SlideShare a Scribd company logo
1 of 5
Download to read offline
International Journal of Trend in
International Open Access Journal
ISSN No: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Secure E-Banking Using Bioinformatics
Research Scholars, Department o
University of Engineering & Technology,
ABSTRACT
During the past decade e banking has emerged with
enormous speed. The use of e banking and the
application of e banking is now enormous these days.
But the modern banking completely relies on internet
and computer technology, the threats and the chances
of breaching the security has also increased. We are
totally dependent on the internet to carry out the
transactions and the daily routines in the banks. Thus
there is the immense need of increasing the security in
the banking field. We have developed the system in
which we have developed a secure banking system.
We are using Finger print authentication device and
the GSM module to carry out the functionalities of the
system.
Keyword: Finger Print authentication device, GSM
module.
I. INTRODUCTION
During the last decade the banking structure has been
converted into the e banking system in which the
daily routine work is being implemented using
internet and advanced computer technology. Because
of the immense need of the use of internet there is an
immense threat of the hacking and disturbing the
structure of the banking.
We have developed such a system that will ensure
safety in to the present structure of the e banking. We
have used a technique in which we are using a Finger
print authentication device and the GSM module to
enhance the security in the e banking system up to the
next level.
Our proposed methodology is that when the user is
ready to carry out the transactions and to perform
some of the functions in his/her account
required to authenticate himself/herself using Finger
print authentication device.
International Journal of Trend in Scientific Research and Development (IJTSRD)
International Open Access Journal | www.ijtsrd.com
ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Banking Using Bioinformatics
Bilal Hussain Ch, Subayyal
Research Scholars, Department of Computer Science and Engineering,
f Engineering & Technology, Lahore, Pakistan
During the past decade e banking has emerged with
enormous speed. The use of e banking and the
application of e banking is now enormous these days.
completely relies on internet
and computer technology, the threats and the chances
of breaching the security has also increased. We are
totally dependent on the internet to carry out the
transactions and the daily routines in the banks. Thus
mmense need of increasing the security in
the banking field. We have developed the system in
which we have developed a secure banking system.
We are using Finger print authentication device and
the GSM module to carry out the functionalities of the
Finger Print authentication device, GSM
During the last decade the banking structure has been
converted into the e banking system in which the
daily routine work is being implemented using
hnology. Because
of the immense need of the use of internet there is an
immense threat of the hacking and disturbing the
We have developed such a system that will ensure
safety in to the present structure of the e banking. We
have used a technique in which we are using a Finger
print authentication device and the GSM module to
enhance the security in the e banking system up to the
Our proposed methodology is that when the user is
and to perform
some of the functions in his/her account he/she is
required to authenticate himself/herself using Finger
The print of the user is matched with the one placed in
the database, if the print matches a code will
to the number of the user and the user is prompted to
input the code received, if the code matches the one
send by the system the user will allow to perform the
transactions and make changes in the system. This
process will ensure the security in t
next level.
In the first process in which the finger print is
authenticated, we have used different MATLAB
functions and schemes and algorithms for matching
the print of the finger with the one placed in the
database.
II. EXISTING WORK IN
SYSTEMS
1. It is important for the banks to provide their
Customers, a safe and secure access to their
Accounts, sometimes hackers try to access the
different user accounts by hacking the Automated
Teller Machine. To prevent the Automated Teller
Machine to be hacked by different hackers’ finger
Research and Development (IJTSRD)
www.ijtsrd.com
6 | Sep – Oct 2018
Oct 2018 Page: 302
Banking Using Bioinformatics
uter Science and Engineering,
The print of the user is matched with the one placed in
the database, if the print matches a code will be send
to the number of the user and the user is prompted to
input the code received, if the code matches the one
send by the system the user will allow to perform the
transactions and make changes in the system. This
process will ensure the security in the system to the
In the first process in which the finger print is
authenticated, we have used different MATLAB
functions and schemes and algorithms for matching
the print of the finger with the one placed in the
EXISTING WORK IN CONTROL
It is important for the banks to provide their
Customers, a safe and secure access to their
Accounts, sometimes hackers try to access the
different user accounts by hacking the Automated
Teller Machine. To prevent the Automated Teller
ne to be hacked by different hackers’ finger
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
print scanner should be provided with each
Automated Teller Machine. By providing Finger
scanner with each Automated Teller Machine it
will ensure after verifying that account was
accessed by the original customer or by the
specific person who had the access for that
account. This will ensure security and will prevent
from unauthorized access.
2. As banking system is shifting toward online
banking system where they always need internet
to send and receive information .some criminal
hackers try to hack different user accounts through
internet if they successfully access some accounts,
then it results in the form of big loss for the
customer and for the banks also. So it is necessary
that the customer should be securel
