The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
This document proposes enhancing credit card transaction security in ATMs through a three-step verification process using password, fingerprint recognition, and one-time passwords (OTPs). It involves using KNN clustering to verify passwords, displaying a dummy balance if the password is incorrect, matching fingerprints to stored templates, and sending an OTP to the registered phone number if fingerprints match. This approach aims to strengthen user authentication and prevent fraudulent transactions using stolen cards and passwords guessed through brute force attacks. The system is analyzed in MATLAB and is found to provide improved security over existing one-step password verification methods.
The document discusses new authentication technologies including biometric identification using fingerprints, iris patterns, etc. It describes various hardware and software token options for two-factor authentication such as smart cards, magnetic stripe cards, mobile phones, and smartphones. It also discusses ensuring the security of passwords and authentication systems.
This document presents a project titled "Fingerprint Recognition for Security" by Bisangabagabo Alphonse. The project aims to use fingerprint recognition to improve student identification for security at KIST by replacing the current system of using ID cards. The system will utilize fingerprint scanning, matching, and identification algorithms built with C programming language. It seeks to address issues like unauthorized access and students missing classes when cards are lost or forgotten by implementing an accurate biometric authentication solution based on individuals' unique fingerprint data.
This document discusses a proposed five-factor authentication scheme for secure banking transactions. The five factors are RFID card, PIN number, fingerprint, one-time password (OTP), and keypad ID. During registration, users provide fingerprints and other information that is stored. For login, the user submits their RFID card, PIN, and fingerprint. If the fingerprint exactly matches, the transaction is allowed. If not, an OTP is sent to the user's phone for verification along with keypad ID before allowing the transaction. The scheme aims to improve security over three-factor authentication while protecting user privacy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document outlines the software requirements specification for a fingerprint-based transaction system. It includes sections on introduction, overall description of the system, system features, and software interface requirements. The system will use fingerprint authentication to allow users to conduct transactions without cash or ATM cards. It aims to provide a secure and convenient transaction method. The document defines requirements for the fingerprint database, transaction processing, performance, and interfacing with bank computer systems.
An efficient implementation for key management technique using smart card and...ijctcm
The document describes a proposed key management technique using smart cards and Elliptic Curve Integrated Encryption Scheme (ECIES) cryptography. The technique involves 4 phases: registration, login, verification, and password change. ECIES encryption and decryption are used to securely transmit keys during the process. The proposed approach aims to provide a more secure smart card-based key management solution compared to existing techniques.
The ultimate across the board user authentication approach in use today is evidently the password-based authentication.
When we carry out a credit card transaction through the EDC (Electronic Data Capture) machine in the public, the user’s PIN number
becomes very much vulnerable to the direct observation by nearby adversaries in huddled places, promoted by vision enhancing and/or
recording appliances. Devising a secure PIN entry method during the credit card transaction in such a situation is a strenuous task.
Currently, there is no pragmatic solution being implemented for this problem. This paper starts with the investigation of the current
status about the direct experiential attacks. Our analysis about these attacks terminates that no practical available solution at present for
these direct observational attacks. This paper introduces a model which attempts to make the PIN number entry secure during credit
card transactions in public places. Our model aims to use the user’s mobile phone for PIN number entry rather than the merchant’s
user machine. The best tract about the proposed model is that the PIN number does not get revealed to any of the direct observational
attacks, be it direct human observation or observation by a video camera.
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
This document proposes enhancing credit card transaction security in ATMs through a three-step verification process using password, fingerprint recognition, and one-time passwords (OTPs). It involves using KNN clustering to verify passwords, displaying a dummy balance if the password is incorrect, matching fingerprints to stored templates, and sending an OTP to the registered phone number if fingerprints match. This approach aims to strengthen user authentication and prevent fraudulent transactions using stolen cards and passwords guessed through brute force attacks. The system is analyzed in MATLAB and is found to provide improved security over existing one-step password verification methods.
The document discusses new authentication technologies including biometric identification using fingerprints, iris patterns, etc. It describes various hardware and software token options for two-factor authentication such as smart cards, magnetic stripe cards, mobile phones, and smartphones. It also discusses ensuring the security of passwords and authentication systems.
This document presents a project titled "Fingerprint Recognition for Security" by Bisangabagabo Alphonse. The project aims to use fingerprint recognition to improve student identification for security at KIST by replacing the current system of using ID cards. The system will utilize fingerprint scanning, matching, and identification algorithms built with C programming language. It seeks to address issues like unauthorized access and students missing classes when cards are lost or forgotten by implementing an accurate biometric authentication solution based on individuals' unique fingerprint data.
This document discusses a proposed five-factor authentication scheme for secure banking transactions. The five factors are RFID card, PIN number, fingerprint, one-time password (OTP), and keypad ID. During registration, users provide fingerprints and other information that is stored. For login, the user submits their RFID card, PIN, and fingerprint. If the fingerprint exactly matches, the transaction is allowed. If not, an OTP is sent to the user's phone for verification along with keypad ID before allowing the transaction. The scheme aims to improve security over three-factor authentication while protecting user privacy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document outlines the software requirements specification for a fingerprint-based transaction system. It includes sections on introduction, overall description of the system, system features, and software interface requirements. The system will use fingerprint authentication to allow users to conduct transactions without cash or ATM cards. It aims to provide a secure and convenient transaction method. The document defines requirements for the fingerprint database, transaction processing, performance, and interfacing with bank computer systems.
An efficient implementation for key management technique using smart card and...ijctcm
The document describes a proposed key management technique using smart cards and Elliptic Curve Integrated Encryption Scheme (ECIES) cryptography. The technique involves 4 phases: registration, login, verification, and password change. ECIES encryption and decryption are used to securely transmit keys during the process. The proposed approach aims to provide a more secure smart card-based key management solution compared to existing techniques.
The ultimate across the board user authentication approach in use today is evidently the password-based authentication.
When we carry out a credit card transaction through the EDC (Electronic Data Capture) machine in the public, the user’s PIN number
becomes very much vulnerable to the direct observation by nearby adversaries in huddled places, promoted by vision enhancing and/or
recording appliances. Devising a secure PIN entry method during the credit card transaction in such a situation is a strenuous task.
Currently, there is no pragmatic solution being implemented for this problem. This paper starts with the investigation of the current
status about the direct experiential attacks. Our analysis about these attacks terminates that no practical available solution at present for
these direct observational attacks. This paper introduces a model which attempts to make the PIN number entry secure during credit
card transactions in public places. Our model aims to use the user’s mobile phone for PIN number entry rather than the merchant’s
user machine. The best tract about the proposed model is that the PIN number does not get revealed to any of the direct observational
attacks, be it direct human observation or observation by a video camera.
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
This document summarizes a survey on cardless automated teller machines (ATMs). It discusses using fingerprint authentication and one-time passwords (OTPs) sent via global system for mobile communications (GSM) to allow customers to withdraw cash from an ATM without a debit card. The proposed system uses a fingerprint module and microcontroller to authenticate users via their fingerprint. An OTP is then sent to the user's mobile phone for an additional layer of security. If the fingerprint and OTP match, the user's bank account will open on the ATM machine and allow cash withdrawals. The document compares this approach to existing card-based ATM security and pin-based authentication methods.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
A card reader is a device that reads data from cards with embedded storage media such as magnetic strips, computer chips, or barcodes. Modern card readers can read various types of cards including memory cards, smart cards, and magnetic stripe cards like credit cards. Card readers support the input of data from cards into computer systems and have evolved from early punched card readers to current electronic devices that interface with computer systems through common connections like USB.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
This document proposes a two-factor authentication system that uses smartphones to generate one-time passwords (OTPs). It aims to improve security over traditional password-based systems while reducing costs compared to hardware token-based OTP systems. The proposed system would have client software on PCs and Android apps to generate OTPs using cryptographic algorithms and unique device identifiers. OTPs would be validated by the server to authenticate transactions. Future work could explore using images instead of OTPs for two-factor authentication via mobile apps.
This document describes a proposed system for enhancing security at ATM machines using fingerprint recognition and SMS authentication. The key points are:
1. The system would collect customers' fingerprints and mobile numbers when opening accounts, and use fingerprints to identify customers at the ATM.
2. When a customer places their finger on the fingerprint module, a unique 4-digit code would be sent via SMS to their registered mobile.
3. The customer must enter the code on the ATM touchscreen for authentication. If correct, the ATM transaction could proceed. Otherwise, police would be alerted.
This approach aims to more securely identify customers than cards and PINs alone by adding fingerprint and SMS verification layers
This document describes a proposed system to assist visually impaired people in using ATMs. The system would allow users to select either a normal or special "blind mode" using voice commands. In blind mode, a fingerprint scanner and encrypted smart card are used for authentication instead of a PIN. Voice prompts then guide the user through transactions like checking balances or withdrawing cash. The system aims to provide independent banking access for the visually impaired through fingerprint authentication and voice interaction instead of traditional screen-based ATM interfaces.
