Advertisement

Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme – B-PASS

  • Balasubramanian Chelliah
  • S. Geetha
Part of the Communications in Computer and Information Science book series (CCIS, volume 420)

Abstract

Biometrics (or biometric authentication) which is more secure than conventional password based scheme, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometrics has become increasingly more valuable as a tool for verifying identities in a new and deeply interconnected national security environment. It plays a major role in almost all e-transactions. These e-transactions require a commitment to secure transactional details, including credit card information of the customers from various attacks such as replay attack, circumvention, repudiation and covert acquisition. To overcome the above mentioned attacks, a system that enhances E-payment security through Biometric PASS (Personal Authentication using Steganography Scheme) has been proposed. In this system a B-PASS card is generated by collecting the user’s fingerprint and pin number during registration, which is later checked during verification phase. Transaction is possible only if all the three components (fingerprint, pin number and B-PASS card) are available and verified to be genuine. This system gives the internet users the confidence to perform e-transactions without the need to worry about the hackers or online shopping frauds.

Keywords

E-Payment Security E-Commerce Steganography Biometric authentication B-PASS 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Gartner, Inc.: The Evolution of e-Business Security Requirements. VeriSign. Inc White Paper, 1–52 (2001)Google Scholar
  2. 2.
    Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C e-Business. International Journal of Retail and Distribution Management 34(7), 541–555 (2006)CrossRefGoogle Scholar
  3. 3.
    Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–144 (2006)CrossRefGoogle Scholar
  4. 4.
    Knorr, K., Röhrig, S.: Security of Electronic Business Applications: Structure and Quantification. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 25–37. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  5. 5.
    Jewson, R.: E-payments: Credit Cards on the Internet. Aconite White paper, 1–33 (2001)Google Scholar
  6. 6.
    Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. WILEY Computer Publishing (2001)Google Scholar
  7. 7.
    Wolrath, C.: Secure Electronic Transaction: a market survey and a test implementation of SET technology. Master Thesis, UPPSALA University (1998)Google Scholar
  8. 8.
    Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3–18 (2006)CrossRefGoogle Scholar
  9. 9.
    Ross, A.: Information Fusion in fingerprint Authentication. PhD Thesis, Michigan State University (2003)Google Scholar
  10. 10.
    Maniam, B., Naranjo, L., Subramaniam, G.: E-Commerce Best Practices: How to Achieve an Environment of Trust and Security. International Journal of Innovation, Management and Technology 3(4), 396–401 (2012)Google Scholar
  11. 11.
    Houmani, H., Mejri, M.: Formal analysis of SET and NSL protocols using the interpretation functions-based method. Journal of Computer Networks and Communications 12, 36–48 (2012)Google Scholar
  12. 12.
    Visa International, 3-D Secure Introduction, Visa International Service Association (2002)Google Scholar
  13. 13.
    GPayments, VISA 3-D Secure vs. MasterCard SPA, http://www.gpayments.com

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  • Balasubramanian Chelliah
    • 1
  • S. Geetha
    • 2
  1. 1.Department of Computer Science and EngineeringP.S.R. Rengasamy College of EngineeringSivakasiIndia
  2. 2.Department of Information TechnologyThiagarajar College of EngineeringMaduraiIndia

Personalised recommendations