before each login to the accounts for this purpose
different technologies should be used for safe and
secure access to the account and for the
identification of the customer.
3. ATM is the electronic telecommunication device
used for transaction. It can be accesses by
anywhere for cash with draw, deposit money and
transfer funds, but no proper authentication is
used. So there is need to securely identify the
person before accessing the account so therefore
face recognition should be used that wil
the authorized access to the account was made ,
otherwise user will not be able to login if face
recognition process was not completed.
III. Hardware used in the system
The hardware implemented in the system are finger
print authentication device and the GSM module.
IV. Data Flow diagram
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
print scanner should be provided with each
Automated Teller Machine. By providing Finger
scanner with each Automated Teller Machine it
will ensure after verifying that account was
er or by the
specific person who had the access for that
account. This will ensure security and will prevent
As banking system is shifting toward online
banking system where they always need internet
n .some criminal
hackers try to hack different user accounts through
internet if they successfully access some accounts,
then it results in the form of big loss for the
customer and for the banks also. So it is necessary
that the customer should be securely identified
before each login to the accounts for this purpose
different technologies should be used for safe and
secure access to the account and for the
ATM is the electronic telecommunication device
. It can be accesses by
anywhere for cash with draw, deposit money and
transfer funds, but no proper authentication is
used. So there is need to securely identify the
person before accessing the account so therefore
face recognition should be used that will ensure
the authorized access to the account was made ,
otherwise user will not be able to login if face
recognition process was not completed.
The hardware implemented in the system are finger
d the GSM module.
Both the modules have vital and different importance
in the system.
Finger print authentication device:
The device is used to authenticate the user and
authentication process occurs every time the user
wants to make changes in the account
or to submit funds in the account.
We are using the GSM module which has the
functionality to send the code message to the user to
after the authentication phase. The user has to enter
the code in the given field to perform the transact
and the if the code entered by the user matches with
the one send by the system the user will be given the
perform the transactions.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 303
Both the modules have vital and different importance
Finger print authentication device:
The device is used to authenticate the user and
authentication process occurs every time the user
wants to make changes in the account or to with draw
or to submit funds in the account.
We are using the GSM module which has the
functionality to send the code message to the user to
after the authentication phase. The user has to enter
the code in the given field to perform the transactions
and the if the code entered by the user matches with
the one send by the system the user will be given the
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
System flow diagram:-
Use Case Diagram:-
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 304
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Explained View of the system:-
In our system we have used the methodology which
consists of three phases. Now we will explain the
entire structure and the working of the system.
Registration phase:-
In this phase the user is registered. This is the first
phase. When the user wants to open an account in to
the bank, the user is required to give his/her finger
impression to register himself / herself. Besides
setting up the PIN password the user is also registered
on the basis of the finger print impression. The user is
asked to place the finger three times on the finger
print scanner to get the fair good and clear image of
the finger.
Besides this we have used other MATLAB functions
and also created some of them to enhance the image
and to place in the database. We have us
Normalization techniques and frequency distribution
techniques and orientation image estimation and the
region mask distribution.
Authentication Phase:-
In this phase the user is authenticated. This process is
done by matching the finger print impr
user with the finger print impression saved in the
database. In this phase only the registered user can
enter. When the user is registered the PIN number is
given to him/her also with account number and the
account password. In this phase the user enters the
ATM booth enter the account number. Enter the
account type. Verify type. Enters the pin. Then the
PIN is verified. Then comes the use of the Finger
print authentication device. The user submits the
impression of the finger and that impress
checked with the one placed in the database. If the
impression matches the one placed in the database the
user is allowed to access the account and perform the
activities. If not the user will be blocked and will not
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
In our system we have used the methodology which
consists of three phases. Now we will explain the
entire structure and the working of the system.
In this phase the user is registered. This is the first
user wants to open an account in to
the bank, the user is required to give his/her finger
herself. Besides
setting up the PIN password the user is also registered
on the basis of the finger print impression. The user is
ed to place the finger three times on the finger
print scanner to get the fair good and clear image of
Besides this we have used other MATLAB functions
and also created some of them to enhance the image
and to place in the database. We have used
Normalization techniques and frequency distribution
techniques and orientation image estimation and the
In this phase the user is authenticated. This process is
done by matching the finger print impression of the
user with the finger print impression saved in the
