will intimate the user that are
biometrics are taken as an input successfully, then they are
authenticated with the help of the authentication server by
the given inputs. If the authentication server fails the
external servers are used to authenticate the users. Thus
backup servers are known as external server. Thus finally,
money gets transacted to the bank if biometrics placed are
legitimate and matched with the appropriate user and are
given to the appropriate merchant. Thus, the user was
authenticated and transacted the money in a secured way.
This will be very effective when compared to other
authentication schemes.
6. METHEDOLOGY:
For implementation the entire system has been divided into
the following modules:
 IRIS recognition
 Fingerprint recognition
 PIN distribution
A. IRIS recognition:
IRIS is recognized by KNN-classifiers. In pattern recognition
field, KNN algorithm is one of the most important and
secured non-parameter algorithms and it is a supervised
learning algorithm. The classification rules are generated by
the set of training samples itself without the need of any
additional data. The KNN classification algorithm predicts
the test sample’s category according to the K training
samples which are the nearest neighbors to the test sample,
and judge it to that category which has the largest category
probability. Once the iris region is successfully segmented
from an eye image, the next stage is to transform the iris
region so that it has fixed dimensions in order to allow
comparisons. The detection inconsistencies between eye
images are mainly due to the streching of the iris caused by
pupil dilation from varying levels of illumination. The IRIS
recognition module is described below as follows,
Fig – 2: IRIS recognition flow diagram
The described iris recognition process will be shown in fig.3
as below as follows,
Fig - 3: IRIS recognition module
Fig – 4: Classification and recognition module
B. Fingerprint recognition:
The orientation info per pel is just required to enhance the
fingerprint. This method is completed to extend the quality
of the print by reducing the noise, filling some tiny gaps and
enhancing the ridges and valleys. The Gabor filters are
usually utilized in fingerprint identification algorithms.
Histogram equalization improves distinction of the input
image by uniformly distributing intensity levels on whole
image manufacturing uniform bar chart. So new intensity
values replaces all the previous intensity values
manufacturing bright and increased image. Minutiae points
are extracted throughout the enrollment process and so for
every authentication. In an exceedingly fingerprint, they
correspond to either a ridge endingora bifurcation,there'sa
duality between the two kinds of minutiae: if the picture
element brightness is inverted, ridge endings become
bifurcations and contrariwise. The position of the detail
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2209
purpose is at the tip of the ridge or the valley. The
orientation is given by the orientation of the arrow formed
by the ridge or the depression. Steganography is the process
of hiding a secret message within an ordinary message and
the detection of hidden content is called as steganalysis. We
propose an optimal discrete wavelet transform based
steganography. First decomposition is done on a hostimage
and the secret information is hidden by manipulating the
transform coefficients of the decomposed image. After
embedding, the stego image is subjected to various types of
image processing attacks like Gaussian white noise, salt and
pepper noise, blurring and sharpening. Experiments show
that the peak signal noise ratio generated by the proposed
method is better. The Fingerprint recognitionisdescribedas
follows,
Fig – 5: – Fingerprint recognition module
C. PIN distribution:
For secure PIN distribution we propose a unique sequence
which is encrypted using RC4 algorithm and sent to the
authentication and external servers for verification. In this
system all important details of the user namely user id,
timestamp, PIN number and user IP address (collectively
termed as a token) are obtained. Our architecture proposes
high secure PIN distribution techniquebysplittingthe4digit
PIN number into two parts i.e., 2 digits each and forming a
sequence. Each part separately will be processed toproduce
the decimal sequence number.ThePIN distributionisshown
in Fig. 4.1.3.b. Recent database query management plays an
important role because whenever the new data is hit the
administrator should know whether the actual user is only
hitting the database and initiatingthetransaction.Hence our
architecture obtains user id, time stamp and IP address and
monitored whenever the query is processed by the user.
Fig – 6: PIN seperation
Fig 7: PIN encryption
Fig – 8: PIN decryption
7. FUTURE ENHANCEMENT:
Advanced two factor authentication can be useful for
banking in future. Now, fingerprints are mostly used and
trending in all mobile phones, laptops, tablets. But iris
recognition is developing stepbystepandnowimplemented
in some mobiles. If they are implemented in every mobile
phones then these authentication will helpful in banking
sector and provides a better security with high performance
and reduces the time of authentication. Sincethefingerprint
and iris are unique for every humans, they can be integrated
and used in all the authentication purposes. This can be the
perfect solution choice for the challenging security in
banking sectors.
8. CONCLUSION:
User authentication is important in M-commerce
applications to ensure the communicating entity is theexact
user and our proposed architecture ensures using
fingerprint analysis. The fingerprint analysis is effectively
performed by fusion of two algorithms namely Minutiae
Maps (MM) and Orientation Maps (OM). By fusing and
implementing both algorithms the finger print process is
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2210
more accurate and effective. Also the fingerprint is sent to
the biometric server through WAP gateway in a secure way
using DWT data hiding technique. To add more security we
introduce secure PIN distribution process using our
proposed PIN distribution architecture, unique sequence
formation, OK message concept, RC4 encryption algorithm
and SHA algorithm for message authentication. The
execution time is analyzed and compared amongencryption
algorithms namely DES, 3DES, AES, RC4 for processing the
PIN split up, unique sequence and forming the cipher text in
Sony C6602 and Moto G. The result shows that RC4
algorithm is faster and more effective in processing time
when compared with other algorithms. Thus the proposed
architecture ensures complete reliable and secure
transaction for m-commerce users.
9. REFERENCES:
1. Jagadeesh. N, Dr. Chandrasekhar M. Patil, “A Brief
Review of the Iris Recognition Systems for
Developing a User-Friendly Biometric Application”,
International Conference on Energy,
Communication, Data AnalyticsandSoftComputing,
2017
2. Sandeep Patil, Shreya Gudasalamani ,Nalini C. Iyer,
“A Survey on Iris Recognition System”,International
Conference on Electrical, Electronics, and
Optimization Techniques, 2016
3. Dhiraj Sunehra, “Fingerprint Based Biometric ATM
Authentication system”, International Journal of
Engineering Inventions, Vol.4,Issue 11,2014.
4. K Amil Surmacz ,K Halid Saeed, P Iotr Rapta , “An
improved algorithm for feature extraction from a
fingerprint fuzzy image”, IEEE Transactions on
Pattern Analysis and Machine Intelligence VOL.43,
Issue.3, 2013
5. Aayushi Mishra,Manish Mathuria, “Multilevel
Security Feature for OnlineTransaction using QR
Code & Digital Watermarking”, International
Conference on Electronics, Communication and
Aerospace Technology,2015