Document Verification through C-One E-Id - CopyRima Hajou
The document discusses a project to develop a mobile application for verifying identity documents using a C-One E-ID handheld device. The application extracts data like fingerprints from documents and ID cards, compares the extracted data to the holder's live fingerprints scanned using the device, and verifies their identity. The document outlines the technologies used including fingerprint biometrics, machine readable travel documents, smart cards, and security features to access identity data. It describes the challenges faced in extracting data from documents and the partial success in developing applications to verify e-passports and smart ID cards by reading selected data fields and fingerprints.
Biometric system is a pattern identification system that recognizes an individual by determining the originality of the physical features and behavioral characteristic of that person. Of all the recently used biometric techniques, fingerprint identification systems have gained the most popularity because of the prolonged existence of fingerprints and its extensive use. Fingerprint is dependable biometric trait as it is an idiosyncratic and dedicated. It is a technology that is increasingly used in various fields like forensics and security purpose. The vital objective of our system is to make ATM transaction more secure and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, there is no need to carry ATM cards to perform transactions. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and UART microcontroller. The Fingerprint and the user_id of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine. A Fingerprint scanner is used to acquire the fingerprint of the individual, after which the system requests for the PIN (Personal Identification Number). The user gets three chances to get him authenticated. If the fingerprints do not match further authentication will be needed. After the verification with the data stored in the system database, the user is allowed to make transactions.
The document discusses security threats and countermeasures related to smart cards, including physical attacks such as etching the chip surface, side channel attacks like power analysis to extract cryptographic keys, and attacks specific to contactless smart cards like covert transactions initiated without user knowledge. It analyzes these threats and their countermeasures, noting that while attacks can be subdued, perfect security is impossible to achieve for smart cards due to necessary trade-offs in their design.
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
The document proposes a new authentication method called the revolving flywheel PIN-entry method to prevent shoulder surfing attacks. The method uses a revolving flywheel with three layers and sections containing randomly placed numbers and colors. Users register a PIN and for authentication must enter the PIN by clicking color pads associated with the numbers on the flywheel instead of entering the actual digits. The method aims to provide secure, usable authentication in a short time period and could be applied to systems like ATMs.
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
This document proposes an artificial intelligence-based smart ATM system with enhanced security features. It summarizes existing ATM security issues and proposes adding biometric authentication using fingerprints instead of cards and PINs. The proposed system uses AI for easy user interaction, image processing to detect issues like insufficient funds, and additional security measures like automatic door locking, alerts to law enforcement, and limiting the number of users in the ATM area at one time. The goal is to add multiple layers of security to reduce ATM fraud and theft compared to existing card-and-PIN based systems.
The document discusses various topics related to payment security including PCI, smart cards, ATMs, e-commerce, and their security measures. It defines PCI as a standard to securely store and transmit credit card data. Smart cards are described as integrated circuit cards that can store and process data through a reader. ATMs are explained as machines that allow customers to perform bank transactions without assistance. E-commerce involves buying/selling online, and the document outlines different models and advantages/disadvantages. Security measures for each topic are also summarized such as PCI DSS requirements, smart card encryption, ATM cameras, and e-commerce digital signatures.
This document summarizes a research paper on implementing a fingerprint-based biometric authentication system for ATMs using a PIC microcontroller. It describes how fingerprint identification works by analyzing ridge and valley patterns. The system uses a PIC16F877A microcontroller to collect fingerprint data from a fingerprint sensor module and match it to an enrolled fingerprint template to authenticate users. If a match is found, the ATM cashbox opens, and if not, an alarm sounds. The document discusses the methodology, advantages, limitations and components of the system, including the fingerprint sensor, microcontroller, LCD display, motor driver, and buzzer.
This document provides an overview of smart cards, including their history and uses. It discusses how smart cards ease logistical issues for wireless carriers by storing subscription information externally on the card rather than internally on the device. This allows users to easily personalize and depersonalize devices and supports a global distribution network. Smart cards also provide opportunities for value-added services, enhancing security and creating switching costs for users. Various industries and applications are exploring uses of smart cards, with financial services being an early adopter. Overall smart cards provide secure authentication and a platform for new services in wireless and other industries.
This document discusses different types of electronic locking systems used in hotels, including keycard systems, biometric locks, RFID locks, and smart cards. It describes the security and operational advantages of electronic locking systems over traditional mechanical keys, such as improved security from unique keys that can be remotely deactivated if lost, the ability to trace access records, and lower costs of rekeying. The document also outlines various keycard types like memory cards, smart cards, and magnetic strip cards, as well as one-way and two-way communication systems between locks and a central database.
IRJET- Two Level Authentication for Banking SystemIRJET Journal
1) The document proposes a two-level authentication system for banking that uses fingerprint authentication and OTPs sent via SMS to add security to ATM transactions.
2) Currently, ATM security relies solely on PIN numbers, which has limitations. The proposed system would require a user's fingerprint to be verified before an OTP is sent to their mobile number for the transaction.
3) This additional verification through biometrics and one-time codes would help address problems with stolen cards, shoulder surfing, and use of skimming devices. It aims to provide more secure access to bank accounts through ATMs.
This document discusses smart card security and summarizes research into vulnerabilities in the .NET smart card platform. It provides an overview of smart card applications and operating systems, then discusses attacks against smart cards that have been reported in the news. The document focuses on analyzing the security of .NET smart cards, including how the HiveMod tool was created to aid vulnerability research by allowing visualization and manipulation of .NET smart card binaries. It demonstrates how the tool could be used to spoof a digital signature and bypass the application firewall as a proof of concept attack. Responses from vendors are presented, and the conclusion discusses remaining security challenges but also potential for patching vulnerabilities.
Fingerprint Authentication for ATM was about the biometric authentication security system for ATM which enabled the fingerprint authentication for traditional cash machines.
# Synopsis
https://www.slideshare.net/ParasGarg14/project-synopsis-68167417
# Report
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM/blob/master/Reports/Project%20Report.pdf
# Code
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM
The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication.
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
This document summarizes a survey on cardless automated teller machines (ATMs). It discusses using fingerprint authentication and one-time passwords (OTPs) sent via global system for mobile communications (GSM) to allow customers to withdraw cash from an ATM without a debit card. The proposed system uses a fingerprint module and microcontroller to authenticate users via their fingerprint. An OTP is then sent to the user's mobile phone for an additional layer of security. If the fingerprint and OTP match, the user's bank account will open on the ATM machine and allow cash withdrawals. The document compares this approach to existing card-based ATM security and pin-based authentication methods.
Abstract: Contactless smart card technology work on a secure microcontroller or embedded in a device that communicates with a reader with use of a contactless radio frequency (RF) interface. Smart Cards are secure portable storage devices used for many applications especially security related which involving access to system’s database. For the future of smart card to be bright, it is important to look into several aspects and factors especially those resulted due to the rapid advancement in communication technology. This paper looks into current trends in smart card technology and highlights what is likely to happen in the future. Moreover, the paper addresses other aspects in order to identify the core concepts that are of interest to smart card developers and researchers. Keywords: contactless, security
A card reader is a device that reads data from cards with embedded storage media such as magnetic strips, computer chips, or barcodes. Modern card readers can read various types of cards including memory cards, smart cards, and magnetic stripe cards like credit cards. Card readers support the input of data from cards into computer systems and have evolved from early punched card readers to current electronic devices that interface with computer systems through common connections like USB.
This document proposes a system for strengthening security for online banking transactions. It involves multi-level authentication including face recognition, graphical OTP authentication using a 4x4 grid of random numbers, and security questions. Users first register security images, a security pattern by selecting indexes on a 4x4 grid, answers to security questions, and their face is recorded. For login, the security images and username/password are verified. Transactions require face recognition if a webcam is available, otherwise graphical OTP authentication is used where the user selects numbers from the indexes of their security pattern on a randomly generated 4x4 grid. Additionally, two random security questions are asked before completing a transaction. The system aims to provide secure electronic transactions through this multi-factor
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
This document proposes a two-factor authentication system that uses smartphones to generate one-time passwords (OTPs). It aims to improve security over traditional password-based systems while reducing costs compared to hardware token-based OTP systems. The proposed system would have client software on PCs and Android apps to generate OTPs using cryptographic algorithms and unique device identifiers. OTPs would be validated by the server to authenticate transactions. Future work could explore using images instead of OTPs for two-factor authentication via mobile apps.
This document describes a proposed system for enhancing security at ATM machines using fingerprint recognition and SMS authentication. The key points are:
1. The system would collect customers' fingerprints and mobile numbers when opening accounts, and use fingerprints to identify customers at the ATM.
2. When a customer places their finger on the fingerprint module, a unique 4-digit code would be sent via SMS to their registered mobile.
3. The customer must enter the code on the ATM touchscreen for authentication. If correct, the ATM transaction could proceed. Otherwise, police would be alerted.