database. In this phase only the registered user can
enter. When the user is registered the PIN number is
given to him/her also with account number and the
user enters the
ATM booth enter the account number. Enter the
account type. Verify type. Enters the pin. Then the
PIN is verified. Then comes the use of the Finger
print authentication device. The user submits the
impression of the finger and that impression is
checked with the one placed in the database. If the
impression matches the one placed in the database the
user is allowed to access the account and perform the
activities. If not the user will be blocked and will not
be allowed to access the accoun
transactions.
GSM code generation phase:
This phase is used for enhancing and ensuring the
security in to the system to the next level. When the
user is authenticated the system will send the code to
the number given by the user at the
registration. The user is then prompted to enter the
code in the required field. Then the code is checked
with the code send by the system, if the code matches,
the user is fully authorized to access the account and
perform the functionality. I
matches the user is blocked to perform the
functionality and will not be authorized.
Benefits of our proposed methodology:
The benefits of proposed system
Fairness:-
Our system will introduce fairness in the e banking
process to next level. As the methodology proposed
by us is nearly impossible to break. So it will
introduce fairness in the electronic banking process.
Uniqueness:-
We have defined uniqueness in our system. Every
user has the unique identity because of the uni
finger print. No user would be allowed to access the
account of any other user.
Privacy:-
We have paid special attention to privacy in our
system. The privacy of the user will be maintained on
all conditions.
Accuracy:-
Our methodology is accurate. W
accurate and dependable devices in the system. They
will provide the most accurate result is all conditions.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 305
be allowed to access the account and perform the
GSM code generation phase:-
This phase is used for enhancing and ensuring the
security in to the system to the next level. When the
user is authenticated the system will send the code to
the number given by the user at the time of the
registration. The user is then prompted to enter the
code in the required field. Then the code is checked
with the code send by the system, if the code matches,
the user is fully authorized to access the account and
perform the functionality. If the code does not
matches the user is blocked to perform the
functionality and will not be authorized.
Benefits of our proposed methodology:-
The benefits of proposed system are:-
Our system will introduce fairness in the e banking
s to next level. As the methodology proposed
by us is nearly impossible to break. So it will
introduce fairness in the electronic banking process.
We have defined uniqueness in our system. Every
user has the unique identity because of the unique
finger print. No user would be allowed to access the
We have paid special attention to privacy in our
system. The privacy of the user will be maintained on
Our methodology is accurate. We have introduced
accurate and dependable devices in the system. They
will provide the most accurate result is all conditions.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
@ IJTSRD | Available Online @ www.ijtsrd.com
Efficiency:-
Efficiency is the important factor that we have
considered.
Conclusion:-
We have developed a system which can be
implemented in the e banking system. We have used
advanced security techniques. We make the use of the
finger print authentication device and the GSM
module.
Future work:-
For the future various biometric techniques can be
implemented to enhance the security in the system.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456
www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018
Efficiency is the important factor that we have
We have developed a system which can be
implemented in the e banking system. We have used
advanced security techniques. We make the use of the
finger print authentication device and the GSM
For the future various biometric techniques can be
security in the system.
Face detection and the voice recognition techniques
can be used to enhance the security.
References:-
1. Ratha, Nalini K., Jonathan H. Connell, and Ruud
M. Bolle. "Enhancing security and privacy in
biometrics-based authentication
systems Journal40.3 (2001): 614
2. Jain, Anil K., et al. "An identity
system using fingerprints."
IEEE 85.9 (1997): 1365-1388.
3. Jain, Anil K., et al. "Filter bank
matching." Image Processing, IEEE Transactions
on 9.5 (2000): 846-859.
4. Liu, Simon, and Mark Silverman. "A practical
guide to biometric security technology."
Professional 3.1 (2001): 27
5. Gullman, Lawrence S., Eric Edwards, and
Norman Fast. "Biometric token for authori
access to a host system." U.S. Patent No.
5,280,527. 18 Jan. 1994.
6. Zhang, Lin, et al. "Online finger
verification for personal authentication."
recognition 43.7 (2010): 2560
7. Council, Federal Financial Institutions
Examination. "Authentication in an internet
banking environment."
Letter, FIL-103-2005. Washington, DC: Federal
Deposit Insurance Corp.
March 18 (2005): 2005.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
Oct 2018 Page: 306
Face detection and the voice recognition techniques
can be used to enhance the security.
Ratha, Nalini K., Jonathan H. Connell, and Ruud
M. Bolle. "Enhancing security and privacy in
based authentication systems." IBM
40.3 (2001): 614-634.
Jain, Anil K., et al. "An identity-authentication
system using fingerprints."Proceedings of the
1388.
Filter bank-based fingerprint
Processing, IEEE Transactions
Liu, Simon, and Mark Silverman. "A practical
guide to biometric security technology." IT
3.1 (2001): 27-32.
Gullman, Lawrence S., Eric Edwards, and
Norman Fast. "Biometric token for authorizing
access to a host system." U.S. Patent No.
Zhang, Lin, et al. "Online finger-knuckle-print
verification for personal authentication." Pattern
43.7 (2010): 2560-2571.
Council, Federal Financial Institutions
on. "Authentication in an internet
Financial Institution
2005. Washington, DC: Federal
Deposit Insurance Corp. (FDIC). Retrieved