More Related Content

What's hot

IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET Journal
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric Systemijtsrd
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionIRJET Journal
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensorijtsrd
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compressionIJSRED
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition SystemIRJET Journal
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection SystemIRJET Journal
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET Journal
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...IRJET Journal
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierIRJET Journal
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Piijtsrd
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET Journal
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in IndiaKshitij Behl
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...IRJET Journal
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance Systemijtsrd
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 

What's hot (18)

IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security ApproachIRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
 
Enhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric SystemEnhancing the Cash Point using Multimode Biometric System
Enhancing the Cash Point using Multimode Biometric System
 
Attendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint RecognitionAttendance System using Android Integrated Biometric Fingerprint Recognition
Attendance System using Android Integrated Biometric Fingerprint Recognition
 
Wireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint SensorWireless Student Attendance System using Fingerprint Sensor
Wireless Student Attendance System using Fingerprint Sensor
 
A comparative analysis of Iris data compression
A comparative analysis of Iris data compressionA comparative analysis of Iris data compression
A comparative analysis of Iris data compression
 
IRJET - Face Detection and Recognition System
IRJET -  	  Face Detection and Recognition SystemIRJET -  	  Face Detection and Recognition System
IRJET - Face Detection and Recognition System
 
IRJET- Applications of Object Detection System
IRJET-  	  Applications of Object Detection SystemIRJET-  	  Applications of Object Detection System
IRJET- Applications of Object Detection System
 
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan DetectionIRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
IRJET- Study on: Advancement of Smartphone Security by using Iris Scan Detection
 
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
Sum Rule Based Matching Score Level Fusion of Fingerprint and Iris Images for...
 
Optimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifierOptimization of human finger knuckle print as a neoteric biometric identifier
Optimization of human finger knuckle print as a neoteric biometric identifier
 
Smart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry PiSmart Attendance System using Raspberry Pi
Smart Attendance System using Raspberry Pi
 
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle PatternIRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
 
Biometrics in India
Biometrics in IndiaBiometrics in India
Biometrics in India
 
Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...Security for Identity Based Identification using Water Marking and Visual Cry...
Security for Identity Based Identification using Water Marking and Visual Cry...
 
