Preview

An Efficient Iris Authentication Usin G Chaos Theory-Based Cryptography for E-Commerce Transactions

Good Essays
Open Document
Open Document
1086 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
An Efficient Iris Authentication Usin G Chaos Theory-Based Cryptography for E-Commerce Transactions
E-commerce is an outcome of globalization and technology outbreak of 21st century. Increasingly, more products and services are sold over Internet; hence, there is a growing need for a combination of legislation and technical solutions to globally secure customer privacy.
Credit card fraud is one of the crimes especially when it is used for web-based transaction. In this paper, a technical solution using Iris authentication technique is proposed for protecting identity theft in e-commerce transactions because Iris patterns are unique to an individual. Further, this research proposes authentication of e-commerce users by using Iris biometric technique as one of the most secure biometric algorithms. Therefore, this research proposes a web-based architecture which uses a combination of Image Processing and secure transmission of customers’ Iris templates along with credit card details for decreasi ng credit card frauds over
Internet.

1. Introduction Shopping over the Internet is another alternative to shopping at a brick-and-mortar store. Credit cards are the primary means of payment for goods and services purchased online. By means of credit card, its information is transmitted over the Internet, which may not have the same level of security as phone, mail, or fax. Security issues are maybe the most important thing in online shopping. Methods to ensure secure online payment by credit card are therefore important to the success of shopping over the Internet. In online transaction with credit card, buyers want to be assured that the provided information about credit card won’t be abused or stolen (a possible fraud). Credit card fraud on the Internet is a more pervasive problem. Anybody who has access to a credit card number and expiration date can buy anything over the Internet. On the other hand, neither party can be certain of the other’s identity [1]. Credit cards were

You May Also Find These Documents Helpful

  • Good Essays

    In 1892, Francisca Rojas was found with intense neck injuries while her two sons were found with their throats cut open and dead. Francisca Rojas fanatically accused her neighbor who, under extreme interrogation, would not confess of committing murder and injuring Rojas’s neck. Inspector Alvarez, the head of the case, went to the crime scene and found a bloody fingerprint next to where the boys laid. After comparing the fingerprint to those of the neighbor, mother, sons, and other suspects, Alvarez deduced that it matched the mother’s right thumbprint. She then confessed to the murdering of her sons. The discovery of the print saved an innocent neighbor from harsh punishment. Fingerprints help solve crimes and save people's lives everyday. For that reason, it is important for people to understand fingerprints significance.…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Good Essays

    A. Thesis: Biometric technology is used for a variety of many things, but its mostly dedicated to identify and verification methods.…

    • 958 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    In approaching preventative mechanisms that are effective against hacking, it is very important that both awareness and attitude is first changed, and then perceptions of information security and how to secure data must be allowed to…

    • 631 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    itt security final paper

    • 1085 Words
    • 5 Pages

    Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Good Essays

    a). According to the information in the case, do you think the bank satisfied the requirement to two-factor authentication?…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    As a response to investigations after the World Trade Center, Pentagon, and Flight 93 attacks on September 11, 2001, America and four supporting countries invaded Iraq in March of 2003 to remove weapons of mass destruction and end Saddam Hussein's contributions to terrorism. Likewise, vigorous dialogue concerning a standardized, national identification card surfaced in September 2001. Furthermore, in 2005 Congress enacted into law the REAL ID Act that supported the use of a standardized driver’s license as a national identification (Swartz 14). Neither response provided adequate security for America citizens. A national identification card would not bring significant benefits to…

    • 818 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Fingerprint analysis had been used for over 100 years in law enforcement. The first forensic organization to identify criminals was established in 1915. In that time fingerprints were being used to track a criminal’s record, including previous arrests to decide decisions like sentencing, probation, and pardoning decisions. As technology has advanced so has our use for fingerprints. We have now been able to use fingerprints for background checks, biometric security (a way to access computers, electronic devices, and or secure locks or doors by using a fingerprint), and mass disaster identification. For example, in the case of a mass disaster to identify a large amount of people instead of the usual way of another person identifying the body you would take the fingerprints of the victims. Then they would take the fingerprints through the data base to identify each individual. The fingerprint data base is the largest data base in the world.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Biometrics is a technology to identify individuals on the basis of their physical and behavioral attributes. It involves the verification and identification of physical traits such as fingerprints, facial features, DNA, palm prints, hand geometry, and iris pattern, as well as behavioral traits such as keystroke patterns and speech patterns/voice characteristics. Biometrics has applications across many industries and sectors, the Law Enforcement sector being one of them. This technology primarily helps in maintaining a database of individuals for identification. Biometrics is also vital in the Healthcare sector for authentication and monitoring of hospital records and patient details, among other things.…