More Related Content

What's hot

IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoTIRJET Journal
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System IJECEIAES
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...IJRTEMJOURNAL
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking sathyananda prabhu
 
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARINGijcsit
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction SystemIRJET Journal
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsIOSR Journals
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET Journal
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET Journal
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...Syeful Islam
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Fusion Informatics
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 

What's hot (20)

A011140104
A011140104A011140104
A011140104
 
N044057478
N044057478N044057478
N044057478
 
IRJET - Cyber Security Threats and Measures in Context with IoT
IRJET -  	  Cyber Security Threats and Measures in Context with IoTIRJET -  	  Cyber Security Threats and Measures in Context with IoT
IRJET - Cyber Security Threats and Measures in Context with IoT
 
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
The Fact-Finding Security Examination in NFC-enabled Mobile Payment System
 
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording ...
 
Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking Ssp fraud risk vulnerablity in ebanking
Ssp fraud risk vulnerablity in ebanking
 
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
SFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARINGSFAMSS:A S ECURE  F RAMEWORK  F OR  ATM M ACHINES  V IA  S ECRET  S HARING
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARING
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
IRJET- Digital Tranquillity in Cheque Transaction System
IRJET-  	  Digital Tranquillity in Cheque Transaction SystemIRJET-  	  Digital Tranquillity in Cheque Transaction System
IRJET- Digital Tranquillity in Cheque Transaction System
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
Credit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using BiometricsCredit Card Duplication and Crime Prevention Using Biometrics
Credit Card Duplication and Crime Prevention Using Biometrics
 