A Study of Iris Recognition
A Study of Iris RecognitionA Study of Iris Recognition
A Study of Iris Recognition
 
Face Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance SystemFace Recognition Based Automated Student Attendance System
Face Recognition Based Automated Student Attendance System
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 

Similar to IRJET- Advanced Two Factor Authentication using Image Processing

IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNNIRJET Journal
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based VotingIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABMaria Perkins
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET Journal
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET Journal
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAM Publications
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issuesijtsrd
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMIRJET Journal
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterNIDHI SHARMA
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCVIRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET Journal
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET Journal
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningIRJET Journal
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONLisa Cain
 

Similar to IRJET- Advanced Two Factor Authentication using Image Processing (20)

IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET-  	  Secure Online Payment with Facial Recognition using CNNIRJET-  	  Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
 
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine LearningIRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
I017335457
I017335457I017335457
I017335457
 
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLABA PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
A PROJECT REPORT ON IRIS RECOGNITION SYSTEM USING MATLAB
 
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
IRJET- Handwritten Signature Verification using Local Binary Pattern Features...
 
IRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker SystemIRJET - Two Model Biometrics Authentication for Locker System
IRJET - Two Model Biometrics Authentication for Locker System
 
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONESAN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
AN IMAGE BASED ATTENDANCE SYSTEM FOR MOBILE PHONES
 
Biometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security IssuesBiometric System and Recognition Authentication and Security Issues
Biometric System and Recognition Authentication and Security Issues
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
FACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEMFACE RECOGNITION ATTENDANCE SYSTEM
FACE RECOGNITION ATTENDANCE SYSTEM
 
AI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median FilterAI Approach for Iris Biometric Recognition Using a Median Filter
AI Approach for Iris Biometric Recognition Using a Median Filter
 
A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...A secure architecture for m commerce users using biometerics and pin distribu...
A secure architecture for m commerce users using biometerics and pin distribu...
 
Face Recognition System using OpenCV
Face Recognition System using OpenCVFace Recognition System using OpenCV
Face Recognition System using OpenCV
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke DynamicsIRJET-Analyzing user Behavior using Keystroke Dynamics
IRJET-Analyzing user Behavior using Keystroke Dynamics
 
An in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep LearningAn in-depth review on Contactless Fingerprint Identification using Deep Learning
An in-depth review on Contactless Fingerprint Identification using Deep Learning
 
ATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITIONATM SECURITY USING FACE RECOGNITION
ATM SECURITY USING FACE RECOGNITION
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

