SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4258
Two Way Authentication for Banking Systems
Nupur Shinkar1, Sanket Sonje2, Shubham Kamble3, Pranav Pardeshi5, Prof. Pooja Dhule5
1,2,3,4(Student, Department of Computer Engineering, MMCOE, Pune, India)
5(Department of Computer Engineering, MMCOE, Pune, India)
---------------------------------------------------------------------------***---------------------------------------------------------------------------
Abstract:- The basic idea of our project is to build a new
banking system and reduce old systems use OTP and instead
use a security verification method that uses the QR code.
System which uses two-way authentication using Random
Numbers and IMEI Signed Signs of Verification. Since the
information stored in the QR code is encrypted, it is
protected. The QR code is scan with the help of scanners on
smartphones. The results generated by scanning QR codes
are a combination of the random number generated by the
random number function and the number of IMEIs
registered by the user. If the internet connection in smart
phone is on then user will automatically get inserted into the
login page and forwarded to the home screen of the bank
page. The goal is to develop a security system that uses two-
factor authentication: a trusted device will scan the QR code
and act as a known signal and password. Our goal is to
increase security bank operations and provide customers
with easy access to operations.
Key words: - QR codes, online privacy, mobile security,
secured authentication, smartphone
1] INTRODUCTION
1.1] Background
Most of the current transactions are digitized, users are
scared of losing their important data. We still use the first
safety measures. This requires delivery of greater security
measures for these Internet operations will ensure that user
information is not getting tampered. Securing QR code
works more effectively than password, fingerprints, and face
detection system. The QR code is a matrix that is an array of
squares. The three points of QR code form the only model
that can easily scale and size.
2] PROBLEM STATEMENT
The present system has an OTP that is sent to users via
text message or email, but email spoofing or man in the
middle can occur. The password system provides security
against unofficial access, but the evolution of various
attacks, such as violent attack, does make the system
ineffective. This system option is provided in two identities
that use the first-factor password, and the randomly
generated code is a second factor. There are many
advantages of this system but it also comes with some
disadvantages. For example, a fraudulent network late
delivery of OTP. This system has been replaced with an
efficient system that uses the QR code instead of OTP but
does not resolve the code issue. The new system we offer
provides a QR code with an IMEI number and a 4-digit
code. The second verification factor is replaced by the
Android app installed on the registered phone. This system
eliminates the problem of man in the middle and the delay
in obtaining a unique code.
3. Literature Review
Table1.Literature Review
3. Proposed Methodology.
The ideological development of the system using the
iterative model is that it will allow the developers to take
advantage of earlier versions of the system. Important
Sr.No. Paper Name Gap Identified
1. OTP encryption
techniques in
mobiles for
authentication
and transaction
security.
Most OTP systems
are susceptible to
real-time replay and
social engineering
attacks.
2. Survey on
information
hiding techniques
using QR barcode
They can
breakdown Label
damage. Scratched
or crumpled
barcodes
may cause problems
3. Authentication
and transaction
verification using
QR codes with a
mobile device
Use of QR code for
transaction process
instead of login is
not safe and secure
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4259
steps in development of the system should start with the
application of a small module and then make changes
according to the system requirements are by using the
current system, developers can identify errors in system
and improve it by providing new functionality.
In doing this, the design changes were made, and new
system functions were created. This process continues
until the ultimate goal of ensuring the best security is
achieved. Mostly, Development consists of, initialization
steps and system design module control lists that replaces
the current OTP system. The QR authentication system
allows the user to log in by using password if the user is
identified, the encrypted string in the form of the QR code
is displayed on the screen. A user gets logged in if an
encrypted string matches an IMEI number in the database.
Fig.1. barcode
Before the QR code, there were some advanced verification
techniques, such as user names password, barcodes, face
recognition, fingerprint. Security is compromised as
passwords faced the problems of hacking. The code limit is
that it can only save up to 20 digits therefore complex
passwords cannot be created by using the code. Barcode
which are scratched, does not provide any security.
Devices and technology used for fingerprints and face
identities suffers from a problem of accuracy.
Therefore to reduce all the drawbacks of previous security
system QR code is made. QR code is a Quick Response
code. It was introduced in 1994 by a Japanese company
subordinate –Danso-Wave. The QR code can produce more
complex passwords because it can hold up to 4296
alphanumeric character. Since it is a two-dimensional
barcode, can be read from any direction.
Fig.2. QR code
There are two parts to this system. Section in which input
data is converted into QR code is known as encoding