H029044050
H029044050H029044050
H029044050
 
IRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker SystemIRJET- Biometric based Bank Locker System
IRJET- Biometric based Bank Locker System
 
IRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’SIRJET- High Security System for Money Carrying VAN to ATM’S
IRJET- High Security System for Money Carrying VAN to ATM’S
 
Enhancing security features
Enhancing security featuresEnhancing security features
Enhancing security features
 
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
An Algorithm for Electronic Money Transaction Security (Three Layer Security)...
 
Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020Overcome Security Threats Affecting Mobile Financial Solutions 2020
Overcome Security Threats Affecting Mobile Financial Solutions 2020
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 

Similar to Secure e-banking using bioinformatics

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for BankingIRJET Journal
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...IRJET Journal
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual CryptographyIRJET Journal
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET Journal
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET Journal
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric TransactionIRJET Journal
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET Journal
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET Journal
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management SystemIRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 

Similar to Secure e-banking using bioinformatics (20)

Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
IRJET - Three Layered Security for Banking
IRJET -  	  Three Layered Security for BankingIRJET -  	  Three Layered Security for Banking
IRJET - Three Layered Security for Banking
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
CARDLESS TRANSACTION OF ATM MACHINE WITH ASECURITY OF FACIAL RECOGNITION AND ...
 
IRJET- Phishing Attack based on Visual Cryptography
IRJET-  	  Phishing Attack based on Visual CryptographyIRJET-  	  Phishing Attack based on Visual Cryptography
IRJET- Phishing Attack based on Visual Cryptography
 
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...IRJET-  	  Credit Card Transaction using Fingerprint Recognisation and Two St...
IRJET- Credit Card Transaction using Fingerprint Recognisation and Two St...
 
IRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM MachineIRJET- Security for Building & ATM Machine
IRJET- Security for Building & ATM Machine
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
IRJET - Anti-Fraud ATM Security System
IRJET -  	  Anti-Fraud ATM Security SystemIRJET -  	  Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
C132733
C132733C132733
C132733
 
IRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTPIRJET- Multi sharing Data using OTP
IRJET- Multi sharing Data using OTP
 
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
IRJET- Using Fingerprint, Pycrypto, and Mobile Banking App, to Withdraw Cash ...
 
IRJET- Bank Management System
IRJET- Bank Management SystemIRJET- Bank Management System
IRJET- Bank Management System
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Secure e-banking using bioinformatics

