This document discusses three-factor authentication schemes for automated teller machines (ATMs) and banking operations using universal subscriber identification modules (USIM). It proposes a systematic approach for authenticating clients using three factors: password, smart card, and biometrics. The system would involve clients registering with a server using an initial password and biometrics to receive a smart card. Clients could then log in using their password, smart card, and biometrics. The document outlines several authentication protocols for registration, login, password changing, and biometrics changing. It also discusses technologies involved like smart cards, principal component analysis for face recognition, and security aspects.
An efficient implementation for key management technique using smart card and...ijctcm
A Elliptic curve cryptosystem are become popular because of the reduced number of keys bits required in
Comparision to other cryptosystem. In existing work ECC technique are used to describe the encryption
data to provide a security over a network. ECC satisfy the Smart cards requirements in term of memory,
processing and cost. In existing work ECC cryptographic Algorithm work with a smart card technique.
Many existing approaches work with smart card with various Technique and produce a better efficient
result. In these review paper, we Define a smart card technique using a ECIES cryptographic algorithm. So
These Technique key management using smart card and ECIES.ECC basically based on a discrete
logarithm over appoint on an elliptic curve. The ECIES is standard elliptic curve that is totally based on
encryption algorithm. Smart Card using ECIES technique in key management technique.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
In this paper the signature of a person is taken as input which is encrypted using
hierarchical visual cryptography. By using HVC the input signature will be divided into four shares.
From that any three are taken to generate key share. Another fragmentation should handover to the
authenticated server. The authenticated server should maintain the generated key and fourth
fragmentation. Only the authorized user can be accessed. If the receiver identifies the fourth
fragmentation and decrypt they got message by using HVC. It is insecure process because anybody
can hack the decrypted message easily. For the secure process the authenticated server generate a
password while transferring a message. The authenticated person can only able to got that message.
The authenticated server checks whether the person should be authorized user or not, while starting
their conversation. It provides more security and challenged for the hackers.
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
An efficient implementation for key management technique using smart card and...ijctcm
A Elliptic curve cryptosystem are become popular because of the reduced number of keys bits required in
Comparision to other cryptosystem. In existing work ECC technique are used to describe the encryption
data to provide a security over a network. ECC satisfy the Smart cards requirements in term of memory,
processing and cost. In existing work ECC cryptographic Algorithm work with a smart card technique.
Many existing approaches work with smart card with various Technique and produce a better efficient
result. In these review paper, we Define a smart card technique using a ECIES cryptographic algorithm. So
These Technique key management using smart card and ECIES.ECC basically based on a discrete
logarithm over appoint on an elliptic curve. The ECIES is standard elliptic curve that is totally based on
encryption algorithm. Smart Card using ECIES technique in key management technique.
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Authentication Mechanisms For Signature Based Cryptography By Using Hierarchi...Editor IJMTER
In this paper the signature of a person is taken as input which is encrypted using
hierarchical visual cryptography. By using HVC the input signature will be divided into four shares.
From that any three are taken to generate key share. Another fragmentation should handover to the
authenticated server. The authenticated server should maintain the generated key and fourth
fragmentation. Only the authorized user can be accessed. If the receiver identifies the fourth
fragmentation and decrypt they got message by using HVC. It is insecure process because anybody
can hack the decrypted message easily. For the secure process the authenticated server generate a
password while transferring a message. The authenticated person can only able to got that message.
The authenticated server checks whether the person should be authorized user or not, while starting
their conversation. It provides more security and challenged for the hackers.
ROLE OF MULTIPLE ENCRYPTION IN SECURE ELECTRONIC TRANSACTIONIJNSA Journal
Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Smart Card Security; Technology and AdoptionCSCJournals
Newly, smart card technology are being used in a number of ways around the world, on the other hand, security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. Furthermore, researches in information technology acceptance have identified the security as one of the factor that can influence on smart card adoption. This research is chiefly to study the security principals of smart card and assess the security aspects’ affect on smart card technology adoption. In order to achieve this purpose, a survey was conducted among the 640 university students to measure the acceptance of smart card technology from security aspects.
The next generation of the Bioscrypt V-Flex fingerprint reader is built on the new 4G technology platform that transforms an access control device into a flexible and smart security appliance through improved performance, usability and scalability.