section. Data analysis and encoding is performed in this
then it is followed by error correction, coding and the final
message is organized. Decoding is second stage where
decoding of QR code image is done and whatever data it
contains is displayed the decoding technique starts with
distinguishing the black and white modules and then
rearranging the modules to achieve the decoded format
information.
4] Proposed system
Fig.3. Flow Diagram
The steps in above diagram provide information on how to
complete the registration process: -At first user will sign
up for registration by submitting details such as his
username, password and IMEI number. When the data is
verified it will be saved in the database. Then public key
and private key will be generated by the data in the data
server and they will be stored in the server.
The user will continue to download the Application and
install it on his phone. When a user executes the
application for first time, public and private key files are
created and saved internal storage of mobile phones.
When registering, if the user does not enter all values as
user names, IMEI number password, phone number, and
email address then the registration process will be failed.
Validation plays an important role in the registration
process; if validation unsuccessful then login of user is not
possible.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4260
Fig 3.Registration process diagram
5] IMPLEMENTATION
This system is implied when your (user) mobile phone has
the internet and is online where string is formed by doing
encryption of random number, public key and IMEI
number. With this help of this string QR code is obtained
by using the QR code generating function. Once it is
produce, it will be shown on client’s machine and clients
will scan this QR code with their mobile phone. Since its
online mode, after scanning, the generated string user
directly enters into login page by using internet. If there is
successful login, the customer home page of the bank
website is displayed. So in our system, we do not need to
remember the password. The user's public key is used to
decrypt the string and also ensure that it is in our
transaction table with random number, and then
modification of the line are done in the table. Server, then
check whether IMEI is valid. If it is found valid, then the
login is successful. After successful login, the transaction
row is removed and a new QR code appears when the user
wants to sign in again. Now, PHP sessions are created and
when the user is finishes his/her task, the session is
destroyed.
6] SECURITY
The QR code and encryption algorithms provide powerful
security for our system. It does not get susceptible to the
man-in-the-middle attack because the message between
the user and the server is always in the encrypted form.
Also, for a mobile app, one has to have a password so they
cannot be attacked by anyone in any other ways. If the
people who are untrusted know how to work on data
storage, the security issue is created. Phishing attacks are
possible on mobile phones if we replace apps with others
app.
Result:-
Screenshots
1.Home Page.
2.QR code.
3.Login Succsess.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4261
4.Admin Page.
Conclusion: - This system gives additional security with
the traditional way of online authentication of banking;
which contains username and password. On the other
hand, by adding QR code authentication, the security
measures for banking are improved. Two factor
authentications are measured in this system. With the help
of this QR code, security is improved during the login of
the specific bank. Depending on the authentication only
the client will be able to achieve the transaction. In future
we would like to add voice input command feature to our
website and android application. It will help the user to do
his work easily. We would like to use some advanced
encryption and decryption algorithm, better than AES.
Refernces:-
[1] T. Purnomo, Y. S. Gondokaryono and C. Kim, "Mutual
authentication in securing mobile payment system using
encrypted QR code based on Public Key Infrastructure,"
2016 6th International Conference on System Engineering
and Technology (ICSET), Bandung, 2016, pp. 194-198. doi:
10.1109/ICSEngT.2016.784964
[2] S. Khairnar and R. Kharat, "Online fraud transaction
prevention system using extended visual cryptography
and QR code," 2016 International Conference on
Computing Communication Control and automation
(ICCUBEA), Pune, 2016, pp. 1-4. doi:
10.1109/ICCUBEA.2016.7860061
[3] S. Istyaq and M. S. Umar, "Encoding passwords using
QR image for authentication," 2016 2nd International
Conference on Next Generation Computing Technologies
(NGCT), Dehradun, 2016, pp. 818-823. doi:
10.1109/NGCT.2016.7877523
[4] Mrs.Shanta Sondur, Ms.Tanushree Bhattacharjee “QR-
Decoder and Mobile Payment System for Feature Phone”,
VESIT,International Technological Conference(I-
TechCON)-Jan. 03 –04(2014), Pages 13-15
[5] Dr. A. P. Adsul, Gayatri Kumbhar, Vrunda Chincholkar,
Yogesh Kamble, Anuja Bankar “Automated Exam Process
using QR Code Technology” International Journal of
Application or Innovation in Engineering & Management,
(IJAIEM)-ISSN 2319-4847,Vol.3,Issue 4,April-2014,Pages-
296-298.
[6] SomdipDey, B. JoyshreeNath and C. AsokeNath “OTP
Encryption Techniques in Mobiles for Authentication and
Transaction Security” Institute of Information Systems
Argentinierstrasse -2009.
[7] Jawahar Thakur, Nagesh Kumar “DES, AES and
Blowfish: Symmetric Key Cryptography Algorithms
Simulation Based Performance Analysis ” International
Journal of Emerging Technology and Advanced
Engineering (ISSN 2250-2459, Volume 1, Issue 2,
December 2011).