This approach aims to more securely identify customers than cards and PINs alone by adding fingerprint and SMS verification layers
This document describes a proposed system to assist visually impaired people in using ATMs. The system would allow users to select either a normal or special "blind mode" using voice commands. In blind mode, a fingerprint scanner and encrypted smart card are used for authentication instead of a PIN. Voice prompts then guide the user through transactions like checking balances or withdrawing cash. The system aims to provide independent banking access for the visually impaired through fingerprint authentication and voice interaction instead of traditional screen-based ATM interfaces.
Document Verification through C-One E-Id - CopyRima Hajou
The document discusses a project to develop a mobile application for verifying identity documents using a C-One E-ID handheld device. The application extracts data like fingerprints from documents and ID cards, compares the extracted data to the holder's live fingerprints scanned using the device, and verifies their identity. The document outlines the technologies used including fingerprint biometrics, machine readable travel documents, smart cards, and security features to access identity data. It describes the challenges faced in extracting data from documents and the partial success in developing applications to verify e-passports and smart ID cards by reading selected data fields and fingerprints.
Biometric system is a pattern identification system that recognizes an individual by determining the originality of the physical features and behavioral characteristic of that person. Of all the recently used biometric techniques, fingerprint identification systems have gained the most popularity because of the prolonged existence of fingerprints and its extensive use. Fingerprint is dependable biometric trait as it is an idiosyncratic and dedicated. It is a technology that is increasingly used in various fields like forensics and security purpose. The vital objective of our system is to make ATM transaction more secure and user friendly. This system replaces traditional ATM cards with fingerprint. Therefore, there is no need to carry ATM cards to perform transactions. The money transaction can be made more secure without worrying about the card to be lost. In our system we are using embedded system with biometrics i.e r305 sensor and UART microcontroller. The Fingerprint and the user_id of all users are stored in the database. Fingerprints are used to identify whether the Person is genuine. A Fingerprint scanner is used to acquire the fingerprint of the individual, after which the system requests for the PIN (Personal Identification Number). The user gets three chances to get him authenticated. If the fingerprints do not match further authentication will be needed. After the verification with the data stored in the system database, the user is allowed to make transactions.
The document discusses security threats and countermeasures related to smart cards, including physical attacks such as etching the chip surface, side channel attacks like power analysis to extract cryptographic keys, and attacks specific to contactless smart cards like covert transactions initiated without user knowledge. It analyzes these threats and their countermeasures, noting that while attacks can be subdued, perfect security is impossible to achieve for smart cards due to necessary trade-offs in their design.
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
The document proposes a new authentication method called the revolving flywheel PIN-entry method to prevent shoulder surfing attacks. The method uses a revolving flywheel with three layers and sections containing randomly placed numbers and colors. Users register a PIN and for authentication must enter the PIN by clicking color pads associated with the numbers on the flywheel instead of entering the actual digits. The method aims to provide secure, usable authentication in a short time period and could be applied to systems like ATMs.
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
This document proposes improvements to ATM security through wireless password transfer and keypad shuffling. It discusses how shoulder surfing allows thieves to steal PINs and introduces two techniques to prevent this. Keypad shuffling randomly rearranges keys after each user to confuse onlookers. Wireless password transfer involves the user entering their PIN on their phone via Bluetooth, which is then verified by the ATM. The document provides details on implementing these techniques using components like Arduino, Bluetooth and WiFi modules, buttons, and displays. It describes algorithms for random number generation and OTP creation. The proposed methods aim to enhance security by confusing password guessing and preventing PIN theft.
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
This document proposes an artificial intelligence-based smart ATM system with enhanced security features. It summarizes existing ATM security issues and proposes adding biometric authentication using fingerprints instead of cards and PINs. The proposed system uses AI for easy user interaction, image processing to detect issues like insufficient funds, and additional security measures like automatic door locking, alerts to law enforcement, and limiting the number of users in the ATM area at one time. The goal is to add multiple layers of security to reduce ATM fraud and theft compared to existing card-and-PIN based systems.
The document discusses various topics related to payment security including PCI, smart cards, ATMs, e-commerce, and their security measures. It defines PCI as a standard to securely store and transmit credit card data. Smart cards are described as integrated circuit cards that can store and process data through a reader. ATMs are explained as machines that allow customers to perform bank transactions without assistance. E-commerce involves buying/selling online, and the document outlines different models and advantages/disadvantages. Security measures for each topic are also summarized such as PCI DSS requirements, smart card encryption, ATM cameras, and e-commerce digital signatures.
This document summarizes a research paper on implementing a fingerprint-based biometric authentication system for ATMs using a PIC microcontroller. It describes how fingerprint identification works by analyzing ridge and valley patterns. The system uses a PIC16F877A microcontroller to collect fingerprint data from a fingerprint sensor module and match it to an enrolled fingerprint template to authenticate users. If a match is found, the ATM cashbox opens, and if not, an alarm sounds. The document discusses the methodology, advantages, limitations and components of the system, including the fingerprint sensor, microcontroller, LCD display, motor driver, and buzzer.
This document provides an overview of smart cards, including their history and uses. It discusses how smart cards ease logistical issues for wireless carriers by storing subscription information externally on the card rather than internally on the device. This allows users to easily personalize and depersonalize devices and supports a global distribution network. Smart cards also provide opportunities for value-added services, enhancing security and creating switching costs for users. Various industries and applications are exploring uses of smart cards, with financial services being an early adopter. Overall smart cards provide secure authentication and a platform for new services in wireless and other industries.
This document discusses different types of electronic locking systems used in hotels, including keycard systems, biometric locks, RFID locks, and smart cards. It describes the security and operational advantages of electronic locking systems over traditional mechanical keys, such as improved security from unique keys that can be remotely deactivated if lost, the ability to trace access records, and lower costs of rekeying. The document also outlines various keycard types like memory cards, smart cards, and magnetic strip cards, as well as one-way and two-way communication systems between locks and a central database.
IRJET- Two Level Authentication for Banking SystemIRJET Journal
1) The document proposes a two-level authentication system for banking that uses fingerprint authentication and OTPs sent via SMS to add security to ATM transactions.
2) Currently, ATM security relies solely on PIN numbers, which has limitations. The proposed system would require a user's fingerprint to be verified before an OTP is sent to their mobile number for the transaction.
3) This additional verification through biometrics and one-time codes would help address problems with stolen cards, shoulder surfing, and use of skimming devices. It aims to provide more secure access to bank accounts through ATMs.
This document discusses smart card security and summarizes research into vulnerabilities in the .NET smart card platform. It provides an overview of smart card applications and operating systems, then discusses attacks against smart cards that have been reported in the news. The document focuses on analyzing the security of .NET smart cards, including how the HiveMod tool was created to aid vulnerability research by allowing visualization and manipulation of .NET smart card binaries. It demonstrates how the tool could be used to spoof a digital signature and bypass the application firewall as a proof of concept attack. Responses from vendors are presented, and the conclusion discusses remaining security challenges but also potential for patching vulnerabilities.
Fingerprint Authentication for ATM was about the biometric authentication security system for ATM which enabled the fingerprint authentication for traditional cash machines.
# Synopsis
https://www.slideshare.net/ParasGarg14/project-synopsis-68167417
# Report
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM/blob/master/Reports/Project%20Report.pdf
# Code
https://github.com/ParasGarg/Fingerprint-Authentication-for-ATM
The project sets sight on authenticating the conventional Credit card transaction system. In the prevailing system though the Credit card paves a convenient mode of transactions, it is subjected to more jeopardy. As technology extends its limit, the way of hacking and cracking also goes along the road. In out proposed system, in every transaction with the Credit card a handshaking signal is achieved with the cardholder. The handshaking method is achieved by transferring the transaction time and the purchase details to the mobile of the cardholder by means of a GSM modem. From the acknowledgement and authentication received from the cardholder’s mobile further transaction proceeds. The system used the MCU for the security issues between the Mobile and the Card. Reports can also be generated for every successful authentication.
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
The document proposes augmenting the security of ATM systems by integrating multimodal biometrics like fingerprint and palm print that are linked to individual profiles on the UIDAI server. This enhanced authentication solution would improve security and customer confidence in banking services by providing stronger verification of an individual's identity compared to existing card-based systems. The proposed system models an ATM emulator using a microcontroller that authenticates users through their biometrics and UID card linked to their bank account profile for secure transactions.