  • 1. International Journal of Trend in International Open Access Journal ISSN No: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Secure E-Banking Using Bioinformatics Research Scholars, Department o University of Engineering & Technology, ABSTRACT During the past decade e banking has emerged with enormous speed. The use of e banking and the application of e banking is now enormous these days. But the modern banking completely relies on internet and computer technology, the threats and the chances of breaching the security has also increased. We are totally dependent on the internet to carry out the transactions and the daily routines in the banks. Thus there is the immense need of increasing the security in the banking field. We have developed the system in which we have developed a secure banking system. We are using Finger print authentication device and the GSM module to carry out the functionalities of the system. Keyword: Finger Print authentication device, GSM module. I. INTRODUCTION During the last decade the banking structure has been converted into the e banking system in which the daily routine work is being implemented using internet and advanced computer technology. Because of the immense need of the use of internet there is an immense threat of the hacking and disturbing the structure of the banking. We have developed such a system that will ensure safety in to the present structure of the e banking. We have used a technique in which we are using a Finger print authentication device and the GSM module to enhance the security in the e banking system up to the next level. Our proposed methodology is that when the user is ready to carry out the transactions and to perform some of the functions in his/her account required to authenticate himself/herself using Finger print authentication device. International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal | www.ijtsrd.com ISSN No: 2456 - 6470 | Volume - 2 | Issue – 6 | Sep www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Banking Using Bioinformatics Bilal Hussain Ch, Subayyal Research Scholars, Department of Computer Science and Engineering, f Engineering & Technology, Lahore, Pakistan During the past decade e banking has emerged with enormous speed. The use of e banking and the application of e banking is now enormous these days. completely relies on internet and computer technology, the threats and the chances of breaching the security has also increased. We are totally dependent on the internet to carry out the transactions and the daily routines in the banks. Thus mmense need of increasing the security in the banking field. We have developed the system in which we have developed a secure banking system. We are using Finger print authentication device and the GSM module to carry out the functionalities of the Finger Print authentication device, GSM During the last decade the banking structure has been converted into the e banking system in which the daily routine work is being implemented using hnology. Because of the immense need of the use of internet there is an immense threat of the hacking and disturbing the We have developed such a system that will ensure safety in to the present structure of the e banking. We have used a technique in which we are using a Finger print authentication device and the GSM module to enhance the security in the e banking system up to the Our proposed methodology is that when the user is and to perform some of the functions in his/her account he/she is required to authenticate himself/herself using Finger The print of the user is matched with the one placed in the database, if the print matches a code will to the number of the user and the user is prompted to input the code received, if the code matches the one send by the system the user will allow to perform the transactions and make changes in the system. This process will ensure the security in t next level. In the first process in which the finger print is authenticated, we have used different MATLAB functions and schemes and algorithms for matching the print of the finger with the one placed in the database. II. EXISTING WORK IN SYSTEMS 1. It is important for the banks to provide their Customers, a safe and secure access to their Accounts, sometimes hackers try to access the different user accounts by hacking the Automated Teller Machine. To prevent the Automated Teller Machine to be hacked by different hackers’ finger Research and Development (IJTSRD) www.ijtsrd.com 6 | Sep – Oct 2018 Oct 2018 Page: 302 Banking Using Bioinformatics uter Science and Engineering, The print of the user is matched with the one placed in the database, if the print matches a code will be send to the number of the user and the user is prompted to input the code received, if the code matches the one send by the system the user will allow to perform the transactions and make changes in the system. This process will ensure the security in the system to the In the first process in which the finger print is authenticated, we have used different MATLAB functions and schemes and algorithms for matching the print of the finger with the one placed in the EXISTING WORK IN CONTROL It is important for the banks to provide their Customers, a safe and secure access to their Accounts, sometimes hackers try to access the different user accounts by hacking the Automated Teller Machine. To prevent the Automated Teller ne to be hacked by different hackers’ finger