IRJET- Advanced Two Factor Authentication using Image Processing

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2206 ADVANCED TWO FACTOR AUTHENTICATION USING IMAGE PROCESSING S. Jeyalakshmi1, H. Vaitheeswaran2, S. Vashanth3, G. Vignesh kumar4, S. Vijayan5 1Asst. Prof, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu 2,3,4,5B. Tech, Dept. of Information Technology, Valliammai Engineering College, Chennai, Tamil Nadu ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Mobile commerce is an emerging trend. Mobile commerce provides users to perform shopping, order food, m- payments, etc. These increasingtrendleadstosecuritythreats. This paper is focused on users authentication and security. Existing system used for mobile payment services in handheld devices doesn’t involve biometric authentication. Hence leading to misuse and confusion among m-commerce users, User authentication is performed by usingfingerprintanalysis invoking fusion of 2 algorithms namely Minutiae Maps (MM) and Orientation Map (OM). Also to enhance and provide more security we integrate IRIS recognition of the users. Fingerprints are the most used biometrics in mobile applications at recent but it has not been implemented in mobile transactions. Thisprojectimplementstheidentification procedure. It matches one fingerprintamongNfingerprints. It uses minutiae points based algorithms. In the enrollmentstep, the points are extracted from the print. Later on, during the authentication step, the points are matched. They are implemented using fingerprint enhancement and minutiae filtering. Then for IRIS recognition, K-NN classifiers are used. For effective encryption and decryption we implement the algorithms among RC4, AES, DES, 3DES. For PIN generation we are using PIN distribution technique and for message authentication purpose we are using more secured algorithm like SHA algorithm. Key words: K-NN Classifier, MM – Minutiae maps, OM- Orientation maps, PIN – Personal IdentificationNumber 1. INTRODUCTION: Online banking transaction isdevelopingandmostlyusedby every merchant user in recent times. More than millions of customers using online transactions. Authentication is the only process to validate and verify the users. One time password (OTP) is the only security added in present time for authenticating users. As the users increases, intruders and security breaches also increases. To increase more security we can adopt our bio-metricsfortheauthentication. The main objective of this research project was to create a performing and accurate program for fingerprint identification. Also to enhance and provide security we integrate IRIS recognition of the users. For IRIS recognition, we used K-NN classifier algorithm. For effective encryption and decryption we are using the algorithms such as RC4, AES, DES, 3DES. For PIN generation we are using PIN distribution technique. Message authentication purpose, we are using more secured algorithm like SHA algorithm. I choose the subject of fingerprints because it involves different fields like pattern recognition, statistical tests, minutiae detection, performing algorithm programming. Fingerprint recognition stands for me as a stereotype in pattern recognition and detection. Techniques used in this field can be reused in other applications. Added to that, high security issues led to a lot of research on fingerprint recognition, meaning that the techniques we used are advanced. 2. OBJECTIVE This project is proposed to provide greater security in online transactions.  And our main motive is to minimizethepossibilityof security breach in Authentication scheme.  Then to provide secure forwarding infrastructure and to provide useful privacy and secure public policy framework.  Finally we had developed to enhance the confidentiality and integrity in online banking transactions. 3. RELATED WORK: Online banking dealings were developing and largely employed by each people in gift year. Over scores of customer’svictimizationon-linetransactions.Authentication is that the solely method to validate and verify the users. Only once secret (OTP) is that the solely security value- added in nowadays for authenticating users. Because the users will increase, intruders and security breaches conjointly will increase. To extend a lot of security we are able to adopt our bio-metrics for the authentication. We choose the topic of fingerprints as a result of it involves completely different fields: pattern recognition, applied mathematics tests trivialities detection, playacting formula programming. Fingerprint recognition stands on behalf of me as a stereotype in pattern recognition and detection. Techniques employed in this field will be reused in alternative applications. additional to it, high securityissues diode to plenty of analysis on fingerprint recognition, For encryption and decryption we used differentalgorithmslike RC4, AES, DES, 3DES. Thus finally we used Pin distribution algorithm for distributing the PIN. Thus, Our project
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2207 promotes and focuses onthe usersauthenticationinsafeand secured way for safeguarding the usersinbank transactions. In [1] “A Brief Review of the Iris Recognition Systems for Developing a User-Friendly Biometric Application”, IEEE International Conference on Energy, Communication, Data Analytics and SoftComputing(ICECDS-2017)byJagadeeshN and Dr. Chandrasekhar M. Patil in 2017: A biometric system offers automatic identification of a human being based on the unique feature or characteristic whichisbeingpossessed by the individual. A number of biometric techniquesexistsin the current scenario, viz., finger print, iris, face, etc. The iris segmentation is one of the most dominant type used in all Aadhar card applications & has its ownmajorapplicationsin the field of surveillance as well as in security purposes. The performance of an iris recognition systems depends heavily on the feature extraction, histogram, and segmentation with normalization techniques. In [2] “A Survey