Submit Search
Upload
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
•
0 likes
•
17 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i5/IRJET-V6I5473.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Simran Seth
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
IJCI JOURNAL
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
International Journal of Technical Research & Application
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
Recommended
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Query Pattern Access and Fuzzy Clustering Based Intrusion Detection System
Simran Seth
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET Journal
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
Mobile User Authentication Based On User Behavioral Pattern (MOUBE)
CSCJournals
Case study on Usage of Biometrics (Cryptography)
Case study on Usage of Biometrics (Cryptography)
Bhargav Amin
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
LUIS: A L IGHT W EIGHT U SER I DENTIFICATION S CHEME FOR S MARTPHONES
IJCI JOURNAL
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
BIOMETRIC SECURITY SYSTEM AND ITS APPLICATIONS IN HEALTHCARE
International Journal of Technical Research & Application
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET Journal
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET- Eye Tracking for Password Authentication using Machine Learning
IRJET Journal
Smart banking system
Smart banking system
Shreyans Jain
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Biometric Systems and Security
Biometric Systems and Security
Shreyans Jain
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
ITIIIndustries
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
International Journal of Science and Research (IJSR)
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
IRJET Journal
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
donaldzs9
CYB 610 Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
DavisMurphyA98
Biometrics for e-voting
Biometrics for e-voting
Vignesh Ravichandran
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
More Related Content
What's hot
Smart banking system
Smart banking system
Shreyans Jain
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
ijtsrd
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
IJECEIAES
Biometric Systems and Security
Biometric Systems and Security
Shreyans Jain
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
ITIIIndustries
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
International Journal of Technical Research & Application
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
IJERA Editor
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
International Journal of Science and Research (IJSR)
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
ijsptm
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Baileyaby
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
IRJET Journal
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
IJRES Journal
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
robertlesew8
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
donaldzs9
CYB 610 Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
DavisMurphyA98
What's hot
(19)
Smart banking system
Smart banking system
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
Anomaly Threat Detection System using User and Role-Based Profile Assessment
Anomaly Threat Detection System using User and Role-Based Profile Assessment
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
Biometric Systems and Security
Biometric Systems and Security
Hazards of Biometric Authentication in Practice
Hazards of Biometric Authentication in Practice
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
Database Security Two Way Authentication Using Graphical Password
Database Security Two Way Authentication Using Graphical Password
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
Assessment and Mitigation of Risks Involved in Electronics Payment Systems
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
A WIRELESS FINGERPRINT ATTENDANCE SYSTEM
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Human Identification using Major and Minor Finger Knuckle Pattern
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
Authentication and Authorization for User Roles and Device for Attack Detecti...
Authentication and Authorization for User Roles and Device for Attack Detecti...
The Practical Data Mining Model for Efficient IDS through Relational Databases
The Practical Data Mining Model for Efficient IDS through Relational Databases
Cyb 610 Education Organization-snaptutorial.com
Cyb 610 Education Organization-snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Effective Communication - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
CYB 610 Exceptional Education - snaptutorial.com
Similar to IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
Biometrics for e-voting
Biometrics for e-voting
Vignesh Ravichandran
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET Journal
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
sachin yadav
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET Journal
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET Journal
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IRJET Journal
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET Journal
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET Journal
Securing And Protecting Information
Securing And Protecting Information
Laura Martin
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
IRJET Journal
Irjet v7 i3284
Irjet v7 i3284
aissmsblogs
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET Journal
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
IRJET Journal
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET Journal
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
Similar to IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
(20)
Biometrics for e-voting
Biometrics for e-voting
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Biometrics Presentation By Sachin Yadav (S/W Engineer)
Continuous User Identity Verification through Secure Login Session
Continuous User Identity Verification through Secure Login Session
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET- Survey on Development of Fingerprint Biometric Attendance Management S...