More Related Content

What's hot

Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
eSAT Publishing House
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
IRJET Journal
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
IRJET Journal
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET Journal
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
IRJET Journal
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
IRJET Journal
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
IRJET Journal
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
Badiginchala Manohari
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET Journal
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET Journal
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET Journal
 
F1802024245
F1802024245F1802024245
F1802024245
IOSR Journals
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
G0VIND G0URAV
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
 
N044057478
N044057478N044057478
N044057478
IJERA Editor
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
TELKOMNIKA JOURNAL
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET Journal
 

What's hot (20)

Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
Color Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnologyColor Code PIN Authentication System Using Multi-TouchTechnology
Color Code PIN Authentication System Using Multi-TouchTechnology
 
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart LockIRJET- Configurable Intelligent Secures - 3FA Smart Lock
IRJET- Configurable Intelligent Secures - 3FA Smart Lock
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
IRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost MobileIRJET- Sniffer for Tracking Lost Mobile
IRJET- Sniffer for Tracking Lost Mobile
 
Effective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID TagsEffective Attendance Markingusing Face Recognition & RFID Tags
Effective Attendance Markingusing Face Recognition & RFID Tags
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
iot based home security using image processing algorithms
iot based home security using image processing algorithmsiot based home security using image processing algorithms
iot based home security using image processing algorithms
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...IRJET-  	  Implementation of Handling Android Application using SMS(Short Mes...
IRJET- Implementation of Handling Android Application using SMS(Short Mes...
 
IRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication MechanismIRJET- Random Keypad and Face Recognition Authentication Mechanism
IRJET- Random Keypad and Face Recognition Authentication Mechanism
 
F1802024245
F1802024245F1802024245
F1802024245
 
Gvm project report g95
Gvm project report g95Gvm project report g95
Gvm project report g95
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
N044057478
N044057478N044057478
N044057478
 
2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement2FYSH: two-factor authentication you should have for password replacement
2FYSH: two-factor authentication you should have for password replacement
 
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
IRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring SystemIRJET -  	  Face Recognition and Fingerprint based Attendance Monitoring System
IRJET - Face Recognition and Fingerprint based Attendance Monitoring System
 

Similar to IRJET- Two Way Authentication for Banking Systems

IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
IRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
IRJET Journal
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
IRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
IRJET Journal
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
IRJET Journal
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
IRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET Journal
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET Journal
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
IRJET Journal
 
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET Journal
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
IRJET Journal
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
IRJET Journal
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
IRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
IRJET Journal
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET Journal
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET Journal
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
IRJET Journal
 

Similar to IRJET- Two Way Authentication for Banking Systems (20)

IRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking SystemsIRJET- Two Way Authentication for Banking Systems
IRJET- Two Way Authentication for Banking Systems
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
Basic Office Administration
Basic Office AdministrationBasic Office Administration
Basic Office Administration
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
ANDROID BASED ADVANCED ATTENDANCE VIGILANCE SYSTEM USING WIRELESS NETWORK WIT...
 
Fingerprint Based Voting
Fingerprint Based VotingFingerprint Based Voting
Fingerprint Based Voting
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
IRJET-  	  Guarded Remittance System Employing WANET for Catastrophe RegionIRJET-  	  Guarded Remittance System Employing WANET for Catastrophe Region
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
 
IRJET- Authentication System in Social Networks
IRJET- Authentication System in Social NetworksIRJET- Authentication System in Social Networks
IRJET- Authentication System in Social Networks
 
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using BiometricIRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
IRJET- Safe and Secure Smart Electronic Voting Machine using Biometric
 
IRJET- Technical Review of different Methods for Multi Factor Authentication
IRJET-  	  Technical Review of different Methods for Multi Factor AuthenticationIRJET-  	  Technical Review of different Methods for Multi Factor Authentication
IRJET- Technical Review of different Methods for Multi Factor Authentication
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
IRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password AuthenticationIRJET- Real-Time Face Tracking for Password Authentication
IRJET- Real-Time Face Tracking for Password Authentication
 
FINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTINGFINGERPRINT BASED SECURED VOTING
FINGERPRINT BASED SECURED VOTING
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...IRJET-  	  Security Empowerment using QR Code and Session Tracking for Cued R...
IRJET- Security Empowerment using QR Code and Session Tracking for Cued R...
 