on Iris Recognition System”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) – 2016 by Sandeep Patil, Shreya Gudasalamani, Nalini C. Iyer in 2016: Biometricsrecognition is the use of physiological and behavioral traitstoidentify an individual. Many biometric traits have been developed and are being used to authenticate the person's identity. Iris recognition systems are widely used and have been proved to be efficient at individual recognition with high accuracy and nearly perfect matching. the Iris images are gathered from the publically available Iris database TheIrisfeature of two eyes of same person are not similar making it more secured way of authentication compared to other Biometric recognition systems. The various stages of processing involved in the design of Iris recognition system are Localization of eye, Boundary segmentations of Iris and pupil, Normalization,Local feature extractions and Matching. In [3] “Fingerprint Based Biometric ATM Authentication system”, IEEE International Journal of Engineering Inventions, e-ISSN: 2278-7461, p-ISSN: 2319-6491, Volume 3, Issue 11 (2014) PP: 22-28 by Dhiraj Sunehra in 2014: Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Biometric-based solutions are able to provide for confidential financial transactionsandpersonal data privacy. The various features used are face, fingerprints, hand geometry, handwriting, iris, retina, vein and voice. All fingerprints have unique characteristics and patterns. A normal fingerprint pattern is made up of lines and spaces. These lines are called ridges while the spaces between the ridges are called valleys. It is through the pattern of these ridges and valleys that a unique fingerprint is matched for verification and authorization. These unique fingerprint traits are termed “minutiae” and comparisons are made based on these traits. In [4] “An improved algorithm for feature extraction from a fingerprint fuzzy image”, by kamil surmacz*, khalid saeed, piotr rapta in 2013: Proper fingerprint feature extraction is crucial in fingerprint-matching algorithms. permanently results, different items of knowledge a couple of fingerprint image, like ridge orientation and frequency,must bethought of. it's usually necessary to boost the standard of a fingerprint image so as for the feature extraction method to figure properly. During this paper we tend to gift an entire (fully implemented) improved algorithmic program for fingerprint feature extraction, supported various papers on this topic. The paper describes a fingerprint recognition system consisting of image preprocessing, filtration, feature extraction and matching for recognition. The image preprocessing includes normalization supported mean and variation. The orientation field is extracted and physicist filter is employed to organize the fingerprint image for additional process 4. PROPOSED SYSTEM: This project is mainly focused on Fingerprint recognition, IRIS recognition and PIN authentication. Thus fingerprint recognition provides more security for online transactions. Then IRIS recognition integrationprovideshighsecurity and avoid fake users. Thus two steps are done to perfectly validate the users and avoid fake users. The biometricimage of the user is sent safely to biometric server via WAP gateway. Effective finger print extraction algorithm like OM, MM, Core point detection, Gabor filter, OCM are used and they are used to identify the fingerprint. IRIS recognition is implemented using K-NN classifier. PIN distribution technique are used to finally verify the users. Weresearched on implementing effective encryption algorithms among RC4, AES, DES. 5. SYSTEM ARCHITECTURE: Fig- 1: System Architecture diagram The above diagram clearly explains that the customer or user wants to purchase some products or items they should place the products in a cart and then wants to pay the appropriate amount for the product. Hence, The product merchant confirmstheorder.Themerchantgatewayinvokes the biometric server for money transaction. Then the biometric server request the user to givethebiometrics.Asa
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2208 response the user gives the biometrics. They are acknowledged to the payment gateway merchant that the biometrics are given and they will intimate the user that are biometrics are taken as an input successfully, then they are authenticated with the help of the authentication server by the given inputs. If the authentication server fails the external servers are used to authenticate the users. Thus backup servers are known as external server. Thus finally, money gets transacted to the bank if biometrics placed are legitimate and matched with the appropriate user and are given to the appropriate merchant. Thus, the user was authenticated and transacted the money in a secured way. This will be very effective when compared to other authentication schemes. 6. METHEDOLOGY: For implementation the entire system has been divided into the following modules:  IRIS recognition  Fingerprint recognition  PIN distribution A. IRIS recognition: IRIS is recognized by KNN-classifiers. In pattern recognition field, KNN algorithm is one of the most important and secured non-parameter algorithms and it is a supervised learning algorithm. The classification rules are generated by the set of training samples itself without the need of any additional data. The KNN classification algorithm predicts the test sample’s category according to the K training samples which are the nearest neighbors to the test sample, and judge it to that category which has the largest category probability. Once the iris region is successfully segmented from an eye image, the next stage is to transform the iris region so that it has fixed dimensions in order to allow comparisons. The detection inconsistencies between eye images are mainly due to the streching of the iris caused by pupil dilation from varying levels of illumination. The IRIS recognition module is described below as follows, Fig – 2: IRIS recognition