This document proposes a real-time SMS-based hashing scheme to secure financial transactions at ATM terminals. The scheme uses fingerprint recognition and password authentication combined with biometric identification technology to better verify customers' identities and improve ATM security. When a user's bank card is lost and password stolen, criminals can quickly drain the account. The proposed scheme addresses this by authenticating users via fingerprint matching with a remote database in addition to a password. If authentication fails after multiple attempts, the system will alert the bank and customer by phone and SMS. The system hardware is based on an ARM9 chip and includes modules for fingerprint scanning, network connectivity, alarms and more. Software initialization processes hardware and modules, while the fingerprint recognition algorithm enhances
Transactions Using Bio-Metric AuthenticationIRJET Journal
This document proposes a new method for securing ATM and point-of-sale transactions using biometric authentication. The current systems that rely only on PINs are not fully secure as PINs can be stolen. The proposed method uses facial recognition combined with PIN entry to verify the identity of the user. It describes capturing a photo of the user's face at the ATM/point-of-sale machine and matching it with their biometric database profile for authentication. If an unauthorized person tries to use the card, their photo would be sent to the registered user for verification before allowing the transaction. This provides improved security over existing authentication methods.
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
This document proposes a new ATM system with enhanced security features using iris scanning and fingerprint scanning technologies. The system uses an iris scanner as the primary authentication method along with a fingerprint sensor embedded in the ATM card as a secondary authentication. It aims to address the increasing problem of ATM skimming and fraud. The system architecture includes a Raspberry Pi microcontroller, RFID module to access customer accounts, fingerprint sensor for authentication, iris scanner, and a database containing user iris and fingerprint data. The iris scanning provides strong authentication since iris patterns do not change over a person's lifetime. The addition of fingerprint scanning on the ATM card adds another layer of security by requiring both biometrics to authenticate transactions. The proposed system is expected
1) The document proposes a smart ATM security system using face recognition to authenticate users. It notes that current ATM security methods have limitations and fraud is a growing issue.
2) The proposed system uses a fingerprint module and camera on the ATM to verify a user's fingerprint and face match what is on file before allowing transactions. If an unauthorized person tries to use the card, their image and one-time password will be sent to the cardholder.
3) The system is controlled with a Raspberry Pi and aims to prevent ATM theft, fraud, and support secure transactions by only allowing authorized users after biometric verification.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
During the past decade e banking has emerged with enormous speed The use of e banking and the application of e banking is now enormous these days But the modern banking completely relies on internet and computer technology, the threats and the chances of breaching the security has also increased We are totally dependent on the internet to carry out the transactions and the daily routines in the banks Thus there is the immense need of increasing the security in the banking field We have developed the system in which we have developed a secure banking system We are using Finger print authentication device and the GSM module to carry out the functionalities of the system Bilal Hussain Ch | Subayyal "Secure E-Banking Using Bioinformatics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18455.pdf
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
This document proposes a system that uses triangular location detection with IoT, OpenCV, and Zigbee hardware for user authentication during ATM cash loading for improved security. The system uses three Zigbees connected to the delivery vehicle, user's mobile phone, and ATM. When all three are within range, indicating the vehicle is at the ATM, an OTP is generated and verified between the vehicle and ATM Zigbees. In addition to OTP, user signature is verified using OpenCV after cash is loaded into the ATM, providing multi-factor authentication. This integrated system aims to provide more reliable and effective security compared to existing signature or PIN-based authentication alone.
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
The sole reason to go with this project is to increase the security for the people using ATM. Once the card and password related to it is stolen it might be a huge loss to the card holder, so to rectify this problem we are implementing this project. Now a day’s using the ATM (Automated Teller Machine) which provide customers with the convenient banknote trading is very common. In the recent times the cases regarding the illegal transactions has shown a considerable increase. How to carry on the valid identity to the customer becomes the focus in current financial circle. Traditional ATM systems authenticate generally by using the credit card and the password, the method has some defects. In recent years, the algorithm of fingerprint recognition has been continuously updated, which has offered new verification means for us. The original password authentication method combined with the biometric identification technology verify the clients’ identity better and achieve the purpose that use of ATM machines improve the safety effectively.
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
This document summarizes several research papers on providing security for digital payment systems. It discusses using digital tokens along with blockchain technology to protect personal and account details. It also reviews using RFID technology and mobile phones for authentication instead of security tokens. Blind signatures with blockchain are proposed to build a private reputation system. Overall, the literature survey analyzes different approaches for building secure transaction applications.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
Intellectual Bank Locker Security SystemIJERA Editor
In today's modern world, security plays an important role. Every person has precious accessories like gold,
documents or cash. The main goal of this project is to design and implement a bank locker security system
based on fingerprint and GSM technology. It reduces wastage of time for both banker as well as customer and
provides advanced security. In this system, only authentic persons can recover money or accessories from bank
locker. In this system the user’s name, fingerprint and mobile number are enrolled. If the fingerprint matches,
then four digit code will be sent to the authorized person’s mobile through GSM modem and the locker door
will be opened then, otherwise it will be in locked position and gives an alarm when any mismatch occurs. The
sensors will be active during night times to provide security against thefts.
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
This document describes a RFID-based automatic door locking system for home security. The system uses an Arduino nano microcontroller, RFID reader and tags, wireless transmitter and receiver modules, NodeMCU for WiFi connectivity, a 3x4 keypad, and servo motor. The system provides three ways to unlock the door - using a password via keypad, detecting an authorized RFID tag, or using a mobile application. It aims to remotely control the door unlock via a web connection and message passing between the owner and door lock for increased security and convenience.
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
This document discusses a proposed biometric and magic PIN authentication system for ATMs. The system would combine the use of a physical access card, a randomly generated "MagicPIN", and facial recognition using deep convolutional neural networks. If adopted, the system aims to improve security by verifying card owners' identities through biometric authentication in addition to requiring possession of the access card. The system is intended to help solve problems of account security and ensure only the real account owner can access their accounts. It analyzes related work on ATM security and discusses how the proposed system could provide benefits like being more secure, convenient, and preventing fraud compared to existing PIN-based authentication methods.
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
This document proposes an advanced security system for bank lockers using biometric authentication and GSM technology. The system aims to provide more secure access to bank lockers than traditional key-based systems. It works by enrolling users through fingerprint scanning and storing their fingerprint data and mobile number in a database. When a user wants to open their locker, the system verifies their identity by matching their fingerprint and sends a one-time password via SMS to their registered mobile number. The user then enters this password to unlock the locker, providing two-factor authentication through biometrics and mobile verification. The system is designed to address security issues with lost or duplicated keys and keep pace with digital authentication methods.
The document proposes a virtual password system to improve security for online banking transactions. In the proposed system, a mobile application is used to generate one-time virtual passwords based on a permanent PIN number and random number, removing the vulnerabilities of password delivery via SMS. This virtual password system aims to enhance security by making password guessing and hacking techniques like phishing and keylogging more difficult to exploit.
This document describes a proposed anti-fraud security system for ATMs. The current ATM security relies on PINs and message passing, but higher levels of fraud require improved security. The proposed system adds several new modules: user registration to permit access by others, PIN verification with message confirmation, camera activation to verify the user, location tracing if not verified, and permitting access if confirmed by a registered user. The system aims to reduce ATM theft and fraud while maintaining usability. It was inspired by security needs in banking and would help limit financial risk for customers and banks from ATM transactions.
Similar to Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording Attacks in ATM (20)
The effect of functionalized carbon nanotubes on thermalmechanical performanc...IJRTEMJOURNAL
The new approaches for preparing nanocomposite coating by modificated carbon nanonotubes
(CNTs) and epoxy resin was done in the study. thermal-mechanical performance of nanocomposite coating was
investigated and the results were reported in this paper. The physic-chemical techniques such as Differential
scanning calorimetry (DSC) and Thermal gravimetric analysis (TGA) were used to characterize the thermal
performance of Epoxy nanocomposite coating. The test techniques for mechanical properties of paint coating as
adhesion, hardness, impact resistance and bending strength were employed in the work. The results indicated
that CNTs were dispersed in epoxy coating with only ratio of 0.1 wt% enhanced the Glass Transition
Temperature (Tg), decomposition temperature of epoxy coating and improved mechanical properties
significantly. Also functionalized CNTs can be reinforced thermal-mechanical of the epoxy coating better than
neat CNTs.
Study of desalination processes of seawater from the desalination plant of La...IJRTEMJOURNAL
The use of water for food purposes requires excellent physicochemical quality. To contribute to
the control of water quality. Water treated by reverse osmosis is aggressive and demineralize can not be used
directly as a source of drinking water. The objective of this work is to study, physics-chemical analyzes of raw
water, pretreated osmosis and treated (permeate) and produced water (reservoir) at the desalination plant of
seawater Laayoune (SDL), located in southern Morocco. For this, we have followed several qualitative
parameters such as pH, conductivity, turbidity
Multi products storage using randomnessIJRTEMJOURNAL
This document discusses a study of implementing a randomized storage system in a multi-product warehouse belonging to an automotive supplier. The traditional ABC storage system was causing issues like empty locations, lost materials, and long response times to demand variability. The researchers implemented a randomized storage tool that assigns materials to zones based on similar characteristics rather than specific locations. This increased warehouse utilization from 60% to 80-90% and reduced idle time for production areas from 9,000 to 1,000 hours per week. The randomized system provides more flexibility to handle fluctuations while maintaining accurate material records. Training operators and continuous improvement were important to successfully adopting the new approach.