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
In the wake of acts of terrorism occurring worldwide, it has become imperative for countries to increase the level of security at their borders. To assist in
their efforts for stronger border security, countries around the globe are implementing an e-passport program.
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Smart Card Security; Technology and AdoptionCSCJournals
Newly, smart card technology are being used in a number of ways around the world, on the other hand, security has become significant in information technology, especially in those application involving data sharing and transactions through the internet. Furthermore, researches in information technology acceptance have identified the security as one of the factor that can influence on smart card adoption. This research is chiefly to study the security principals of smart card and assess the security aspects’ affect on smart card technology adoption. In order to achieve this purpose, a survey was conducted among the 640 university students to measure the acceptance of smart card technology from security aspects.
The next generation of the Bioscrypt V-Flex fingerprint reader is built on the new 4G technology platform that transforms an access control device into a flexible and smart security appliance through improved performance, usability and scalability.
E-Passport: Deploying Hardware Security Modules to Ensure Data Authenticity a...SafeNet
In the wake of acts of terrorism occurring worldwide, it has become imperative for countries to increase the level of security at their borders. To assist in
their efforts for stronger border security, countries around the globe are implementing an e-passport program.
Digital signature and certificate authorityKrutiShah114
This presentation will give you a broad view about digital signature and certificate authority. It also explains the difference between digital signature and electronic signature.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
El profesor de la Universidad de Extremadura cuenta cómo afecta la Directiva Marco del Agua al convenio de Albufeira en el VII Congreso Ibérico de la FNCA en Talavera.
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
A secure communication in smart phones using two factor authenticationeSAT Journals
Abstract Most secure systems face security attacks mainly at the client side. Two Factor Authentication (TFA) provides improved protection to the system at the client side by prompting to provide something they know and something they have. This system uses a one time password(OTP) generation method which doesn’t require client-server communication, which frees the system from cost of sending a dynamic password each time the client wants to login. The OTP generation uses the factors that are unique to the user and is installed on a smart phone in Android platform owned by the user. An OTP is valid for a minutes time, after which, is useless. The system thus provides better client level security – a simple low cost method which protects system from hacking techniques like key logging, phishing, shoulder surfing, etc. Keywords—Authentication, OTP, key logging, phishing
A secure communication in smart phones using two factor authenticationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Location based authentication new words approch secuiritySarath K
Authentication is accepting proof of identity given by a
credible person who has evidence on the said identity or on the
originator and the object under assessment as his artifact
respectively. Traditional authentication technique generally
requires an id and password to verify the identity of user. By
nature, user is looking for a password that is easy to remember
and secured from any attack. However, remembering many
complicated passwords, especially when user has different
accounts, is not an easy task. Earlier two factor authentication
technique is common in use. In the two factor authentication
individual can be identified by his user name and password. If
username and password is matched then process of
authentication is done and user can access the data. But in this
technique anyone can hack password and access information.
In many cases, users' passwords are stored in plain-text form on
the server machine. Anyone who can gain access to the server's
database has access to enough information to impersonate any
authenticable user. In cases in which users' passwords are stored
in encrypted form on the server machine, plain-text passwords
are still sent across a possibly-insecure network from the client to
the server. Anyone with access to the intervening network may
be able to "snoop” pairs out of conversations and replay them to
forge authentication to the system. Each separate system must
carry its own copy of each user's authentication information. As a
result, users must maintain passwords on each system to which
they authenticate, and so are likely to choose less-than-secure
passwords for convenience. Knowledge based authentication
uses secret information. When user provides some information to
authenticate himself as a legitimate user, the system processes
this information and suggests whether the user is legitimate or
not
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Secure3 authentication for sensitive data on cloud using textual, chessboard ...eSAT Journals
Abstract Existing systems of authentication are plagued by many weaknesses. As a high speed cloud infrastructure is being developed and people are informationized, the sensitive data are also engaged in cloud feild. However, the existing cloud sensitive file upload and download on cloud was exposed to the danger of hacking. Recently, the personal information has been leaked by a high degree method such as Phishing or Pharming beyond snatching a user ID and Password. Seeing that most of examples which happened in the file uploading and downloading were caused by the appropriation of ID or Password belonging to others, a safe user confirmation system gets much more essential. In this paper, we propose a new authentication system file uploading and downloading on cloud using HADOOP technique. In HADOOP technique there are 3 technique but we can use HDFS (Hadoop Distributed File System).This authentication system is a combination of a three authentication system i.e. Secure3 in that 1)Textual,2)Chessboard,3)QR-code Authentication. In Textual authentication normal authentication is required to login .i.e username and password. In chessboard authentication user plays a steps of a chessboard and select that steps as authentication. In QR-code used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. we also include a priority of a sensitive data in that low priority sensitive data have only a Textual authentication system. Medium priority sensitive data have Textual +chessboard authentication system. High priority sensitive data have Textual +chessboard +QR-code authentication system. Keywords: OTP(one Time Password),QR(Quick-Response),CBS(Chess Board System),HDFS (Hadoop Distributed File System),IMEI(International Mobile Center Equipment Identity),AES(Advanced Encryption Standard).