IRJET - An Enhanced Signature Verification System using KNN
IRJET - An Enhanced Signature Verification System using KNN
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET- Secure Online Payment with Facial Recognition using CNN
IRJET- Secure Online Payment with Facial Recognition using CNN
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
Employment Performance Management Using Machine Learning
Employment Performance Management Using Machine Learning
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
Securing And Protecting Information
Securing And Protecting Information
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PREMISES
Irjet v7 i3284
Irjet v7 i3284
IRJET- Fingerprint based Folder Lock
IRJET- Fingerprint based Folder Lock
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET - Human Identification using Major and Minor Finger Knuckle Pattern
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
ranjana rawat
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
misbanausheenparvam
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ranjana rawat
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
M Maged Hegazy, LLM, MBA, CCP, P3O
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
purnimasatapathy1234
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
ranjana rawat
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
pranjaldaimarysona
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Dr.Costas Sachpazis
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Suman Mia
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur High Profile
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Suhani Kapoor
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
ranjana rawat
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
Recently uploaded
(20)
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
IRJET-Biostatistics in Indian Banks: An Enhanced Security Approach
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4278 Biostatistics in Indian Banks: An Enhanced Security Approach Chahat Sharma1, Stuti Srivastava2, Tavishi Pandey3 1Assistant Professor, Dept. of Computer Science Engineering, Inderprastha Engineering College, Uttar Pradesh, India 2,3 Dept. of Computer Science & Engineering, Inderprastha Engineering College, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Fingerprints are devised because the most secure and valuable customary for private identification inside the rhetorical community for over a century. Fingerprints and finger marks mix to produce the strongest means that of private identification on the market to judicial officers. Patterns of fingerprints on the market are loops, whorls and arches. The methodology utilized by fingerprint specialists,sometimestoconductfrictionridge examinations is ACE-V. It involves the fundamental phases- analysis, comparison, evaluation, and verification. The recovered prints are manually compared or searched through an automatic fingerprint system to verify identity. This paper aims to overcome and solve the security problems faced by the Indian Banks in order to ensure cent percent security by providing them with a system which accepts human fingerprints to verify the user and grantaccesstotheLocker. Besides, it also aims in the overall development of a Futuristic Banking System which will work as a mini- banking operations assistant for the user. Index Terms— Automatic TellerMachine,FalseAcceptance Rate, Detection Error trade-off, World Health Organization, Support vector machine, Personal Identification Number, Global System for Mobile communications. 1.INTRODUCTION In the world, nowadays individuals are involved concerning their safety, for his or her valuablethings.Previousideasand devices have gotten changed asperdemandofindividuals.In day to day life we'd like to hunt new security system. So, we tend to develop to produce the utmost level security system. Cash transactions play a very important role within the nature of trade. Staggeringly growing banking technology has modified the approach banking activities are handled. Life science and Aadhaar card are outlined as a quantitative anatomical and performance characteristic, eventually compared & captured with another instance at the time of verification. These technologies are a secure approach of authentication. This is often asa resultofinformationof each technology are distinctive, cannot be sharedortracedor will be unnoticed. GSM, world System for electronic communication, used for causing message to authorities involved just in case of fingerprint/Aadhaarcardrecognition failure together with pa-role verification. 2. LITERATURE SURVEY Analyzing the varied researches allotted within the field of Demographics in the past, it's been seen that with the increasing population, demographics play a vital role in enhancing the protection options in each field they're used. Demographics are totally different for each individual and therefore enhance the confidentiality of knowledge. There are probabilities that the tutorial and skilled tracks of the demo-graphic community and also the strategic & defense communities don't run into naturally. The firstquestionthat arises is- that characteristic will be used for biometric/fingerprint recognition? As wisdom says, a good Biometric attribute should accomplish a collection of properties. Primarily they are: • Universality: everyone ought to have the characteristic that has to be checked for. • Distinctiveness: Any 2 persons ought to be wise enough to differentiate one another supported the Characteristic. • Permanence: the characteristic ought to be permanent and consistent throughout, regardless of operating conditions. • Collectability: the characteristic ought to be obtainable and quantitatively measurable. • Acceptability: customers ought to be willing to simply accept the system with none complains or privacy problems etc. • Performance: the identification accuracy should be moderately smart. • Circumvention: the fallacious skills/techniquesoughtto be negligible. Biometric traits will be split into 2 main categories: Physiological biometrics: It's supported formal approach i.e. Direct measurements of the form elements. These embrace Fingerprint, face, iris and hand-scan recognition.