Existence results for fractional q-differential equations with integral and m...IJRTEMJOURNAL
This paper concerns a new kind of fractional q-differential equation of arbitrary order by
combining a multi-point boundary condition with an integral boundary condition. By solving the equation which
is equivalent to the problem we are going to investigate, the Green’s functions are obtained. By defining a
continuous operator on a Banach space and taking advantage of the cone theory and some fixed-point theorems,
the existence of multiple positive solutions for the BVPs is proved based on some properties of Green’s functions
and under the circumstance that the continuous functions f satisfy certain hypothesis. Finally, examples are
provided to illustrate the results.
A study on financial aspect of supply chain managementIJRTEMJOURNAL
The more common approaches used in the SCM consider only the physical logistic operations
and ignore the financial aspects of the supply chain. The main objective to incorporate financial aspects in
supply chain management is to strengthen managerial decisions concerning financial flows in supply chains,
while empirical knowledge about financial supply chain management (FSCM) is in its early stages. This paper
presents a model for FSCM which financial planning in addition to operation planning is decided in it. The
main contribution of this paper is to define two approaches for Financial Supply Chain Management and to
compare them. This financial approaches are: Traditional financial approach and new financial approach.
Traditional financial approach integrates physical goods flows and financial flows. New financial approach
considers in making decisions other financial indicators such as market to book value, liquidity ratios, capital
structure ratios, and return on equity, sales margin, turnover ratios and stock security ratios, among others.
Moreover, the new approach applies the change in equity instead of the traditional approach measures of profit
as the objective function to be maximized in the presented model. To show the attributes of the presented
approaches, the results of the new approach and the traditional approach is compared. The findings indicate
that the traditional approach leads to lower change in equity compared to the financial approach. Also, the
results clearly reveal the better improvement of using the new approach over the traditional approach, and
convince the decision makers to take advantage of the new approach.
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...IJRTEMJOURNAL
Food security is the foremost need of every human society. It is a fundamental right and
government responsibility but still food insecurity is prevalent in rural areas of least developed nations. To cope
with food insecurity, undertaking diverse income generating activities is common as well as key strategy adopted
by rural people. The objective of this study is to assess rural livelihood and food security status of a remote island
named Srilanka Tapu of Sunsari district. A random sampling technique was used to collect primary data from 40
rural household heads using semi-structured questionnaire. Descriptive methods were used for analyzing. The
findings revealed that the food security situation of the Tapu is insecure. Most basic infrastructures and social
services needed for people livelihood such as road, electricity sufficient food availability, education, healthcare,
sanitation, etc. were found to be extremely poor. Most of the households are small scale farmers involving
themselves in diverse livelihood activities which are mostly temporary, low-skilled and low paying. However,
people are fulfilling their food needs at every cost but are highly vulnerable to food insecurity. Also, their lives
security is equally vulnerable because of disastrous Koshi River flooding which occurs every year in the Tapu.
The findings therefore critically suggest that food security of remote and vulnerable human settlements should be
at top priority in policy formulation and implementation level. The study also recommends a need for an in-depth
research for making evidence based policy interventions for improvement of diversify rural livelihood along with
sustainable environment
With mounting concerns over the state of our planet, there is continuing demand that chemists
and chemical engineers should develop greener chemical processes and products. In the 1990s, with the
growing awareness of the hazardous impacts of the chemical industry, the green chemistry revolution was
launched by American chemists Paul T. Anastas and John Warner. Green chemistry is the kind of chemistry that
seeks to minimize pollution, conserve energy, and promote environmentally friendly production. This paper
provides a brief introduction to green chemistry.
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...IJRTEMJOURNAL
There have been incessant reports of the collapse of buildings resulting in the loss of lives and
properties globally. However, there has been a dearth of information regarding any findings about the collapse
of building structures. An extensive study of causes of selected building collapse in Nigeria and abroad is carried
out in this work by visiting some locations of building collapse, reading journals and newspaper articles on
structural defects and testing rubbles collected from collapsed areas. This study therefore examined the general
causes of the collapse of some buildings particularly the reasons for the collapse of Saint Thomas’s 2-storey
Church Hall, Akure. Laboratory testing was carried out in this study to investigate the causes of collapse using
samples from the site of the collapsed building. An appraisal of the structural drawings of the collapsed building
was also investigated. Findings revealed that the building collapsed due to poor design, bad construction
materials and inadequate supervision. The paper concludes that buildings collapse can be reduced in Nigeria by
avoiding all. It recommended use of only duly registered professionals in the building industry for construction.
This document provides an introduction to data warehousing. It defines a data warehouse as a subject-oriented, integrated, time-invariant, and non-volatile collection of data from multiple sources designed to support analysis and decision making. Data warehouses centralize data for analysis, allow analysis of broad business data over time, and are a core component of business intelligence. They improve decision making, increase productivity and efficiency, and provide competitive advantages for organizations. While data warehouses provide benefits, they also face challenges related to scalability, speed, and security.
Resource recycling and waste-to-energy: The cornerstones of circular economyIJRTEMJOURNAL
"Circular Economy" is the pursued goal of sustainable development of mankind for the 21st
century. In short, the fundamental spirit of circular economy is the concept of "Zero Waste". The example used
in our daily lives means 100% of waste treatment, leaving no trace. At this time, it would be an ideal goal that
the waste could be fully recovered into available raw materials or energies. In particular, "waste-to-energy" is
a key factor, because all the wastes are almost related to energy. Resource recycling of waste metal from the
household garbage is the best example. When smelting metals, the refining industry needs to reduce the metal
oxides (mineral materials) to metals, such as steel, aluminium, copper, etc. The reduction processes consume
considerable portion of energy for the entire smelting process, for example, 70.6% for steel and 77.4% for
aluminium. However, if the waste metallic products can be fully recovered, as long as by melting and reshaping,
the original oxide metal reduction processes that consume a lot of energy can be avoided. On the other hand,
when the general garbage cannot be recovered as a resource, they can be converted into fuel or electricity by
biological or thermal treatment. Another more important human waste utilization is the waste paper recycling.
The production of one tonne of raw pulp emits about 6 tonnes of carbon, consuming about 100 cubic meters of
water, using about 200 kilograms of chemical raw materials, and draining 300 tonnes of toxic waste water. The
entire papermaking process is how terrible environmental pollution! The recycled pulp of one tonne can save
energy 10-13GJ.The proportion of paper waste in Taiwan 2015 is 34.69% and the estimated amount is 2.5
million tonnes. If the paper waste could be fully recycled, it could save energy about 0.725 million kloe (kilolitre oil equivalent). In other words, it virtually reduces Taiwan's oil imports of 4.56 million barrels and CO2
emissions of 2.5 million tonnes annually.
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...IJRTEMJOURNAL
Survivin has been studied many times because of its overexpression in several types of cancer
including lung, kidney, skin, endometrium, stomach, colon, breast, prostate, over, hematologic, head and neck
cancers, histopathology features and polymorphisms in the promoter region which belongs to the inhibitör of
apoptosis gene family by researchers. There is no study of survivin immunoreactivity in the gastric mucosa of the
rats fed with carpet shell clam grown in the Dardanelles. In this study, it was aimed to investigate the effects of
carpet shell clam fed rats on survivin production in the gastric mucosa. The carpet shell clam given as food to the
rats were removed from the Dardanelles Çardak region. Four groups of rats are included in the study, group 1
(n=6), control group fed with standard rat food, group 2 (n=6), 75% carpet shell clam and 25% standard rat
food daily, group 3 (n=6), 75% carpet shell clam and 25% standard rat food every two days, group 4 (n=6), 75%
carpet shell clam and 25% standard rat food every three days. To detect survivin localization in the tissues, the
LAB-SA Detection System was used. Survivin immunoreactivity was detected of epithelial cells in the gastric
mucosa of rats fed with carpet shell clam. After the immunohistochemical staining processing all gastric tissue
samples are evaluated in terms of survivin immunoreactivity with light microscopy and image analysis software.
Survivin immunoreactivity was detected 0% in the first group, 83.33% in the second group, 61.83% in the third
group and 32.67% in the fourth group. There was statistically significant difference between the survivin
immunoreactivity in the gastric gland cells of the rats in the experimental and control groups (p> 0.05). Survivin
production in the gastric mucosa of rats suggests that consumption of carpet shell clam may cause tissue damage.
