SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2259
SECURE ELECTRONIC TRANSACTION USING STRENGTHENED
GRAPHICAL OTP AUTHENTICATION
K. Sruthi Shivani1, K. S. Epsibha2, Mrs. C. Sangeetha M.E.,3
1UG Scholar, Department of Computer Science and Engineering, Chettinad College of Engineering & Technology,
Karur, India-639-114
2UG Scholar, Department of Computer Science and Engineering, Chettinad College of Engineering & Technology,
Karur, India-639-114
3Assistant Professor Department of Computer Science and Engineering, Chettinad College of Engineering &
Technology, Karur, India-639-114
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract Online banking is the effective means of money
transfer. The online banking service helps the customers to
carry out the bank activities easily. The more the security is
improved, the more customers are retained. With the
expansion of internet banking, a lot of security threats like
hacking, viruses, grooming, phishing, spam, etc. areincreasing.
We tackle them by making improvements in security
measures. The Secure Electronic Transaction using
Strengthened Graphical OTP Authentication service requires
user’s security image, security pattern and security questions
to be registered in the bank. The userauthenticationisdone by
verifying the security images in addition to username and
password where only two wrong attempts are allowed for a
day. We propose multi-level security in transactions by using
Face recognition technique for the devices with webcam,
Graphical OTP authentication for thedevices withoutwebcam
and security questions verification along with OTP. We make
use of fortified GrIDsure technique that uses secret Grid
Transmission for user authentication which helps to make
fully Secure Electronic Transaction
Key Words: Face recognition technique for transaction,
Graphical OTP authentication, GrIDsuretechnique, Multi-level
security, Secure electronic transaction.
1. INTRODUCTION
With the introduction of computer technology, electronic
communication technology and information technology in
the bank system, theonlinebankinginvolvesindevelopment
of the bank’s electronization, leads to electronic bank, the
Internet bank and the Virtual bank. Onlinebankingisused to
perform amount transactions instead of finding a bank or
interacting with a teller. It is used to transfer amounts from
one to another through the internetratherthanbychequeor
cash. It helps to make instant transactions everywhere. A
customer can view their accounts and transaction details.
But security is too low and also it does not give guarantee to
the users. Besides security, other issues that need to be
considered are convenience, flexibility, cost and
maintenance. Most of the banks are using electronic
transactions. Few only don’t have online banking service at
all. The customers wish to have high security for theironline
transaction. And they expect more security for keepingtheir
money safe from the hackers. They heard a lotabouthackers
and crackers ways to steal any logical password or pin, code
number, character and scared of ID cards or credit cards
fraud and security breaches.
In existing work, authentication is done byusinga username
and password and provides authorized access to a system.
As usernames and passwords are weak they can be lost or
stolen, in the authentication process the user is to be
checked whether the access is really by humans. Nowadays,
Hacking (stealing the money) has a leading role than
securing the money. Because hackers are growing through
lots of featured technologies. Those technologies are
affecting the online users. People are getting cheated by the
cheaters in this vast world. So they should understand what
is going on?
Therefore the Internet banking makes great convenience to
the banks and customer business, but it brings the risks to
the banks in confirming the legality of customers, and it
becomes an importantsubjecttopreventtheillegal intrusion
and damage. We think it is necessary to strengthen the
security measures of theInternet banking,manycommercial
banks have launched many security measures. In this paper,
we have explained various techniques in different disciples
and laid out the advantages and disadvantagestostrengthen
the security of online banking
2. RELATED WORKS
V.Manju et al [2] proposed an Internet banking securityand
it can be improved with Face recognition using Biometric
verification. Online banking services are vulnerable to
security issues. In their assumption, cybercrime hasbecome
easier for hacking purposes. This may be issued with some
technical problems for each and every customer. So they
provide access by allowing the multiple persons to access
the same accounts by providing access privileges to original
account holders. The Experiments show that this system
provides high level security in online transactions than the
existing traditional approach.
Ravi Jhawar et al [1] proposed GrIDsure technique, a one-
time PIN scheme using random grids and personal patterns.
Graphical OTP Authentication strengthens the security in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2260
transaction. They proposed a way to fortifyGrIDsureagainst
Man-in-Middle attacks on the basis of (i) multiple patterns
and (ii) an additional secret transmitted out of band.
They evaluated this method with 26 participants making 15
authentication attempts each over a 3 week period. In
comparing it with other research in using the multiple
patterns, they found no significant difference in using the
grIDsure with one and more than one patterns.