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4279 Behavioral biometrics: It's supported physical measurements and knowledge procured from an action performed by the user, and so indirectly measures few characteristics of the form. These embrace Signature, gait, gesture and key touching recognition. However, this differentiation is sort of spurious. Asanex- ample, the speech signal depends on activity traits like linguistics, diction, pronunciation, etc. However, it additionally depends on the speaker’s physiology, like the form of the vocal tract. On the opposite hand, physiological traits are influenced by user behavior, like the way within which a user presents a finger, appearance at a camera, speaks within the electro- acoustic transducer etc. 3.METHODOLOGY USED A. Verification and Identification Biometric systems will be operated in 2 modes, named identification and verification. We'll confer with recognition for the final case, once we don't wish to differentiate between them. However, some authors contemplate recognition and identification synonymous. Identification: During this approach no identity is claimed from the user. The system should beautomatizedso as to see the user. If he/ she belongs to a predefined set of acquainted users, it's referred as closed- set identification. However, needless to say the set of usersglorious(learnt) by the system is far smaller than the potential range of individuals which will try to enter. The additional general scenario wherever the system has got to manage with users that maybe don't seem to be sculptured within the info is said as open-set identification.Addinga “none-of-the-above” choice to closed-set identification provides open-set identification. The system performance will be evaluated mistreatment Associate in Nursing identification rate. Verification: During this approach the goal of thesystem is to see whether or not the person is that theonethatclaims to be. This suggests that the user should give Associate in Nursing identity and also the system simply accepts or rejects the users in step with a victorious or unsuccessful verification. Generally, this operation mode is known as authentication or detection. The systemperformancewill be evaluated mistreatment the False Acceptance Rate (FAR, those things wherever Associate in Nursing faker is accepted) and also the False Rejection Rate (FRR, those things wherever a user is incorrectly rejected), additionally glorious in detection theory as warning and Miss, severally. There's a trade-off between every error, thatpossessesto be typically established by adjusting a call threshold. The performance will be planned in an exceedingly mythical monster (Receiver Operator Characteristic) or in a DET (Detection error trade-off) plot. DETcurve providesuniform treatment to each varieties of error, and uses a graduated table for each axis, that spreads out the plot and higher distinguishes completely different well performing systems and typically produces plots that are near linear. Note additionally that the mythical monster curve has symmetry with regard to the DET, i.e. Plots the hit rate rather than the miss likelihood. DET plot uses a graduated table that expands the intense elements of the curve, that are the elements that offer the foremost info concerning the system performance. B. Is identification modemoreappropriatethan verification mode? Certain applications lend themselves to verification, like computer and network security, where, as an example, you replace your positive identification by your fingerprint, however you continue to use your login. However, in rhetorical applications it's necessary to use identification, because, as an example, latent prints raised from crime scenes ne'er give their “claimed identity”. In some cases,like entry, it is additional convenient for the user to work on identification mode. However, verification systems are quicker as a result of they simply need matched comparison (identification needs one to N, wherever N is that the range of users within the database). Additionally, verification systems conjointly give higher accuracies. As an example, a hacker has nearly N times additional probability to fool associate identification system than a verification one, as a result of in identification he/she simply has to match one among the N real users. For this reason, industrial applications operative on identification mode are restricted to small-scale (at most, some hundred users). Rhetorical systems operate during a completely different mode, as a result of the supply an inventory of candidates, and an individual's supervisor checks the automated result provided by the machine. This can be associated with the subsequent classification, that is additionally associated to the appliance. C. Positive and Negative Recognition Two kinds of applications canbeestablished,accordingto the user’s attitude: Negative recognition: The system should establishifthe person is that the one that (implicitly or explicitly) denies being. The aim of negative recognition is to forestall one person from exploitation multiple identities. Classical recognition strategies (handheld tokens and knowledge- based) cannot give this sort of recognition. Thus, solely statistics will be used for negative recognition. Government and rhetorical applications belong to the current cluster, wherever clearly the user doesn't wish to be known and cannot be cooperative. Positive recognition: Those applicationsthatdon'tneed the user to produce his identity, maybe for convenience (identification is easier to operate), belong to the present cluster. Biometric authentication is additionally sometimes used for positive recognition. It's attention-grabbing to look at that during this operation mode, the user is fascinated by being recognized, and can be cooperative. Otherwise, his/ her try and enter are going to be rejected. This clearly contrasts with the previousmode.RogerClark summarizesa