Security and Crime Management in University Libraries in NigeriaIJRTEMJOURNAL
Security and prevention of crime in university library is very paramount duties of librarian. The
survival of a library depends to a large extend on how secured its collections are, security of library resources
constitutes serious challenge facing university libraries in Nigeria. The paper, therefore, investigates security and
crime management in university libraries in Nigeria using university of Jos and university of Ilorin libraries. The
study adopted a descriptive survey method. The population of the study comprised 108 library personnel and
16,012 registered library users in two university libraries. While the sample size consisted of all the 108 library
personnel, and 2% of the registered users to make a total of 428 respondents. Questionnaire and interview with
the university librarians of the selected university libraries were the instruments used for data collection. Data
were analysed using frequency distribution and percentages. Results revealed that security breaches included
stealing/theft of library materials, mutilation of library materials, and non-return of borrowed items. It also
showed inadequate funding, selfish interest of the culprits and lack of institutional security policy in the library.
Base on the findings, that staff security training, electronic security system should be introduced and improve
funding of university libraries among others. Recommendation orientation of users and staff should be done from
time to time in university libraries to mention but few.
Influence of heat treatment on Vitamin C Levels in Oyster MushroomIJRTEMJOURNAL
The study was conducted to investigate the influence of heat treatment during drying process of
Oyster mushroom in the tropics. Mushroom growing is carried out under carefully controlled conditions mostly
in bulk in specific designed tunnels with aerated floors. There are two main purposes, firstly pasteurization; to
free the compost from undesirable microbes and pests and secondly conditioning; to become mushroom specific
by getting clear of ammonia and free of readily available carbohydrates. Through proper manipulation of
temperature and ventilation these two primary objectives are accomplished. Mushrooms have been identified as
an underutilized crop in Africa, with many nutritive and health benefits. It does not require much land and
investment. However, it is highly perishable and there is need to process it to lengthen its shelf life by drying.
However, there is need to ensure that the nutrients are not lost in the process. It is for this reason that this
project investigated the effect of drying on nutrient levels in mushroom. Vitamin C levels were monitored in the
course of drying at 80⁰C, 60⁰C, 50⁰C, 40⁰C and in direct sunlight. It was concluded that the temperature that
gave the best drying rate with minimal nutrient loss was 60⁰C. In general, more than half the Vitamin C is lost
during the range of drying temperatures investigated.
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisIJRTEMJOURNAL
The Crane hooks are very at risk segments that are regularly utilized for mechanical purposes.
In this way such segments in an industry must be produced and composed in an approach to convey most extreme
execution without failure. Failure of a crane hook essentially relies upon three central point i.e. measurement,
material, overload. The undertaking is worried towards expanding the safe load by fluctuating the cross-sectional
measurements of the four distinct segments and diverse materials. The chose areas are square, circle, and
trapezoidal. The territory stays consistent while changing the measurements of the four unique segments. The
crane hook is demonstrated utilizing catia programming. The pressure and life investigation is finished utilizing
ANSYS 18.1 workbench. The ordinary worry along add up to misshaping, stress and life’s according to the
materials considered. It is discovered that trapezoidal cross segment yields most extreme load of 4000 KG to 5000
KG for steady cross segment zone among four cross segment.
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...IJRTEMJOURNAL
This study is part of a macroeconomic approach and seeks to identify the role of the rate of
economic growth and the exchange rate in controlling the macroeconomic framework. The approaches adopted
in this paper are part of Keynesian thinking on macroeconomic stability using the macroeconomic stability
index proposed by Burnside and Dollars (2004) and A. Amine (2005). Our results argue that economic growth
is causing macroeconomic stability and that the exchange rate is negatively and significantly accounting for
macroeconomic stability in the Democratic Republic of Congo.
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloIJRTEMJOURNAL
1. The study estimated the carbon stock and sink in Bongohulawa Village's forest city district in Gorontalo, Indonesia.
2. It found that Casuarina junghuhiana stores more carbon than other tree species, absorbing 33.56 tons of carbon over 19 years.
3. Within the forest city area, there are 1,353 trees of 13 species absorbing a total of 25.521 tons of carbon. Mahogany absorbs the most at 7.16 tons.
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...IJRTEMJOURNAL
This study aims to find the association-ship between the Regional Rank of the Travel and
Tourism Competitiveness Index and its Indicators in 37 European countries. The cross-sectional data of the 37
European countries are collected from the World Economic Forum report- 2015. The statistical software
package, SPSS v. 20.0 is used to analyze the data. ANOVA (Analysis of Variance), Multi-co-linearity, Multiple
Regression, and Residual Analysis are the tools used to analyze to achieve out the objective of the study. RR:
Regional Rank of the Travel and Tourism Competitiveness Index is used as the dependent variable and TI:
Tourism Services Infrastructure, GP: Ground & Port Infrastructure, BE: Business Environment, PT:
Prioritization of Travel and Tourism, and CR: Cultural resources & business travel are used as the independent
variables. It is found that there is an inverse relationship between the dependent variable and all the
independent variables along with the statistical significance. It is recommended that the governments of the
European countries and the respective agents of these countries should be made aware of learning the findings
of this study to promote their countries which can be victorious in lowering their Regional Rank of the Travel
and Tourism Competitiveness Index.
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...IJRTEMJOURNAL
China is in an Age of Economy Thriving and Technology Advancing. This strike
increasing international visitors. In the foreigners, very few of them are able to communicate in
Chinese, which means that it is significant to provide accurate information to the foreign friends by
their understandable codes. For instance, in a hotel, a foreigner needs to know which way to go for
their daily activities without enquiring at the reception desk. These requirements are served by public
signs, e.g. the location of a canteen. Actually, this service is a challenge of Chinese people’s English
level. In recent years, as a lack of contextually linguistic and cultural knowledge, there are some
errors of translation on public English signs, resulting in some inconvenience to the oversea
travelers. This paper will analyses these problems in root and then advance prospective resolutions.
What are the determinants of the non-reimbursement for SMEs in Central Africa...IJRTEMJOURNAL
This article aims to determine the factors that are the cause of the non-repayment of credits
received from financial institutions by Cameroonian SMEs. This choice is sometimes. This non-repayment is
often caused by factors related to the environment and the functioning of SMEs. It aims to analyze and highlight
the factors that put Cameroonian SMEs in a situation of inability to repay the receivables received from
financial institutions. To achieve this goal, we opted for a mixed approach: Inductive (exploration on the
ground) and hypothetico deductive. To do this, we first analyzed the content of the interviews conducted with 15
SME managers and owners and tested data collected from a questionnaire administered face-to-face with 185
Cameroonian SMEs. . We used descriptive analysis and explanatory analysis. Our results show that the tax rate,
the mismanagement of managers, poor accounting and unforeseen situations have a significant positive
influence on the non-repayment of loans, while the age and size of SMEs exert significant negative influence on
the non-repayment of loans by Cameroonian SMEs.
Multivariate regression methods with infrared spectroscopy to detect the fals...IJRTEMJOURNAL
Recently, food safety and guaranteed of food marks have become more important subjects of
foodstuff production and the marketing of processed foods. This paper demonstrates the ability of Mid Infrared
spectroscopy coupled with multivariate regression tools to detect vegetable butter (as adulterant) in a binary
mixture with traditional cow’s butter. Blends of traditional cow’s butter with different percentages of vegetable
butter were measured using Attenuated Total Reflectance-Fourier Transform Mid Infrared Spectroscopy (ATRFTMIR). Spectral and reference data were firstly analyzed by principal component analysis (PCA) to check
outliers samples; and improve the robustness of the prediction models to be established. Multivariate regression
methods as Principal component regression (PCR) and Partial least square regression (PLSR) were used to
establish calibration model. Excellent correlation between ATR-FTMIR analysis and studied butter blends was
obtained R2 = 0.99; with Root Mean Square Errors of Prediction < 3.04, Limit of Detection 9.12% (By PCR)
and 6.06% (by PLSR), and Relative Prediction Errors as low as 3.13.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Software Engineering and Project Management - Introduction, Modeling Concepts...Prakhyath Rai
Introduction, Modeling Concepts and Class Modeling: What is Object orientation? What is OO development? OO Themes; Evidence for usefulness of OO development; OO modeling history. Modeling
as Design technique: Modeling, abstraction, The Three models. Class Modeling: Object and Class Concept, Link and associations concepts, Generalization and Inheritance, A sample class model, Navigation of class models, and UML diagrams
Building the Analysis Models: Requirement Analysis, Analysis Model Approaches, Data modeling Concepts, Object Oriented Analysis, Scenario-Based Modeling, Flow-Oriented Modeling, class Based Modeling, Creating a Behavioral Model.
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Generative AI Use cases applications solutions and implementation.pdfmahaffeycheryld
Generative AI solutions encompass a range of capabilities from content creation to complex problem-solving across industries. Implementing generative AI involves identifying specific business needs, developing tailored AI models using techniques like GANs and VAEs, and integrating these models into existing workflows. Data quality and continuous model refinement are crucial for effective implementation. Businesses must also consider ethical implications and ensure transparency in AI decision-making. Generative AI's implementation aims to enhance efficiency, creativity, and innovation by leveraging autonomous generation and sophisticated learning algorithms to meet diverse business challenges.
https://www.leewayhertz.com/generative-ai-use-cases-and-applications/
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
Accident detection system project report.pdfKamal Acharya
The Rapid growth of technology and infrastructure has made our lives easier. The
advent of technology has also increased the traffic hazards and the road accidents take place
frequently which causes huge loss of life and property because of the poor emergency facilities.