3. EXISTING METHODOLOGIES
Online Banking Services authenticates users by their
username and password. In addition, some systems use
reCAPTCHA to verify that the user is human and other
techniques like selection of images, voice recognition based
authentication, SMS alert to the users and Email alert
regarding their successful login. If the mobile phone’s SIM
cards are not activated, there is no chance to get OTP. Hence
we are not able to perform the amount transactionanymore.
Most of the online banking portals are not giving the proper
details and information about their own bank. So people
didn’t like that kind of websites. People wish to have
attracting online bankingwebsitesandalsoitshouldprovide
proper details about their bank. In the portal, the payment
section users are allowed to transfer the amount to their
beneficiary. The transactions aremade byverificationofOne
Time Password (OTP)[10].Thesetransactionsmaybeissued
with poor network connectionandthisprocessbecomes risk
when the login credentials are known to others andthetheft
of the user's mobile phone.
.
4. SECURE ELECTRONIC TRANSACTION
In the proposed system the Online Banking service adds
security in users’ entry phase and transaction phase.
4.1 Registration
The registration process takes place in the bank. The users’
who require online banking service need to register their
security credentials. They are allowed toregisterinseparate
portal. It is a step wise process where security images,
security patterns, security questions’answersare registered
and face of the users are recorded.
4.2 Security Images
The security images mentioned in Fig 2 falls under the
security category. The security categories are like the Birds,
Fruits, Flowers and Animals. The user can choose any of one
the categories and the nine images based on that category
are shown from those options. The user can select the first
security image, next to that the other nine images of
mandatory category are shown from that user can choose
second security image. For the Birds category of user’s
choice the mandatory category is Places. Thus the category
pairs are Birds-Trees, Fruits-Chocolates, Flowers-Places,
Animals-Planets. The user can login by using username and
password along with theselectionofsecurityimagecategory
followed by choosing of first and second security image. It
allows only two wrong attempts a day. The account will be
locked if wrong attempts are made more than two times
then the user has to visit the bank to unlock his/her account.
Thus providing extra security in the login phase.
4.3 Security Patterns
Registration process of the security pattern is first the 4 x 4
grid is shown where the user can select up to four desired
indexes. The indexes in the chosen order are stored as the
security pattern. Whenever the useraccessestheaccountfor
transaction in payment section using the device without
webcam, this Graphical OTP verification [1] is done. The 4 x
4 random number grid is sent to the user’s mail. The
numbers in the registered indexes are the required onetime
password. After the verification of graphical OTP the users
can proceed to the transaction phase. If the verification is
failed the transaction fails.
Fig 1-Registering Indexes
For example: Fig 1 is the registered security pattern of a
user. Similar to the figure a 4 x 4 grid is displayed to the user
in the registration portal. There the user can select their
password. Later this is storedasthepassword.Theuserscan
change their password i.e. indexes frequently. But they can
make changes only in the bank.
This helps to improve security. The users have to recall their
registered indexes and then give the numbers present in
those registered indexes in the same order.Thispasswordis
verified and then only they are allowed to enterintothe next
transaction phase.
Each time the user attempts to enter into transaction phase
the Graphical OTP authentication is done. Anew 4 x 4 grid is
sent to user’s mail. If we display the grid in the online portal
it may be watched by some third persons. As the hackers
also can record the password from theuser’sscreen,thegrid
itself is sent to the user.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2261
Fig 1.1-Grid of Random numbers sent to user’s mail.
Fig 1.2- Sent next time to user
Fig 1.1 is the random grid sent to the user’s mail. Now the
one time password is the values in the registered indexes
i.e.8035.If next time the user wants to transfer money again
another random grid like fig1.2 is sent to the user’s mail. For
this time the password is 2836, it changes each time. This is
one of the enhancements proposed for strengthening the
Graphical OTP, thus security is improved by applying this
method in online transaction process.
4.4 Face Recognition using Python
The user’s face is recorded and stored. The system is trained
with the user image dataset. Whenever the useraccessesthe
account for the payment section using the device with a
webcam, face recognition is done. After the successful
verification the user can proceed to the transaction phase. If
the verification fails, the transaction fails. The face
recognition process is that the user face isrecorded,thisface
image is converted into gray scale and stored. This is the
input image and dataset for training the face recognition
model. It ignores any scars or damages in the user's face
caused accidentally. During recognition the webcam is
activated and the model recognizes the user, a rectangle is
drawn around the user’s face and name of the user is