flow diagram The described iris recognition process will be shown in fig.3 as below as follows, Fig - 3: IRIS recognition module Fig – 4: Classification and recognition module B. Fingerprint recognition: The orientation info per pel is just required to enhance the fingerprint. This method is completed to extend the quality of the print by reducing the noise, filling some tiny gaps and enhancing the ridges and valleys. The Gabor filters are usually utilized in fingerprint identification algorithms. Histogram equalization improves distinction of the input image by uniformly distributing intensity levels on whole image manufacturing uniform bar chart. So new intensity values replaces all the previous intensity values manufacturing bright and increased image. Minutiae points are extracted throughout the enrollment process and so for every authentication. In an exceedingly fingerprint, they correspond to either a ridge endingora bifurcation,there'sa duality between the two kinds of minutiae: if the picture element brightness is inverted, ridge endings become bifurcations and contrariwise. The position of the detail
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2209 purpose is at the tip of the ridge or the valley. The orientation is given by the orientation of the arrow formed by the ridge or the depression. Steganography is the process of hiding a secret message within an ordinary message and the detection of hidden content is called as steganalysis. We propose an optimal discrete wavelet transform based steganography. First decomposition is done on a hostimage and the secret information is hidden by manipulating the transform coefficients of the decomposed image. After embedding, the stego image is subjected to various types of image processing attacks like Gaussian white noise, salt and pepper noise, blurring and sharpening. Experiments show that the peak signal noise ratio generated by the proposed method is better. The Fingerprint recognitionisdescribedas follows, Fig – 5: – Fingerprint recognition module C. PIN distribution: For secure PIN distribution we propose a unique sequence which is encrypted using RC4 algorithm and sent to the authentication and external servers for verification. In this system all important details of the user namely user id, timestamp, PIN number and user IP address (collectively termed as a token) are obtained. Our architecture proposes high secure PIN distribution techniquebysplittingthe4digit PIN number into two parts i.e., 2 digits each and forming a sequence. Each part separately will be processed toproduce the decimal sequence number.ThePIN distributionisshown in Fig. 4.1.3.b. Recent database query management plays an important role because whenever the new data is hit the administrator should know whether the actual user is only hitting the database and initiatingthetransaction.Hence our architecture obtains user id, time stamp and IP address and monitored whenever the query is processed by the user. Fig – 6: PIN seperation Fig 7: PIN encryption Fig – 8: PIN decryption 7. FUTURE ENHANCEMENT: Advanced two factor authentication can be useful for banking in future. Now, fingerprints are mostly used and trending in all mobile phones, laptops, tablets. But iris recognition is developing stepbystepandnowimplemented in some mobiles. If they are implemented in every mobile phones then these authentication will helpful in banking sector and provides a better security with high performance and reduces the time of authentication. Sincethefingerprint and iris are unique for every humans, they can be integrated and used in all the authentication purposes. This can be the perfect solution choice for the challenging security in banking sectors. 8. CONCLUSION: User authentication is important in M-commerce applications to ensure the communicating entity is theexact user and our proposed architecture ensures using fingerprint analysis. The fingerprint analysis is effectively performed by fusion of two algorithms namely Minutiae Maps (MM) and Orientation Maps (OM). By fusing and implementing both algorithms the finger print process is
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 02 | Feb 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2210 more accurate and effective. Also the fingerprint is sent to the biometric server through WAP gateway in a secure way using DWT data hiding technique. To add more security we introduce secure PIN distribution process using our proposed PIN distribution architecture, unique sequence formation, OK message concept, RC4 encryption algorithm and SHA algorithm for message authentication. The execution time is analyzed and compared amongencryption algorithms namely DES, 3DES, AES, RC4 for processing the PIN split up, unique sequence and forming the cipher text in Sony C6602 and Moto G. The result shows that RC4 algorithm is faster and more effective in processing time when compared with other algorithms. Thus the proposed architecture ensures complete reliable and secure transaction for m-commerce users. 9. REFERENCES: 1. Jagadeesh. N, Dr. Chandrasekhar M. Patil, “A Brief Review of the Iris Recognition Systems for Developing a User-Friendly Biometric Application”, International Conference on Energy, Communication, Data AnalyticsandSoftComputing, 2017 2. Sandeep Patil, Shreya Gudasalamani ,Nalini C. Iyer, “A Survey on Iris Recognition System”,International Conference on Electrical, Electronics, and Optimization Techniques, 2016 3. Dhiraj Sunehra, “Fingerprint Based Biometric ATM Authentication system”, International Journal of Engineering Inventions, Vol.4,Issue 11,2014. 4. K Amil Surmacz ,K Halid Saeed, P Iotr Rapta , “An improved algorithm for feature extraction from a fingerprint fuzzy image”, IEEE Transactions on Pattern Analysis and Machine Intelligence VOL.43, Issue.3, 2013 5. Aayushi Mishra,Manish Mathuria, “Multilevel Security Feature for OnlineTransaction using QR Code & Digital Watermarking”, International Conference on Electronics, Communication and Aerospace Technology,2015