Many lives could have been saved if emergency service could get accident information and
reach in time. Our project will provide an optimum solution to this draw back. A piezo electric
sensor can be used as a crash or rollover detector of the vehicle during and after a crash. With
signals from a piezo electric sensor, a severe accident can be recognized. According to this
project when a vehicle meets with an accident immediately piezo electric sensor will detect the
signal or if a car rolls over. Then with the help of GSM module and GPS module, the location
will be sent to the emergency contact. Then after conforming the location necessary action will
be taken. If the person meets with a small accident or if there is no serious threat to anyone’s
life, then the alert message can be terminated by the driver by a switch provided in order to
avoid wasting the valuable time of the medical rescue team.
Home security is of paramount importance in today's world, where we rely more on technology, home
security is crucial. Using technology to make homes safer and easier to control from anywhere is
important. Home security is important for the occupant’s safety. In this paper, we came up with a low cost,
AI based model home security system. The system has a user-friendly interface, allowing users to start
model training and face detection with simple keyboard commands. Our goal is to introduce an innovative
home security system using facial recognition technology. Unlike traditional systems, this system trains
and saves images of friends and family members. The system scans this folder to recognize familiar faces
and provides real-time monitoring. If an unfamiliar face is detected, it promptly sends an email alert,
ensuring a proactive response to potential security threats.
Height and depth gauge linear metrology.pdfq30122000
Height gauges may also be used to measure the height of an object by using the underside of the scriber as the datum. The datum may be permanently fixed or the height gauge may have provision to adjust the scale, this is done by sliding the scale vertically along the body of the height gauge by turning a fine feed screw at the top of the gauge; then with the scriber set to the same level as the base, the scale can be matched to it. This adjustment allows different scribers or probes to be used, as well as adjusting for any errors in a damaged or resharpened probe.
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording Attacks in ATM
1. Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 1 ǁ January. 2018 ǁ PP 05-10
| Volume 2 | Issue 1 | www.ijrtem.com | 5 |
Improvement of a PIN-Entry Method Resilient to Shoulder-
Surfing and Recording Attacks in ATM
S. Preema ,
Department of Computer Science, VLB Janakiammal College of Arts & Science, Coimbatore, Tamilnadu
ABSTRACT : The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
KEYWORDS: Palettes , Color quantization, LBG algorithm, finite-state algorithm,
I. INTRODUCTION
This work is designed to provide PIN security guidelines for all payment accounts that use a PIN, including those
associated with magnetic stripe cards, chip cards, ‘hybrid’ cards that incorporate both a magnetic stripe and a chip
or any other cardholder payment device form factor The scope of this work extends to system components (for
example service providers, networks, servers, hosts, applications, processes and personnel) which are used to
exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system
or sub-system and between systems. These guidelines are targeted at PIN protection during PIN processing in the
issuer security domain. PIN processing of interchange transactions is covered by the PCI PIN Security
Requirements. A PIN (Personal Identification Number) is a four to twelve digit number known by a cardholder
and used to authenticate the cardholder to the card-issuing bank (or to the cardholder’s ICC). The transaction PIN
is the PIN entered by the cardholder during a payment transaction. The online PIN is the transaction PIN used to
verify the cardholder online. The offline PIN is the transaction PIN used with an ICC to verify the cardholder
offline. The reference PIN is a stored or derived PIN value used by the issuer to verify the transaction PIN.
If stored in an ICC it may or may not be equal to the online PIN. The PIN management guidelines in this document
refer to the following processes. The primary objective of this research paper is to provide a complete knowledge
of ATM and a solution to its pin entry process. To access the funds which are kept in the bank at any time is not
an easy task but today it is not at all difficult. A person just has to tell his bank that he wants an ATM card. The
bank issues him an ATM card which is pass coded and could be used by him alone. ATM card is called by different
names like bank card, MAC(Money access card), client card, key card or cash card, etc. In most cases even debit
and credit card could be used. The ATM card helps the customer to be identified by a plastic ATM card with a
magnetic stripe or a plastic smartcard with a chip. The security is provided by the customer entering a personal
identification number (PIN). Now the person who needs funds when he is taking his family out of shopping or
when he requires funds for an outing it is easily done. If someone falls very seriously ill the person can remove
the funds in the middle of the night too. The ATM machine helps the customer to make his / her life much easier.
It does most The ATM card is slowly replacing cheque, the personal attendance of various customers, has
increased banking hours and reduced the holidays. They do not require any paper based verification. Due to
heavier computing demands and the falling price of personal computer–like architectures, ATMs have moved
away from custom hardware architectures using microcontrollers or application-specific integrated circuits and
have adopted the hardware architecture of a personal computer, such as USB connections for peripherals, Ethernet
and IP communications, and use personal computer operating systems.
II. NATIONAL / INTERNATIONAL STATUS
Today, the vast majority of ATMs worldwide use a Microsoft Windows operating system, primarily Windows
XP Professional or Windows XP Embedded. A small number of deployments may still be running older versions
of the Windows OS, such as Windows NT, Windows CE, or Windows 2000. There is a computer
industry security view that general public desktop operating systems(Dos) have greater risks as operating systems
for cash dispensing machines than other types of operating systems like (secure) real-time operating systems
(RTOS). RISKS Digest has many articles about ATM operating system vulnerabilities.]
With the onset of
2. Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 6 |
Windows operating systems and XFS on ATMs, the software applications have the ability to become more
intelligent. This has created a new breed of ATM applications commonly referred to as programmable
applications. These types of applications allows for an entirely new host of applications in which the ATM
terminal can do more than only communicate with the ATM switch. It is now empowered to connect to other
content servers and video banking systems. Notable ATM software that operates on XFS platforms include Triton
PRISM, Diebold Agilis EmPower, NCR APTRA Edge, Absolute Systems AbsoluteINTERACT, KAL Kalignite
Software Platform, Phoenix Interactive VISTAatm, Wincor Nixdorf ProTopas, Euronet EFTS and Intertech inter-
ATM. With the move of ATMs to industry-standard computing environments, concern has risen about the
integrity of the ATM's software stack.Security Experts says that Automatic Teller Machine (ATM) in future will
have biometric authentication techniques to verify identities of customer during transaction. In South America,
there are companies that have introduced fingerprint technology as a embedded part of ATM systems, where
citizens have already started using fingerprint in place of PIN or Password for general identification with their ID
cards. Nowadays, there are devices to perform biometric identification and authentication of following:
fingerprint, hand, retina, iris, face, and voice. India is still lacking in implementing biometric with smart card as a
safety approach. Fingerprint approach for identification given by Oko S. and Oruh J. (2012) not proved efficient
as when citizen will move to ATM system, fingers may become dirty from natural environment and will not be
able to access his account with ATM system, since fingerprints will not match from the one that was traced during
identification. Secondly, a iris and retina approach proposed by Bhosale S. and Sawant B.(2012) as a identification
method, but citizens might not want a laser beamed into their eyes for retina scan at every time he wants to access
account through ATM. Thus, iris and retina as identification authentication proved inefficient. Vibration detector
sensor were also proposed as a security system for ATM machines by Ajaykumar M. And Bharath Kumar
N.(2013). Voice was also proposed for security in ATM systems as a biometric with smart card. The cons were
there at the same time as two citizens can have same voice and one can easily hack and can fraud with another’s
account.
Objectives : Our proposed scheme is based on an elegant adaptive black-and-white to coloring of the 10-digit
keypad in the standard layout. Proposed method requires many user inputs, so that human guessing pin Entry
becomes a difficult process. The new scheme has the remarkable property of resisting camera-based recording
attacks over an unlimited number of authentication sessions without leaking any of the PIN digits. In the earlier
method user enters a pre-arranged textual, numerical password directly through the user interface of the
authentication system. So, the password submission process is prone to direct observational attacks. Entry of a
password can easily be observed by nearby adversaries in crowded places, aided by vision enhancing and/or
recording devices. Due to its short length and the simplicity of the ten-digit keypad guess of password is easy.
The main features include:
1. Pin security is very high.
2. Tictoc PIN holds two measures that can prevent information leakage.
3. More Efficient so that we can use any Type of pin Entry application.
III. METHODOLOGY
This project, proposes virtualizing Harvard architecture on top of the existing memory architecture of modern
computers, including those without non-executable memory page support, so as to prevent the injection of
malicious code entirely. Harvard architecture is simply one wherein code and data are stored separately. Data
cannot be loaded as code and vice-versa. In essence, we create an environment wherein any code injected by an
attacker into a process’ address space cannot even be addressed by the processor for execution. In this way, we
are attacking the code injection problem at its root by regarding the injected malicious code as data and making it
unaddressable to the processor during an instruction fetch. Split memory architecture produces an address space
where data cannot be fetched by the processor for execution. For an attacker attempting a code injection, this will
prevent him from fetching and executing any injected code. It includes the following process:
PIN LAYOUT DESIGN PROCESS: This process designs 10 digit keypad with random RGB color SCHEME
using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite-
state LBG (CFSLBG) algorithm that reduces the computation time by exploiting the correlations of palette entries
between the current and previous iterations. Instead of searching the whole color palette, the
CFSLBG algorithm searches only a small number of colors that are very close to the training vector. Thus, the
computation time for color quantization is reduced. The proposed approach generates RGB palettes efficiently.