displayed if the verification is successful otherwise it
displays unknown user and the transaction fails.
4.5 Security Questions
The user registers the answersforthetensecurity questions
like “What is your childhood nickname? What is the name of
your primary school?” that are listed. In the transaction
phase next to the face recognition/Graphical OTP
verification the user can add the beneficiary details. Before
completion of transaction two security questions are asked
randomly from the registered questions. The answers are
verified, next to that OTP is verified and then transaction
completes.
5. ARCHITECTURE DIAGRAM
Fig2 is the architecture diagram. Initially the registration
process takes place in the bank. The users are allowed to
register in the registration portal. First the user chooses the
security image category from the available four categories
according to their wish. Then from the available nineimages
the user selects desired one this is first security image it is
followed by selecting second security image from available
nine images of mandatorycategory,thesetwoimagesare the
security image password of the user. Then there are about
ten security questions listed, the user set answers for all the
listed security questions. Next the security pattern is
registered by the user, the 4 x 4 grid is displayed where the
user can choose up to four indexesoftheirwish.Thesecurity
pattern of that user is the indexes selected in the order. Last
step in the registration process is the recording of the user's
face. The user is asked to look at the webcam and the face is
captured. After the completion of this process by the user,
the security credentials are set to the user and online
banking service is enabled to that user. Now the user can
avail the online banking service anywhere. Each time the
user wants to access his/her account the username,
password is verified first, this is step1 verification. Step2 is
the selection of security category followed by first security
image and second security image verification. The user can
view the account details, view the transaction summary and
make transactions. Transactions can bedoneinthepayment
section. Whenever the user attempts to enter into the
payment section, if webcam is available in the device then it
requires face recognition if webcam is not available then it
requires Graphical OTP authentication [1]. In face
recognition technique the user in front of the webcam is
validated and then the user canproceedfurther.InGraphical
OTP authentication method the 4 x 4 grid of random
numbers is sent to the user’s mail. It asks for OTP and
validates according to the user’s security pattern, after
validating the user can proceed further. The user adds the
beneficiary details to make a transaction at that time two
security questions are asked and answers are validatedthen
OTP is verified and transaction completes successfully.Thus
secure electronic transactions are carried out.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2262
Fig2-Architecture Diagram
6. MERITS
Online banking services facilitate the users to do
transactions. It comes with several edges, such as:
Convenience: Customers may use e-commerce web sites at
any time. They merely would like an online connected
device.
Costs saving: Data charges only applied from customers for
each and every transaction.
Manage the customer’s account easily and editable.For each
transaction, OTP will generate through email.
7. CONCLUSION
In this paper, we have reviewed various security electronic
transaction techniques which are enhanced for better
performance. The objective of the paper is to overcome the
challenges associated with online bankingsecurityaswell as
to realize the rising technologies. The electronic fund
transfer is a major part of a financial function or transaction
and it attracts extensive interest. Still, it needs to be
converted into a regular approach for making payments.
Though, the technologies used in payments through online
are enhanced and also going through a noteworthy
development in terms of security and service availability
enhancement.
REFERENCES
[1] Ravi Jhawar, Philip Inglesant, Nicolas Courtois, M.
Angela Sasse, “Make mine a quadruple:
Strengthening the security of Graphical OTP
Authentication” University college London, Gower
Street_London WC1E 6BT, UK.
[2] V.Manju et al, “Improving NetBankingSecuritywith
Face Recognition Based BiometricVerification”IntJ
Sci Res CSE & IT. May-June-2019.
[3] Jeonil Kang, Member, IEEE and DaeHunNyang,
Member, IEEE “A Privacy-preserving mobile
payment system for Mass Transit”, 1524-9050 ©
2016 IEEE.
[4] Mohammad Wazid, Sherali Zeadally and Ashok
Kumar Das, “Mobile Banking: Evolution and
Threats” IEEE Consumer Electronics
Magazine_March 2019.
[5] Nikhil Khandare, B.B.Meshram, "Security of Online
Electronic Payments", for data retrieval easily and
stores customer data by E-wallet.
[6] S.Kiljan, K.Simoens, D.D.Cock, M.V.Eekelen and
H.Vranken, “A survey of authentication and
communications security in online banking,” ACM
Comput. Surv., vol. 49, no. 4, pp. 61:1–61:35, 2016.
[7] S.Roy, “Mobile banking in US to exceed 100 million
by 2016,” Online Marketing Trends. Accessed on:
May 2017.
[8] R.Biddle, S.Chiasson and P.C.Van Oorschot.
Graphical passwords: Learning from the first
generation. Technical Report TR-09-09, 2009.
[9] M. Bond. Comments on gridsure authentication.
2008.
[10] S.Brostoff, P.G.Inglesant and M.A.Sasse. Evaluating
the usability and security of a graphical one-time
pin system. Conference on Human Computer
Interaction BCS, 2010
.