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4280 true case regarding “false identities”. It had beenrumored in 1993, the story of a pensionary WHO had defrauded the Department of social insuranceof$400,000.Thesuspecthad claimed he was born overseas, preventive the requirement for a certificate. He adopted multiplenames.Foreveryname, he entered himself on the Electoral Roll, obtained a Tax File range and submitted a legal document,appointedonvarious application forms the names of varied firms as previous employers, visited doctors and bought varied certificates from them, and victimization these obtained membership of an edge help association, insurance policies, union membership, Medicare and government concession cards. Obviously, this case will solely be detected by suggests that of crossed searches victimization biometric information. Recognition: Once the user is listed, the system will add identification or verification mode, exploitation thediagram shown in figure three, and also the systematic explained in previous sections (one-to-many comparisons for identification and matched for verification exploitation the claimed identity by the user). Each technology presents variations. For this reason, a brief outline of the foremost productive ones is enclosed. Face recognition is perhaps the foremost natural thanks to perform an identity verification between personalities.Face recognition will depend on single still pictures, multiple still pictures, or video sequence. Though historicallymostefforts are dedicated to the previous one, the newest ones are quickly rising, most likely because of the reduction of worth in image and video acquisition devices. For example, a sequence of pictures will give a unimodal informationfusion theme, wherever the verification depends on a group of pictures, instead of on one . Figure six shows associate degree example wherever every take a look at consists of one still image (on the left) and also the best match of 5 still pictures. We are able to observe an improvementontheFRR with a minor degradation on way (FRR plot shifts to the correct in larger quantity than way, yielding a lot of separation between plots and fewer important exchange for threshold setting up). This is often almost like the PIN keystroke on ATM cashiers, wherever 3 tries are offered. This strategy avoids inconveniences for users, with a negligible degradation on PIN vulnerability. Obviously, it may be applied to different biometric traits. However, a video-camera lets to simply obtaina consecutivesequenceof pictures in an exceedingly short period. For fingerprints, for example, it'd not have an excessive amount of sense, and it'd be time overwhelming, to raise the user for 5 consecutive acquisitions. 4.RESULT AND DISCUSSION A nice property of biometric security systems is that security level is sort of equal for all users during a system. This is often not true for alternative security technologies. For ex- ample, in associate degree access management supported parole, a hacker simply must break just one parole among those of all workers to achieve access. During this case, a weak parole compromises the general security of each sys- tem that user has access to. Thus, the whole system’ssecurity is merely nearly as good because the weakest parole. This is often particularly necessary as a result of sensible passwords are nonsense combos of characters and letters, that are troublesome to recollect (for instance, “Jh2pz6R+”). Sadly, some users still use passwords like “password”, “Homer Simpson” or their own name. Though bioscience offers an honest set of benefits, it's not been massively adopted however. One in all its main drawbacks is that biometric knowledge isn't secret and can't get replaced once being compromised by a 3rd party. For those applications with associate individual's supervisor (such as border entrance control), this may be a minor draw back, as a result of the operator can check if the given biometric attribute is original or fake. However, for remote applications like web, some quite liveliness detection and anti-replay attack mechanisms should be provided. However, forremoteapplicationslikenet, some quite liveliness detection and anti-replay attack mechanisms ought to be provided. This is often associate degree rising analysis topic. As a general rule, regarding security matters, a relent-less update is importantsoastostay on being protected. An acceptable system for this time will become obsolete if it's not sporadically improved. For this reason, no one will claim that encompasses an excellent security system, and even less that it'll last forever. Jain et al. Recommend that earlier security for ATM isn't abundantly economical. In associate degree earlier ATM machine solely, parole provided by bank to user, however it's not safety for patrons. Due to some limitation, so they analysis a biometric technique for a lot of verification. [1] Mr. Wang et al. Expresses his read like that currently on a daily basis ATM with magnetic strip etch solely by inserting parole on the ATM machine. However, in step with today’s