This work describes the implementation of this algorithm and simulation results. Video monitors typically use the
three primary color components, red, green, and blue, to specify the color of each pixel in a color image. Each
3. Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 7 |
primary component usually provides 8 bits for specifying the color of each pixel in a full-color digitized image.
Color quantization algorithms can be grouped into splitting algorithms and clustering-based algorithms.
Clustering-based algorithms extract quantized colors by applying various clustering algorithms. In this paper, we
propose an effortless and straightforward clustering algorithm, which is fast and excellent for generating colour
palette. Vector quantization (VQ) has been shown to be an efficient method of image coding. The input vectors
are individually quantized to the closest codeword in the codebook. The codebook is generated by using some
clustering algorithms from a set of digits. The iterative clustering algorithm proposed by Linde, Buzo, and Gray
(LBG) is usually used in VQ . A number of methods for generating color palettes using the VQ codebook design
techniques were proposed. In view of color image coding, each pixel can be considered as a 3-dimension vector
in the RGB color space. These vectors are the input vectors of the color VQ (CVQ) scheme. The LBG algorithm
is most popular method used to select a color palette with a limited number of colors from a full-color digitized
image. In each iteration of the LBG algorithm, it searches the whole color palette in order to find the corresponding
palette entry for each training vector. That is, the LBG algorithm requires a large amount of computation for color
quantization. This paper proposes a novel color finite-state LBG (CFSLBG) algorithm that reduces the
computation time required to select palettes . Instead of searching the whole color palette, the proposed algorithm
searches only a small part of the palette to find the corresponding palette entry for each training vector. In the
CFSLBG algorithm, the number of palette entries that need to be searched for a training vector in each iteration
is always much smaller than the size of the whole palette. For this reason, the duration of each iteration is greatly
reduced.
COLOR FSLBG ALGORITHM : Although the VQ scheme yields acceptable performance for image coding,
the finite-state vector quantization (FSVQ) schemes [16-21] improve performance for an ordinary VQ. An FSVQ
can be viewed as a finite collection of ordinary VQ’s, each with its own codebook associated with a state, which
is called the state codebook. The encoding state of the current input vector is decided by a state function F(x).
This coding state may be described by a state variable s ∈ S = {si : i = 1, …, M}, where M is the total number of
states. The FSVQ is defined as a mapping from Rk × S to a subset of a master codebook MC = {xi : i = 1, …, N}.
For each state si, the FSVQ encoder selects Nf codewords by means of the state function from the master codebook
MC as the state codebook SCs. For each input vector x, the encoder decides the current state s and then searches
the state codebook SCs to find its corresponding codeword. The codebook size of the state codebook is much
smaller than that of the master codebook. Hence, the searching time can be reduced. A fast finite-state algorithm
that reduces the computation time for vector quantizer design by exploiting FSVQ techniques shows that the fast
finite-state algorithm can reserve the quality of encoding. For each state s, the state palette SPs is the subset of
whole palette Pi, and the size of SPs is Nf. The Nf codewords in SPs are the closest codewords to s in the whole
palette Pi−1. Thus, the first iteration of the CFSLBG algorithm is the same as that of the ordinary LBG algorithm,
in which the full search algorithm is used to select a codeword for each training vector. At the following iteration,
i.e. i ≥ 2, the information in the previous iteration is used to determine the states of the training vectors. The
CFSLBG algorithm is described in the following steps.
Step 1: Design an initial RGB color palette P0 and set DAVG0 ← ∞.
Step 2: For each training vector x, find the closest palette entry 0 xˆ by searching the whole color palette P0.
Compute the average distortion DAVG1 .
Step 3: For each palette entry 0 xˆ in P0, generate a new entry 1 xˆ ← centroid(CS( ˆ )) 0 x and add 1 xˆ into P1.
Set i ← 2.
Step 4: Set the state space S = Pi−1.
Step 5: For each state s in S, find the set of the Nf closest codewords in the whole color palette Pi−1 and define
this set as the state palette SPs. For each training vector x, use the previous codeword -1 ˆi x as the state
s. Find the closest palette entry ˆi x by searching the state palette SPs.
Step 6: Compute the average distortion DAVGi . If | DAVGi-1 − DAVGi | / DAVGi is smaller than ε, then stop.
Step 7: For each entry -1 ˆi x in Pi−1, generate a new entry ˆi x ← centroid(CS( ˆ )) i-1 x and add ˆi x into Pi. Set
i ← i + 1 and go to step 4.
Note that the state palette size Nf is much smaller than the whole color palette size N. The Nf codewords for each
state are found by an insertion sorting algorithm applied to the entire palette.
ENROLLMENT PROCESS :In Enrollment process user/admin fills their personal details like name, address,
phone no, username and submit the user registration form. Automatically 4 digit pin will be generated and send
to the corresponding user mail id. And user can change the pin also.
4. Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 8 |
SPLIT AND MERGE SCHEME : This process collects all the colors from GUI after user enters it in the system.
The colors are spilt in to four groups and each and every groups consist of three color combination of colors
.every group have one user entered pin digit.
PIN IDENTIFICATION AND AUTHENTICATION PROCESS : Finally this process identifies four digit pin.
It compares each group with another group and apply random color match scheme for identifying user pin. The
color combinations are compared with each and every group and this pin is finally compared with the user’s
original pin.
TRANSACTION : This process includes the user account details entry process along with the bank ATM
transactions. The transaction such as deposit and withdraw will be performed after the successful login. This
feature will allow a customer to transfer money from any of their accounts to another account, and also this feature
will allow customers to check money transfer information report and balance details.
Modules
User Table
Report
User
Login
2
Pin
Authenticatio
n
. 3
Admin
3.1 pin
color
verification
Generate
pin to
user .
4
color Table
Registration
(ADMIN)
1
5. Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 9 |
IV. CONCLUSION
Every application has its own merits and demerits. The project has covered almost all the requirements. Further
requirements and improvements can easily be done since the coding will be mainly structured or modular in
nature. Changing the existing modules or adding new modules can append improvements. Further enhancements
can be made to the application, so that the system will be immediately blocked while attacks take place. In future
all transaction will be processed in a secure manner and can find the intruders activity by getting all relevant
details. In future it will capture all actions of the intruder by using screen capturing mechanism. It is concluded
that the application will work well and satisfy the needs. It also acts as the sharing of files to the valuable
resources.
REFERENCES
1. Y. W. Lim and S. U. Lee, “On the color image segmentation algorithm based on the thresholding and
the fuzzy C-means techniques,” Pattern Recognition, Vol. 23, 1990, pp. 935-952.
2. Z. Xiang, “Color image quantization by minimizing the maximum intercluster distance,” ACM
Transactions on Graphics, Vol. 16, 1997, pp. 260-276.
3. I. S. Hsieh and K. C. Fan, “An adaptive clustering algorithm for color quantization,” Pattern
Recognition Letters, Vol. 21, 2000, pp. 337-346.
4. E. Rendon, L. Salgado, J. M. Menendez, and N. Garcia, “Adaptive palette determination for color
images based on Kohonen networks,” in Proceedings of the International Conference on Image
Processing (ICIP), Vol. 1, 1997, pp. 830-833.
5. J. S. Kirk, D. J. Chang, and J. M. Zurada, “A self-organizing map with dynamic architecture for
efficient color quantization,” in Proceedings of the International Joint Conference on Neural
Networks (IJCNN), Vol. 3, 2001, pp. 2128-2132.
6. J. Foster, R. M. Gray, and M. O. Dunham, “Finite-state vector quantization of waveform coding,”
IEEE Transaction on Information Theory, Vol. IT-31, 1985, pp. 348- 359.
7. W. T. Chen, R. F. Chang, and J. S. Wang, “Image sequence coding using finite-state vector
quantization,” IEEE Transaction on Circuits Systems for Video Technology, Vol. 2, 1992, pp. 15-24.
6. Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 10 |
8. M. O. Dunham and R. M. Gray, “An algorithm for the design of label-transition finite state vector
quantizers,” IEEE Transactions on Communications, Vol. COM-33, 1985.
9. R. Aravind and A. Gersho, “Low-rate image coding with finite-state vector quantization,” in
Proceedings of the International Conference on Acoustics, Speech, and Signal
Processing (ICASSP), 1986, pp. 137-140.