More Related Content

What's hot

IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
D0351022026
D0351022026D0351022026
D0351022026
inventionjournals
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET Journal
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
IRJET Journal
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
Dr. Amarjeet Singh
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET Journal
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
Bayalagmaa Davaanyam
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
IRJET Journal
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-bankingAlexander Decker
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
Syeful Islam
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
cscpconf
 

What's hot (18)

IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
IRJET- Graphical user Authentication for an Alphanumeric OTP
IRJET- 	  Graphical user Authentication for an Alphanumeric OTPIRJET- 	  Graphical user Authentication for an Alphanumeric OTP
IRJET- Graphical user Authentication for an Alphanumeric OTP
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
Graphical Password Authentication using Images Sequence
Graphical Password Authentication using Images SequenceGraphical Password Authentication using Images Sequence
Graphical Password Authentication using Images Sequence
 
5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking5.[25 33]survey on 2-step security for authentication in m-banking
5.[25 33]survey on 2-step security for authentication in m-banking
 
120 i143
120 i143120 i143
120 i143
 
Iciea08
Iciea08Iciea08
Iciea08
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Bg24375379
Bg24375379Bg24375379
Bg24375379
 
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATIONGENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
GENERATION OF SECURE ONE-TIME PASSWORD BASED ON IMAGE AUTHENTICATION
 

Similar to IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authentication

IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
IRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
IRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
AIRCC Publishing Corporation
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
IRJET Journal
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
eSAT Journals
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
ijtsrd
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IRJET Journal
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET Journal
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
TELKOMNIKA JOURNAL
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
ijiert bestjournal
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
inventionjournals
 

Similar to IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authentication (20)

IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
IRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face RecognitionIRJET- A Mobile Payment System Based on Face Recognition
IRJET- A Mobile Payment System Based on Face Recognition
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
Enforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-PaymentEnforcing Set and SSL Protocols in E-Payment
Enforcing Set and SSL Protocols in E-Payment
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
IMPLEMENTATION PAPER ON MACHINE LEARNING BASED SECURITY SYSTEM FOR OFFICE PRE...
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...Design and develop authentication in electronic payment systems based on IoT ...
Design and develop authentication in electronic payment systems based on IoT ...
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
A MOBILE BASED ANTI-PHISHING AUTHENTICATION SCHEME USING CHALLENGE-RESPONSE A...
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
Divya Somashekar
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 

Recently uploaded (20)

ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
block diagram and signal flow graph representation
block diagram and signal flow graph representationblock diagram and signal flow graph representation
block diagram and signal flow graph representation
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 

IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2259 SECURE ELECTRONIC TRANSACTION USING STRENGTHENED GRAPHICAL OTP AUTHENTICATION K. Sruthi Shivani1, K. S. Epsibha2, Mrs. C. Sangeetha M.E.,3 1UG Scholar, Department of Computer Science and Engineering, Chettinad College of Engineering & Technology, Karur, India-639-114 2UG Scholar, Department of Computer Science and Engineering, Chettinad College of Engineering & Technology, Karur, India-639-114 3Assistant Professor Department of Computer Science and Engineering, Chettinad College of Engineering & Technology, Karur, India-639-114 ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract Online banking is the effective means of money transfer. The online banking service helps the customers to carry out the bank activities easily. The more the security is improved, the more customers are retained. With the expansion of internet banking, a lot of security threats like hacking, viruses, grooming, phishing, spam, etc. areincreasing. We tackle them by making improvements in security measures. The Secure Electronic Transaction using Strengthened Graphical OTP Authentication service requires user’s security image, security pattern and security questions to be registered in the bank. The userauthenticationisdone by verifying the security images in addition to username and password where only two wrong attempts are allowed for a day. We propose multi-level security in transactions by using Face recognition technique for the devices with webcam, Graphical OTP authentication for thedevices withoutwebcam and security questions verification along with OTP. We make use of fortified GrIDsure technique that uses secret Grid Transmission for user authentication which helps to make fully Secure Electronic Transaction Key Words: Face recognition technique for transaction, Graphical OTP authentication, GrIDsuretechnique, Multi-level security, Secure electronic transaction. 1. INTRODUCTION With the introduction of computer technology, electronic communication technology and information technology in the bank system, theonlinebankinginvolvesindevelopment of the bank’s electronization, leads to electronic bank, the Internet bank and the Virtual bank. Onlinebankingisused to perform amount transactions instead of finding a bank or interacting with a teller. It is used to transfer amounts from one to another through the internetratherthanbychequeor cash. It helps to make instant transactions everywhere. A customer can view their accounts and transaction details. But security is too low and also it does not give guarantee to the users. Besides security, other issues that need to be considered are convenience, flexibility, cost and maintenance. Most of the banks are using electronic transactions. Few only don’t have online banking service at all. The customers wish to have high security for theironline transaction. And they expect more security for keepingtheir money safe from the hackers. They heard a lotabouthackers and crackers ways to steal any logical password or pin, code number, character and scared of ID cards or credit cards fraud and security breaches. In existing work, authentication is done byusinga username and password and provides authorized access to a system. As usernames and passwords are weak they can be lost or stolen, in the authentication process the user is to be checked whether the access is really by humans. Nowadays, Hacking (stealing the money) has a leading role than securing the money. Because hackers are growing through lots of featured technologies. Those technologies are affecting the online users. People are getting cheated by the cheaters in this vast world. So they should understand what is going on? Therefore the Internet banking makes great convenience to the banks and customer business, but it brings the risks to the banks in confirming the legality of customers, and it becomes an importantsubjecttopreventtheillegal intrusion and damage. We think it is necessary to strengthen the security measures of theInternet banking,manycommercial banks have launched many security measures. In this paper, we have explained various techniques in different disciples and laid out the advantages and disadvantagestostrengthen the security of online banking 2. RELATED WORKS V.Manju et al [2] proposed an Internet banking securityand it can be improved with Face recognition using Biometric verification. Online banking services are vulnerable to security issues. In their assumption, cybercrime hasbecome easier for hacking purposes. This may be issued with some technical problems for each and every customer. So they provide access by allowing the multiple persons to access the same accounts by providing access privileges to original account holders. The Experiments show that this system provides high level security in online transactions than the existing traditional approach. Ravi Jhawar et al [1] proposed GrIDsure technique, a one- time PIN scheme using random grids and personal patterns. Graphical OTP Authentication strengthens the security in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2260 transaction. They proposed a way to fortifyGrIDsureagainst Man-in-Middle attacks on the basis of (i) multiple patterns and (ii) an additional secret transmitted out of band. They evaluated this method with 26 participants making 15 authentication attempts each over a 3 week period. In comparing it with other research in using the multiple patterns, they found no significant difference in using the grIDsure with one and more than one patterns. 