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
This paper is demonstrating to create a system of multifactor authentication based on biometric verification. Our system use iris for the first factor and fingerprint for the second factor. nce an attacker attempts to attack the system, there must have two factors. If one of them is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Furthermore, this system will be implemented to enhance security for accessing control login governmentsystem.
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATION
Fu3111411144
1. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1141-1144
Three Factor Authentication Schemes for the Automation of
Inter-Networked banking and Teller Machine operations using
Universal Subscriber Identification Modules
Sivasankar Bandaru*, Swapna. S**
*( M .Tech (WT), Aurora’s Technological and Research Institute, JNTUH
Hyderabad, Andhra Pradesh, pin code-500035, India)
** (Assistant professor, IT Department, Aurora’s Technological and Research Institute,
JNTUH Hyderabad, Andhra Pradesh, pin code-500035, India)
ABSTRACT
Automated teller machines (ATMs) are encryption algorithm was a simulation of the M-209
well known devices typically used by individuals cipher machine used by the U.S.
to carry out a variety of personal and business It has long been known that all a cracker need do to
financial transactions and/or banking functions. acquire access to a Unix machine is to follow two
ATMs have become very popular with the simple steps, namely:
general public for their availability and general 1) Acquire a copy of that site’s /etc/passwd file,
user friendliness. ATMs are now found in many either through an unprotected uucp link, well known
locations having a regular or high volume of holes in sendmail, or via ftp or tftp
consumer traffic. Various services and resources 2) Apply the standard (or a sped-up) version of the
need protection from unauthorized use. Remote password encryption algorithm to a collection of
authentication is the most commonly used words, typically /usr/dict/words plus some
method to determine the identity of a remote permutations on account and user names and
client. This paper investigates a systematic compare the encrypted results to those found in the
approach for authenticating clients by three purloined /etc/passwd file.[3]
factors, namely password, smart card, and A SIM card contains a unique serial number it reads
biometrics. Biometrics is the identification of the international mobile subscriber identity (IMSI),
humans by their characteristics or traits. A security authentication and ciphering information,
physiological biometric would identify by one's temporary information related to the local network, a
voice, Face, hand print or behaviour. Since list of the services that the user has to access the
biometric identifiers are unique to individuals, two passwords: a personal identification number
they are more reliable in verifying identity than (PIN) for ordinary use and a personal unblocking
token and knowledge-based methods. code (PUK) for PIN unlocking.
Keywords— User authentication, Smart card, Face Cryptographers have traditionally analysed
Recognition and security the security of ciphers by modelling cryptographic
algorithms as ideal mathematical objects. A modern
cipher is conventionally modelled as a black box that
I. INTRODUCTION accepts plaintext inputs and provides cipher text
In a traditional password authentication outputs. Inside this box, the algorithm maps the
scheme, a system server has to be able to inputs to the outputs using a predefined function that
authenticate a remote logon based on identity and depends on the value of a secret key. The black box
password. [2] Password authentication protocols is described mathematically and formal analysis is
have two entities that share a password for the basis used to examine the system's security. In a modern
of authentication. Password authentication can be cipher, an algorithm's security rests solely on the
categorized into two types: weak-password concealment of the secret key.[4] Smart cards serves
authentication schemes and strong-password ATM cards and mobile phone SIMs, authorization
authentication schemes. strong-password cards to provide high-security identification and
authentication protocols have the advantages over access-control cards, Smart cards can be used as
the weak-password authentication schemes in that electronic wallets. The smart card chip can be
their computational overhead are lighter, designs are "loaded" with funds to pay parking meters and
simpler, and the implementation are easier in the vending machines. These Cryptographic protocols
computational environments. protect the exchange of money between the smart
The security of accounts and passwords has card and the accepting machines.