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com print scanner should be provided with each Automated Teller Machine. By providing Finger scanner with each Automated Teller Machine it will ensure after verifying that account was accessed by the original customer or by the specific person who had the access for that account. This will ensure security and will prevent from unauthorized access. 2. As banking system is shifting toward online banking system where they always need internet to send and receive information .some criminal hackers try to hack different user accounts through internet if they successfully access some accounts, then it results in the form of big loss for the customer and for the banks also. So it is necessary that the customer should be securel before each login to the accounts for this purpose different technologies should be used for safe and secure access to the account and for the identification of the customer. 3. ATM is the electronic telecommunication device used for transaction. It can be accesses by anywhere for cash with draw, deposit money and transfer funds, but no proper authentication is used. So there is need to securely identify the person before accessing the account so therefore face recognition should be used that wil the authorized access to the account was made , otherwise user will not be able to login if face recognition process was not completed. III. Hardware used in the system The hardware implemented in the system are finger print authentication device and the GSM module. IV. Data Flow diagram International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 print scanner should be provided with each Automated Teller Machine. By providing Finger scanner with each Automated Teller Machine it will ensure after verifying that account was er or by the specific person who had the access for that account. This will ensure security and will prevent As banking system is shifting toward online banking system where they always need internet n .some criminal hackers try to hack different user accounts through internet if they successfully access some accounts, then it results in the form of big loss for the customer and for the banks also. So it is necessary that the customer should be securely identified before each login to the accounts for this purpose different technologies should be used for safe and secure access to the account and for the ATM is the electronic telecommunication device . It can be accesses by anywhere for cash with draw, deposit money and transfer funds, but no proper authentication is used. So there is need to securely identify the person before accessing the account so therefore face recognition should be used that will ensure the authorized access to the account was made , otherwise user will not be able to login if face recognition process was not completed. The hardware implemented in the system are finger d the GSM module. Both the modules have vital and different importance in the system. Finger print authentication device: The device is used to authenticate the user and authentication process occurs every time the user wants to make changes in the account or to submit funds in the account. We are using the GSM module which has the functionality to send the code message to the user to after the authentication phase. The user has to enter the code in the given field to perform the transact and the if the code entered by the user matches with the one send by the system the user will be given the perform the transactions. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 303 Both the modules have vital and different importance Finger print authentication device: The device is used to authenticate the user and authentication process occurs every time the user wants to make changes in the account or to with draw or to submit funds in the account. We are using the GSM module which has the functionality to send the code message to the user to after the authentication phase. The user has to enter the code in the given field to perform the transactions and the if the code entered by the user matches with the one send by the system the user will be given the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com System flow diagram:- Use Case Diagram:- International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 304
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Explained View of the system:- In our system we have used the methodology which consists of three phases. Now we will explain the entire structure and the working of the system. Registration phase:- In this phase the user is registered. This is the first phase. When the user wants to open an account in to the bank, the user is required to give his/her finger impression to register himself / herself. Besides setting up the PIN password the user is also registered on the basis of the finger print impression. The user is asked to place the finger three times on the finger print scanner to get the fair good and clear image of the finger. Besides this we have used other MATLAB functions and also created some of them to enhance the image and to place in the database. We have us Normalization techniques and frequency distribution techniques and orientation image estimation and the region mask distribution. Authentication Phase:- In this phase the user is authenticated. This process is done by matching the finger print impr user with the finger print impression saved in the database. In this phase only the registered user can enter. When the user is registered the PIN number is given to him/her also with account number and the account password. In this phase the user enters the ATM booth enter the account number. Enter the account type. Verify type. Enters the pin. Then the PIN is verified. Then comes the use of the Finger print authentication device. The user submits the impression of the finger and that impress checked with the one placed in the database. If the impression matches the one placed in the database the user is allowed to access the account and perform the activities. If not the user will be blocked and will not International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 In our system we have used the methodology which consists of three phases. Now we will explain the entire structure and the working of the system. In this phase the user is registered. This is the first user wants to open an account in to the bank, the user is required to give his/her finger herself. Besides setting up the PIN password the user is also registered on the basis of the finger print impression. The user is ed to place the finger three times on the finger print scanner to get the fair good and clear image of Besides this we have used other MATLAB functions and also created some of them to enhance the image and to place in the database. We have used Normalization techniques and frequency distribution techniques and orientation image estimation and the In this phase the user is authenticated. This process is done by matching the finger print impression of the user with the finger print