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using FirebaseIRJET- Displaying Smart Phone Data in the Desktop using Firebase
IRJET- Displaying Smart Phone Data in the Desktop using Firebase
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
gerogepatton
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
manasideore6
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 

Recently uploaded (20)

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Fundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptxFundamentals of Electric Drives and its applications.pptx
Fundamentals of Electric Drives and its applications.pptx
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 

IRJET- Two Way Authentication for Banking Systems

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4258 Two Way Authentication for Banking Systems Nupur Shinkar1, Sanket Sonje2, Shubham Kamble3, Pranav Pardeshi5, Prof. Pooja Dhule5 1,2,3,4(Student, Department of Computer Engineering, MMCOE, Pune, India) 5(Department of Computer Engineering, MMCOE, Pune, India) ---------------------------------------------------------------------------***--------------------------------------------------------------------------- Abstract:- The basic idea of our project is to build a new banking system and reduce old systems use OTP and instead use a security verification method that uses the QR code. System which uses two-way authentication using Random Numbers and IMEI Signed Signs of Verification. Since the information stored in the QR code is encrypted, it is protected. The QR code is scan with the help of scanners on smartphones. The results generated by scanning QR codes are a combination of the random number generated by the random number function and the number of IMEIs registered by the user. If the internet connection in smart phone is on then user will automatically get inserted into the login page and forwarded to the home screen of the bank page. The goal is to develop a security system that uses two- factor authentication: a trusted device will scan the QR code and act as a known signal and password. Our goal is to increase security bank operations and provide customers with easy access to operations. Key words: - QR codes, online privacy, mobile security, secured authentication, smartphone 1] INTRODUCTION 1.1] Background Most of the current transactions are digitized, users are scared of losing their important data. We still use the first safety measures. This requires delivery of greater security measures for these Internet operations will ensure that user information is not getting tampered. Securing QR code works more effectively than password, fingerprints, and face detection system. The QR code is a matrix that is an array of squares. The three points of QR code form the only model that can easily scale and size. 2] PROBLEM STATEMENT The present system has an OTP that is sent to users via text message or email, but email spoofing or man in the middle can occur. The password system provides security against unofficial access, but the evolution of various attacks, such as violent attack, does make the system ineffective. This system option is provided in two identities that use the first-factor password, and the randomly generated code is a second factor. There are many advantages of this system but it also comes with some disadvantages. For example, a fraudulent network late delivery of OTP. This system has been replaced with an efficient system that uses the QR code instead of OTP but does not resolve the code issue. The new system we offer provides a QR code with an IMEI number and a 4-digit code. The second verification factor is replaced by the Android app installed on the registered phone. This system eliminates the problem of man in the middle and the delay in obtaining a unique code. 3. Literature Review Table1.Literature Review 3. Proposed Methodology. The ideological development of the system using the iterative model is that it will allow the developers to take advantage of earlier versions of the system. Important Sr.No. Paper Name Gap Identified 1. OTP encryption techniques in mobiles for authentication and transaction security. Most OTP systems are susceptible to real-time replay and social engineering attacks. 2. Survey on information hiding techniques using QR barcode They can breakdown Label damage. Scratched or crumpled barcodes may cause problems 3. Authentication and transaction verification using QR codes with a mobile device Use of QR code for transaction process instead of login is not safe and secure
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4259 steps in development of the system should start with the application of a small module and then make changes according to the system requirements are by using the current system, developers can identify errors in system and improve it by providing new functionality. In doing this, the design changes were made, and new system functions were created. This process continues until the ultimate goal of ensuring the best security is achieved. Mostly, Development consists of, initialization steps and system design module control lists that replaces the current OTP system. The QR authentication system allows the user to log in by using password if the user is identified, the encrypted string in the form of the QR code is displayed on the screen. A user gets logged in if an encrypted string matches an IMEI number in the database. Fig.1. barcode Before the QR code, there were some advanced verification techniques, such as user names password, barcodes, face recognition, fingerprint. Security is compromised as passwords faced the problems of hacking. The code limit is that it can only save up to 20 digits therefore complex passwords cannot be created by using the code. Barcode which are scratched, does not provide any security. Devices and technology used for fingerprints and face identities suffers from a problem of accuracy. Therefore to reduce all the drawbacks of previous security system QR code is made. QR code is a Quick Response code. It was introduced in 1994 by a Japanese company subordinate –Danso-Wave. The QR code can produce more complex passwords because it can hold up to 4296 alphanumeric character. Since it is a two-dimensional barcode, can be read from any direction. Fig.2. QR code There are two parts to this system. Section in which input data is converted into QR code is known as encoding section. Data analysis and encoding is performed in this then it is followed by error correction, coding and the final message is organized. Decoding is second stage where decoding of QR code image is done and whatever data it contains is displayed the decoding technique starts with distinguishing the black and white modules and then rearranging the modules to achieve the decoded format information. 