always been a concern for the developers and users .
of Unix. When Unix was younger, the password
1141 | P a g e
2. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1141-1144
II. FUNCTIONALITY OF SMART CARD 3-Factor-Login-Auth: This is another interactive
Smart cards themselves usually are a small protocol between the client C and the server S; this
part of a much more complex system. There are enables the client to login successfully using PW,
usually complex networks of card terminals SC, and BioData. An execution of this protocol is
connecting to other backend host computers that denoted by
process the information from transactions occurring
at the card terminals. Companies investing in this
infrastructure have a vested interest in standardizing
the system components to guarantee the longevity of
the system. Without standards, different
manufacturers¢ components would not interoperate.
The output of this protocol is “1” (if the
The smart card systems would not be generally
authentication is successful) or “0” (otherwise).
accepted because users would be forced to carry
3-Factor-Password-Changing: This protocol enables
around many different, non-interoperable smart
a client to change his/her password after a successful
cards. This is an untenable situation for both users
authentication. The data in the smart card will be
and manufacturers. [5]
updated accordingly
Smart cards provide computing and
business systems the enormous benefit of portable
3-Factor-Biometrics-Changing2: An analogue of
and secure storage of data and value. At the same
password- changing is biometrics-changing, namely
time, the integration of smart cards into your system
the client can change his/her biometrics used in the
introduces its own security management issues, as
authentication, e.g., using a different finger or using
people access card data far and wide in a variety of
iris instead of finger. While biometrics-changing is
applications.
not supported by previous three-factor authentication
In a PKI system a Digital Signature verifies
protocols, we believe it provides the client with
data at its origination by producing an identity that
more flexibility in the authentication. [1]
can be mutually verified by all parties involved in
the transaction. A cryptographic hash algorithm
produces a Digital Signature. III. PRINCIPAL OF COMPONENT ANALYSIS
(PCA) [6]:
A. It ensure data privacy, by encrypting data Principal component analysis (PCA) creates
B. It ensures data integrity, by recognizing if data new variables that consist of uncorrelated, linear
has been manipulated in an unauthorized way combinations of the original variables. PCA is used
C. Ensures data uniqueness by checking that data is to simplify the data structure PCA also known as
"original", and not a "copy" of the "original". The Karhunen Loeve projection. PCA calculates the
sender attaches a unique identifier to the "original" Eigen vectors of the covariance matrix, and projects
data. This unique identifier is then checked by the the original data onto a lower dimensional feature
receiver of the data. space, which is defined by Eigen vectors with large
Eigen values. PCA has been used in face
Smart Card based Protocol provides three- representation and recognition where the Eigen
factor authentication protocol involves a client C and vectors calculated are referred to as Eigen faces. In
a server S, and consists of five phases. gel images, even more than in human faces, the
3-Factor-Initialization: S generates two system dimensionality of the original data is vast compared
parameters PK and SK. PK is published in the to the size of the dataset, suggesting PCA as a useful
system, and SK is kept secret by S. An execution of first step in analysis. There are many approaches to
this algorithm is denoted by 3-Factor-Initialization face recognition ranging from the Principal
(k) (PK, SK), where K is system’s security Component Analysis (PCA) approach (also known
parameter. as Eigen faces). Prediction through feature matching.
The idea of feature selection and point matching has
3-Factor-Reg: A client C, with an initial password been used to track human motion. Eigen faces have
PW and biometric characteristics BioData, registers been used to track human faces. They use a principal
on the system by running this interactive protocol component analysis approach to store a set of known
with the server S. The output of this protocol is a patterns in a compact subspace representation of the
smart card SC, which is given to C. An execution of image space, where the subspace is spanned by the
this protocol is denoted by Eigen vectors of the training image set. It is one of
the more successful techniques of face recognition
and easy to understand and describe using
mathematics. This method involves using Eigen
faces [6]
1142 | P a g e
3. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1141-1144
IV. FACE RECOGNITION [7]:
The ability to recognize people by their
facial characteristics Computers can conduct facial
database searches and/or perform live, one-to-one or
one-to-many verifications with unprecedented
accuracy and split-second processing. Users can be
granted secure access to their computer, mobile
devices, or for online e-commerce, simply by
looking into their Web camera.