    • 366 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    These systems usually use a small camera to take a black-and-white, high-resolution image of the iris. Algorithms then define the boundaries of the iris and create a coordinate grid over the image. All the selected characteristics within the zones are then stored in a database as the individual's biometric…

    • 668 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    This white paper was written to inform TAMU student about identity theft and fraud. All are encouraged to carefully review this paper and to use it as a guide to be proactive in eliminating the chances of becoming a victim. Steps to recover from being victimized are summarized in the white paper. By being proactive in the fight against identify theft and fraud you eliminate the hardships faced when someone with malice intentions becomes you.…

    • 1645 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Elements of Security

    • 2008 Words
    • 9 Pages

    Before any company begins to expand their business into another country, they should prepare a risk assessment of the areas of interest and begin to narrow down choices based on their positives and negatives. By identifying those positives and negatives, it allows the company to weigh their overall outcome and where they could afford to take the risk. To just dive into an unknown country without assessing the economy and current security risks of setting up shop in that area could harm the future of the company greatly. Some areas that a company would want to look into would be the current economic state of the country. They would want to know how the current population is holding up against poverty and how the unemployment rate is affecting that poverty rate. They would also want to take into consideration any environmental concerns and how that might play into any unwanted expenses later down the road.…

    • 2008 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Central Idea: I will tell my audience the safest ways they can shop online using Secure websites, payment method, sticking with the stores they know and what to do if they are the victims.…

    • 945 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Biometrics

    • 3596 Words
    • 15 Pages

    D. What is the importance if using biometrics in Lebanon, and why must it be forced?…

    • 3596 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    Online Security

    • 821 Words
    • 4 Pages

    By Kristin Judge Guest Writer Kristin.judge@msisac.org Chances are you are not a cyber security expert. Well, neither am I. The last computer class I took was DOS programming in 1987. But my family and I do spend much of our time online, as I'm sure many of you do, and I now work for a computer security organization - the national not-for-profit Center for Internet Security. I spend my days spreading the message about staying safe online, and I'm thrilled to be writing this new column so I can share easy, "non-techy" tips about how to keep you and your family protected. The Internet has changed the way we live possibly more than any other single invention since electricity. Have you ever thought about the degree of change we are facing in our culture right now? This is bigger than the Industrial Revolution or other cultural shifts you used to read about in the World Book Encyclopedia. Remember encyclopedias? Your kids won't. From parenting and relationships to the way we work and how we get our information has changed. Our fundamental way of living has forever been altered. Recently, I saw a 2-year-old press the pictures in a magazine expecting them to move like her iPad. Parents are using smartphones and tablets to keep kids entertained in restaurants, the barber chair and the doctor's office waiting room. Travel has forever changed. When was the last time you booked a vacation on the phone or through an agent without first looking at the hotel and flights online? We communicate with strangers regularly, sharing pictures and opinions on hotel and restaurant choices. Have you used a paper map recently? Familiar gadgets have been replaced. Do you still use a clock radio, watch or flashlight, or has your phone taken over those responsibilities? I'm the first to admit that I have used my phone to light up the closet or the way to the bathroom while my husband was sleeping. The Internet has allowed us to become better…

    • 821 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    This paper encloses the information regarding the ‘IMAGE PROCESSING’. And discussed one of the major application of image processing ‘BIOMETRICS’. Biometrics technology allows determination and verification of ones identity through physical characteristics. To put it simply, it turns your body in to your password. We discussed various biometric techniques like finger scan, retina scan, facial scan, hand scan etc. Two algorithms have been proposed by taking biometric techniques to authenticate an ATM account holder , enabling a secure ATM by image processing. Biometrics is now applied in various public and private sectors. No doubt, biometrics is going to be next generation’s powerful security tool…!…

    • 2367 Words
    • 10 Pages
    Powerful Essays