4] Proposed system Fig.3. Flow Diagram The steps in above diagram provide information on how to complete the registration process: -At first user will sign up for registration by submitting details such as his username, password and IMEI number. When the data is verified it will be saved in the database. Then public key and private key will be generated by the data in the data server and they will be stored in the server. The user will continue to download the Application and install it on his phone. When a user executes the application for first time, public and private key files are created and saved internal storage of mobile phones. When registering, if the user does not enter all values as user names, IMEI number password, phone number, and email address then the registration process will be failed. Validation plays an important role in the registration process; if validation unsuccessful then login of user is not possible.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4260 Fig 3.Registration process diagram 5] IMPLEMENTATION This system is implied when your (user) mobile phone has the internet and is online where string is formed by doing encryption of random number, public key and IMEI number. With this help of this string QR code is obtained by using the QR code generating function. Once it is produce, it will be shown on client’s machine and clients will scan this QR code with their mobile phone. Since its online mode, after scanning, the generated string user directly enters into login page by using internet. If there is successful login, the customer home page of the bank website is displayed. So in our system, we do not need to remember the password. The user's public key is used to decrypt the string and also ensure that it is in our transaction table with random number, and then modification of the line are done in the table. Server, then check whether IMEI is valid. If it is found valid, then the login is successful. After successful login, the transaction row is removed and a new QR code appears when the user wants to sign in again. Now, PHP sessions are created and when the user is finishes his/her task, the session is destroyed. 6] SECURITY The QR code and encryption algorithms provide powerful security for our system. It does not get susceptible to the man-in-the-middle attack because the message between the user and the server is always in the encrypted form. Also, for a mobile app, one has to have a password so they cannot be attacked by anyone in any other ways. If the people who are untrusted know how to work on data storage, the security issue is created. Phishing attacks are possible on mobile phones if we replace apps with others app. Result:- Screenshots 1.Home Page. 2.QR code. 3.Login Succsess.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 04 | Apr 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4261 4.Admin Page. Conclusion: - This system gives additional security with the traditional way of online authentication of banking; which contains username and password. On the other hand, by adding QR code authentication, the security measures for banking are improved. Two factor authentications are measured in this system. With the help of this QR code, security is improved during the login of the specific bank. Depending on the authentication only the client will be able to achieve the transaction. In future we would like to add voice input command feature to our website and android application. It will help the user to do his work easily. We would like to use some advanced encryption and decryption algorithm, better than AES. Refernces:- [1] T. Purnomo, Y. S. Gondokaryono and C. Kim, "Mutual authentication in securing mobile payment system using encrypted QR code based on Public Key Infrastructure," 2016 6th International Conference on System Engineering and Technology (ICSET), Bandung, 2016, pp. 194-198. doi: 10.1109/ICSEngT.2016.784964 [2] S. Khairnar and R. Kharat, "Online fraud transaction prevention system using extended visual cryptography and QR code," 2016 International Conference on Computing Communication Control and automation (ICCUBEA), Pune, 2016, pp. 1-4. doi: 10.1109/ICCUBEA.2016.7860061 [3] S. Istyaq and M. S. Umar, "Encoding passwords using QR image for authentication," 2016 2nd International Conference on Next Generation Computing Technologies (NGCT), Dehradun, 2016, pp. 818-823. doi: 10.1109/NGCT.2016.7877523 [4] Mrs.Shanta Sondur, Ms.Tanushree Bhattacharjee “QR- Decoder and Mobile Payment System for Feature Phone”, VESIT,International Technological Conference(I- TechCON)-Jan. 03 –04(2014), Pages 13-15 [5] Dr. A. P. Adsul, Gayatri Kumbhar, Vrunda Chincholkar, Yogesh Kamble, Anuja Bankar “Automated Exam Process using QR Code Technology” International Journal of Application or Innovation in Engineering & Management, (IJAIEM)-ISSN 2319-4847,Vol.3,Issue 4,April-2014,Pages- 296-298. [6] SomdipDey, B. JoyshreeNath and C. AsokeNath “OTP Encryption Techniques in Mobiles for Authentication and Transaction Security” Institute of Information Systems Argentinierstrasse -2009. [7] Jawahar Thakur, Nagesh Kumar “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis ” International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, Volume 1, Issue 2, December 2011).