The following details that can be shown
Security
- Military applications
Personal information access
-ATM Fig: 3 it shows the administration details
-Home access
Improved human machine interaction
Many face verification applications make it
mandatory to acquire images with the same camera.
However, some applications, particularly those used
in law enforcement, allow image acquisition with
many camera types. This variation has the potential
to affect algorithm performance as severely as
changing illumination. But, unlike the effects of
changing illumination, the effects on performance of
using multiple camera types have not been
quantified. [7]
V. FIGURES Fig:4 User Registration Form
Fig: 1 It shows the Bank Details
Fig:5 Capturing the image
Fig: 2 it shows the types of Bank
Fig:6 User Enter the PIN Details
1143 | P a g e
4. Sivasankar Bandaru, Swapna. S / International Journal of Engineering Research and
Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 1, January -February 2013, pp.1141-1144
Security,” Proc. Second USENIX
Workshop Security, 1990.
[4] T.S. Messerges, E.A. Dabbish, and R.H.
Sloan, “Examining Smart-Card Security
under the Threat of Power Analysis
Attacks,” IEEE Trans. Computers, vol. 51,
no. 5, pp. 541-552, May 2002.
[5] Jorge Ferrari, Robert Mackinon, Sasan Poh
and Lakshman Yathwara.” Smart card:
Case Study” International Technical
support Organization, October 1998.
[6] Srinivasulu Asadi, Dr.Ch.D.V.Subba Rao
and V.Saikrishna “A Comparative study of
Fig:7 Transaction Details Face Recognition with Principal
Component Analysis and Cross-Correlation
VI. CONCLUSION: Technique” International Journal of
ALL THE FUNCTIONS OF THE ATM, THE Computer Applications (0975 – 8887)
AUTHORS ARE NOW CONCENTRATING ON Volume 10– No.8, November 2010.
DEVELOPING THE INTENTION RECOGNITION, MOBILE [7] P. J. Phillips, A. Martin C. L. Wilson and
BASED PROCESSING AND ALERT MODULE.
M. Przybocki, “An Introduction to
This paper presents a novel architecture that Evaluating Biometric Systems,” IEEE
can be used as a means of interaction between Computer, Vol.33, No.2, Feb. 2000, pp. 56-
mobile phone, ATM machine and a Banking 63.
application for the purpose of withdrawing cash. The
proposed design; the secure M-cash withdrawal
allows the use of mobile phones as a tool of Authors Profile:
interaction and provide flexibility through a robust
identity management architecture. The first part of
the architecture is the process of being implemented
and all the process involved has been analysed and
justified where possible.
VII. ACKNOWLEDGMENT Sivasankar Bandaru is pursuing M.
I would like to thanks some great mind Tech in Web Technologies from Aurora’s
without whom this research would have been Technological and Research Institute, JNTUH, A.P,
adistant reality. I am totally by the side of these INDIA. His research areas include Distributed
people. I would like to say thanks to my parents who System, and Computer networks.
support to me carry out my research without any
hindrance. My deepest thanks to great person, my
mentor Asst Prof. Swapna. S without whose ideas it
was impossible.
REFERENCES
[1] Xinyi Huang, Yang Xiang, Member, IEEE, S. Swapna received her M.Sc.
Ashley Chonka, Jianying Zhou, and Robert Computer Science in 2007 from Reddy women’s
H. Deng, Senior Member, IEEE “A Generic College Narayanguda and M. Tech in Web
Framework for Three-Factor Technologies from Aurora’s Technological and
Authentication: Preserving Security and Research Institute, JNTUH, A.P, INDIA. Her area of
Privacy in Distributed Systems” IEEE expertise includes Operating system, Web Security
TRANSACTIONS ON PARALLEL AND and Database and Management System (DBMS),
DISTRIBUTED SYSTEMS, VOL. 22, NO. image processing. She is working as Assistant
8, AUGUST 2011. Professor in department of Information Technology
[2] C.H. Lin and Y.Y. Lai, “A Flexible at Aurora’s Technological and Research Institute,
Biometrics Remote User Authentication Hyderabad.
Scheme,” Computer Standards Interfaces,
vol. 27, no. 1, pp. 19-23, Nov. 2004.
[3] D.V. Klein, “Foiling the Cracker: A Survey
of, and Improvements to, Password
1144 | P a g e