3. EXISTING METHODOLOGIES Online Banking Services authenticates users by their username and password. In addition, some systems use reCAPTCHA to verify that the user is human and other techniques like selection of images, voice recognition based authentication, SMS alert to the users and Email alert regarding their successful login. If the mobile phone’s SIM cards are not activated, there is no chance to get OTP. Hence we are not able to perform the amount transactionanymore. Most of the online banking portals are not giving the proper details and information about their own bank. So people didn’t like that kind of websites. People wish to have attracting online bankingwebsitesandalsoitshouldprovide proper details about their bank. In the portal, the payment section users are allowed to transfer the amount to their beneficiary. The transactions aremade byverificationofOne Time Password (OTP)[10].Thesetransactionsmaybeissued with poor network connectionandthisprocessbecomes risk when the login credentials are known to others andthetheft of the user's mobile phone. . 4. SECURE ELECTRONIC TRANSACTION In the proposed system the Online Banking service adds security in users’ entry phase and transaction phase. 4.1 Registration The registration process takes place in the bank. The users’ who require online banking service need to register their security credentials. They are allowed toregisterinseparate portal. It is a step wise process where security images, security patterns, security questions’answersare registered and face of the users are recorded. 4.2 Security Images The security images mentioned in Fig 2 falls under the security category. The security categories are like the Birds, Fruits, Flowers and Animals. The user can choose any of one the categories and the nine images based on that category are shown from those options. The user can select the first security image, next to that the other nine images of mandatory category are shown from that user can choose second security image. For the Birds category of user’s choice the mandatory category is Places. Thus the category pairs are Birds-Trees, Fruits-Chocolates, Flowers-Places, Animals-Planets. The user can login by using username and password along with theselectionofsecurityimagecategory followed by choosing of first and second security image. It allows only two wrong attempts a day. The account will be locked if wrong attempts are made more than two times then the user has to visit the bank to unlock his/her account. Thus providing extra security in the login phase. 4.3 Security Patterns Registration process of the security pattern is first the 4 x 4 grid is shown where the user can select up to four desired indexes. The indexes in the chosen order are stored as the security pattern. Whenever the useraccessestheaccountfor transaction in payment section using the device without webcam, this Graphical OTP verification [1] is done. The 4 x 4 random number grid is sent to the user’s mail. The numbers in the registered indexes are the required onetime password. After the verification of graphical OTP the users can proceed to the transaction phase. If the verification is failed the transaction fails. Fig 1-Registering Indexes For example: Fig 1 is the registered security pattern of a user. Similar to the figure a 4 x 4 grid is displayed to the user in the registration portal. There the user can select their password. Later this is storedasthepassword.Theuserscan change their password i.e. indexes frequently. But they can make changes only in the bank. This helps to improve security. The users have to recall their registered indexes and then give the numbers present in those registered indexes in the same order.Thispasswordis verified and then only they are allowed to enterintothe next transaction phase. Each time the user attempts to enter into transaction phase the Graphical OTP authentication is done. Anew 4 x 4 grid is sent to user’s mail. If we display the grid in the online portal it may be watched by some third persons. As the hackers also can record the password from theuser’sscreen,thegrid itself is sent to the user.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2261 Fig 1.1-Grid of Random numbers sent to user’s mail. Fig 1.2- Sent next time to user Fig 1.1 is the random grid sent to the user’s mail. Now the one time password is the values in the registered indexes i.e.8035.If next time the user wants to transfer money again another random grid like fig1.2 is sent to the user’s mail. For this time the password is 2836, it changes each time. This is one of the enhancements proposed for strengthening the Graphical OTP, thus security is improved by applying this method in online transaction process. 4.4 Face Recognition using Python The user’s face is recorded and stored. The system is trained with the user image dataset. Whenever the useraccessesthe account for the payment section using the device with a webcam, face recognition is done. After the successful verification the user can proceed to the transaction phase. If the verification fails, the transaction fails. The face recognition process is that the user face isrecorded,thisface image is converted into gray scale and stored. This is the input image and dataset for training the face recognition model. It ignores any scars or damages in the user's face caused accidentally. During recognition the webcam is activated and the model recognizes the user, a rectangle is drawn around the user’s face and name of the user is displayed if the verification is successful otherwise it displays unknown user and the transaction fails. 