impression saved in the database. In this phase only the registered user can enter. When the user is registered the PIN number is given to him/her also with account number and the user enters the ATM booth enter the account number. Enter the account type. Verify type. Enters the pin. Then the PIN is verified. Then comes the use of the Finger print authentication device. The user submits the impression of the finger and that impression is checked with the one placed in the database. If the impression matches the one placed in the database the user is allowed to access the account and perform the activities. If not the user will be blocked and will not be allowed to access the accoun transactions. GSM code generation phase: This phase is used for enhancing and ensuring the security in to the system to the next level. When the user is authenticated the system will send the code to the number given by the user at the registration. The user is then prompted to enter the code in the required field. Then the code is checked with the code send by the system, if the code matches, the user is fully authorized to access the account and perform the functionality. I matches the user is blocked to perform the functionality and will not be authorized. Benefits of our proposed methodology: The benefits of proposed system Fairness:- Our system will introduce fairness in the e banking process to next level. As the methodology proposed by us is nearly impossible to break. So it will introduce fairness in the electronic banking process. Uniqueness:- We have defined uniqueness in our system. Every user has the unique identity because of the uni finger print. No user would be allowed to access the account of any other user. Privacy:- We have paid special attention to privacy in our system. The privacy of the user will be maintained on all conditions. Accuracy:- Our methodology is accurate. W accurate and dependable devices in the system. They will provide the most accurate result is all conditions. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 305 be allowed to access the account and perform the GSM code generation phase:- This phase is used for enhancing and ensuring the security in to the system to the next level. When the user is authenticated the system will send the code to the number given by the user at the time of the registration. The user is then prompted to enter the code in the required field. Then the code is checked with the code send by the system, if the code matches, the user is fully authorized to access the account and perform the functionality. If the code does not matches the user is blocked to perform the functionality and will not be authorized. Benefits of our proposed methodology:- The benefits of proposed system are:- Our system will introduce fairness in the e banking s to next level. As the methodology proposed by us is nearly impossible to break. So it will introduce fairness in the electronic banking process. We have defined uniqueness in our system. Every user has the unique identity because of the unique finger print. No user would be allowed to access the We have paid special attention to privacy in our system. The privacy of the user will be maintained on Our methodology is accurate. We have introduced accurate and dependable devices in the system. They will provide the most accurate result is all conditions.
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 @ IJTSRD | Available Online @ www.ijtsrd.com Efficiency:- Efficiency is the important factor that we have considered. Conclusion:- We have developed a system which can be implemented in the e banking system. We have used advanced security techniques. We make the use of the finger print authentication device and the GSM module. Future work:- For the future various biometric techniques can be implemented to enhance the security in the system. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456 www.ijtsrd.com | Volume – 2 | Issue – 6 | Sep-Oct 2018 Efficiency is the important factor that we have We have developed a system which can be implemented in the e banking system. We have used advanced security techniques. We make the use of the finger print authentication device and the GSM For the future various biometric techniques can be security in the system. Face detection and the voice recognition techniques can be used to enhance the security. References:- 1. Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. "Enhancing security and privacy in biometrics-based authentication systems Journal40.3 (2001): 614 2. Jain, Anil K., et al. "An identity system using fingerprints." IEEE 85.9 (1997): 1365-1388. 3. Jain, Anil K., et al. "Filter bank matching." Image Processing, IEEE Transactions on 9.5 (2000): 846-859. 4. Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." Professional 3.1 (2001): 27 5. Gullman, Lawrence S., Eric Edwards, and Norman Fast. "Biometric token for authori access to a host system." U.S. Patent No. 5,280,527. 18 Jan. 1994. 6. Zhang, Lin, et al. "Online finger verification for personal authentication." recognition 43.7 (2010): 2560 7. Council, Federal Financial Institutions Examination. "Authentication in an internet banking environment." Letter, FIL-103-2005. Washington, DC: Federal Deposit Insurance Corp. March 18 (2005): 2005. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 Oct 2018 Page: 306 Face detection and the voice recognition techniques can be used to enhance the security. Ratha, Nalini K., Jonathan H. Connell, and Ruud M. Bolle. "Enhancing security and privacy in based authentication systems." IBM 40.3 (2001): 614-634. Jain, Anil K., et al. "An identity-authentication system using fingerprints."Proceedings of the 1388. Filter bank-based fingerprint Processing, IEEE Transactions Liu, Simon, and Mark Silverman. "A practical guide to biometric security technology." IT 3.1 (2001): 27-32. Gullman, Lawrence S., Eric Edwards, and Norman Fast. "Biometric token for authorizing access to a host system." U.S. Patent No. Zhang, Lin, et al. "Online finger-knuckle-print verification for personal authentication." Pattern 43.7 (2010): 2560-2571. Council, Federal Financial Institutions on. "Authentication in an internet Financial Institution 2005. Washington, DC: Federal Deposit Insurance Corp. (FDIC). Retrieved