situation, cases of fraud are another drawback. In order that they provided fingerprint for a lot of security. Currently a day we have a tendency to are directive towards the pile of latest powerful, intelligent, motorcar rated system, whichcanoffer North American nation simple to try and do the work swimmingly, therefore systems aren't conditional human support, one in every of these ‘ATM SECURITY SYSTEM’ that we've got evolved. [2] M. Subha and S. Vanithaasri’s they propose ATM access with biometric security system that is very documented to the shopper. For authentication fingerprint static points are ap- plied within the connected works by standard method. The trivialities points of fingerprint, ridge options, and iris are thought-about within the projected systemforincreasingthe matching scores against the incidenceofdistortionsand non- linear deformations. Consecutive steps are processed within the projected system. Hence, the authentication is highwith- in the projected application of ATM access. [3] Mr. Aru et al. Suggests that nowadays, ATM systemsusePIN& access card for biometric identification. The recent advance in biometric authentication techniques, tissuelayerscanning,
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 05 | May 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4281 together with procedure, and biometric identification has created a good effort to rescue the unsafe state of affairs at the ATM. This analysis investigated the event of a theme that integrates biometric identification technology into the verification method employed in ATMs. Associate ATM system that's reliable in providing additional security by exploitation biometric identification is planned. The event of such a theme would facilitate to shield purchasers & monetary establishments alike from intruders and identity thieves. This paper concentrates on associate ATM security system that might mix a physical access card, a private number, & electronic biometric identification that may go as so much as withholding the fraudster’s card. However, it's obvious that man’s biometric options can't be replicated,this proposal can go an extended thanks to solve the matter of Account safety creating it doable for the particular account owner alone have access to his accounts. The combined biometric options approach is to serve the aim each the identification and authentication that card and PIN do. [4] Lasisi et al, H specific their thought in planned paperlikethat Access management has been a priority during this info and Communication Technology era. The sure resources & information has been taken seriously by the data and Communication Technology community for management access that is important. [5] This author believes that no single security methodology. Therefore, a mixture of multiple security compliments is required to supply a high level of security against fraud. This paper combines 2 security components- fingerprint recognition & mag tape card. It goesoverthecomplicationsof magnetic-stripe card authentication combined with a PIN (PersonalIdentificationNumbers)orpasswordswideusedon ATMs nowadays. The resultant is that the paper proposes a framework for user authentication & identification in ma- chine through fingerprint authentication methodology. 5.CONCLUSION From review of varied papers, I conclude that the expansion within the electronic group action theme has resulted in an exceedingly bigger demand for correct & quick user identification and authentication.Associatedegree embedded fingerprint identification theme for ATM banking systems is planned during this paper together with Aadhaar Card authentication for a lot of security; conjointly enclosedduring this paper. Finally, conclusions are drawn out when the perceptive Aadhar Card & Fingerprint identification theme results. The most contributions during this study are coming up with associate degree SVM based mostly design that generates model file. A completely unique detail matching algorithmic program generates matching trivialities pairs. Experimental results showed a giant increase in matching rate of partial fingerprints. Future work might embody supportive with completely different info that consists of huge information and addressing robust sweetening ways. 6.REFERENCES [1] M. Faundez-Zanuy, “Door-openingsystemusinga low- cost fingerprint scanner and a PC”. IEEE Aerospace and Electronic Systems Magazine. Vol. 19 no 8, pp.23-26. August 2004 [2] M. Faundez-Zanuy y & Joan Fabregas, “Testing report of a fingerprint-based door-opening system”. IEEE Aerospace and Electronic Systems Magazine Vol.20 no 6, pp 18-20, ISSN: 0885-8985. June 2005. [3] D. Maltoni, D. Maio, A. K. Jain and S. Prabhakar, “Handbook of Fingerprint Recognition” Springer professional computing. 2003 [4] M. Faundez-Zanuy “On the vulnerability of biometric security systems” IEEE Aerospace and Electronic Systems Magazine Vol.19 no 6, pp.3-8, June 2004 [5] M. Faundez-Zanuy, E. Monte-Moreno “State-of-the-art in speaker recognition”. IEEE Aerospace and Electronic Systems Magazine. Vol.20 no 5, pp 7-12, ISSN: 0885-8985. May 2005 [6] Marcos Faundez-Zanuy and G. Mar Navarro-Mérida “Biometric identification by means of hand geometry and a neural net classifier” “IWANN’05 LectureNotesInComputer Science 2005 [7] P. W. Hallian, “Recognizing human eyes” Geometric methods computer vision, vol. 1570, pp. 214-216, 1991. [8] M. Faundez-Zanuy, “Signature recognition state-of- the-art”. IEEE Aerospace and Electronic Systems Magazine. 2005. Vol.20 no 7, pp 28-32, ISSN: 0885-8985. July 2005. [9] P. J. Phillips, P. Grother, R. J. Micheals, D.M.Blackburn, E. Tabassi, and J. M. Bone “FRVT 2002: Evaluation report”, available online: http://www.frvt.org/DLs/FRVT_2002_Evaluation_Report.pd f, March 2003
Download now