4.5 Security Questions The user registers the answersforthetensecurity questions like “What is your childhood nickname? What is the name of your primary school?” that are listed. In the transaction phase next to the face recognition/Graphical OTP verification the user can add the beneficiary details. Before completion of transaction two security questions are asked randomly from the registered questions. The answers are verified, next to that OTP is verified and then transaction completes. 5. ARCHITECTURE DIAGRAM Fig2 is the architecture diagram. Initially the registration process takes place in the bank. The users are allowed to register in the registration portal. First the user chooses the security image category from the available four categories according to their wish. Then from the available nineimages the user selects desired one this is first security image it is followed by selecting second security image from available nine images of mandatorycategory,thesetwoimagesare the security image password of the user. Then there are about ten security questions listed, the user set answers for all the listed security questions. Next the security pattern is registered by the user, the 4 x 4 grid is displayed where the user can choose up to four indexesoftheirwish.Thesecurity pattern of that user is the indexes selected in the order. Last step in the registration process is the recording of the user's face. The user is asked to look at the webcam and the face is captured. After the completion of this process by the user, the security credentials are set to the user and online banking service is enabled to that user. Now the user can avail the online banking service anywhere. Each time the user wants to access his/her account the username, password is verified first, this is step1 verification. Step2 is the selection of security category followed by first security image and second security image verification. The user can view the account details, view the transaction summary and make transactions. Transactions can bedoneinthepayment section. Whenever the user attempts to enter into the payment section, if webcam is available in the device then it requires face recognition if webcam is not available then it requires Graphical OTP authentication [1]. In face recognition technique the user in front of the webcam is validated and then the user canproceedfurther.InGraphical OTP authentication method the 4 x 4 grid of random numbers is sent to the user’s mail. It asks for OTP and validates according to the user’s security pattern, after validating the user can proceed further. The user adds the beneficiary details to make a transaction at that time two security questions are asked and answers are validatedthen OTP is verified and transaction completes successfully.Thus secure electronic transactions are carried out.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 02 | Feb 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2262 Fig2-Architecture Diagram 6. MERITS Online banking services facilitate the users to do transactions. It comes with several edges, such as: Convenience: Customers may use e-commerce web sites at any time. They merely would like an online connected device. Costs saving: Data charges only applied from customers for each and every transaction. Manage the customer’s account easily and editable.For each transaction, OTP will generate through email. 7. CONCLUSION In this paper, we have reviewed various security electronic transaction techniques which are enhanced for better performance. The objective of the paper is to overcome the challenges associated with online bankingsecurityaswell as to realize the rising technologies. The electronic fund transfer is a major part of a financial function or transaction and it attracts extensive interest. Still, it needs to be converted into a regular approach for making payments. Though, the technologies used in payments through online are enhanced and also going through a noteworthy development in terms of security and service availability enhancement. REFERENCES [1] Ravi Jhawar, Philip Inglesant, Nicolas Courtois, M. Angela Sasse, “Make mine a quadruple: Strengthening the security of Graphical OTP Authentication” University college London, Gower Street_London WC1E 6BT, UK. [2] V.Manju et al, “Improving NetBankingSecuritywith Face Recognition Based BiometricVerification”IntJ Sci Res CSE & IT. May-June-2019. [3] Jeonil Kang, Member, IEEE and DaeHunNyang, Member, IEEE “A Privacy-preserving mobile payment system for Mass Transit”, 1524-9050 © 2016 IEEE. [4] Mohammad Wazid, Sherali Zeadally and Ashok Kumar Das, “Mobile Banking: Evolution and Threats” IEEE Consumer Electronics Magazine_March 2019. [5] Nikhil Khandare, B.B.Meshram, "Security of Online Electronic Payments", for data retrieval easily and stores customer data by E-wallet. [6] S.Kiljan, K.Simoens, D.D.Cock, M.V.Eekelen and H.Vranken, “A survey of authentication and communications security in online banking,” ACM Comput. Surv., vol. 49, no. 4, pp. 61:1–61:35, 2016. [7] S.Roy, “Mobile banking in US to exceed 100 million by 2016,” Online Marketing Trends. Accessed on: May 2017. [8] R.Biddle, S.Chiasson and P.C.Van Oorschot. Graphical passwords: Learning from the first generation. Technical Report TR-09-09, 2009. [9] M. Bond. Comments on gridsure authentication. 2008. [10] S.Brostoff, P.G.Inglesant and M.A.Sasse. Evaluating the usability and security of a graphical one-time pin system. Conference on Human Computer Interaction BCS, 2010 .