Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme – B-PASS
Biometrics (or biometric authentication) which is more secure than conventional password based scheme, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometrics has become increasingly more valuable as a tool for verifying identities in a new and deeply interconnected national security environment. It plays a major role in almost all e-transactions. These e-transactions require a commitment to secure transactional details, including credit card information of the customers from various attacks such as replay attack, circumvention, repudiation and covert acquisition. To overcome the above mentioned attacks, a system that enhances E-payment security through Biometric PASS (Personal Authentication using Steganography Scheme) has been proposed. In this system a B-PASS card is generated by collecting the user’s fingerprint and pin number during registration, which is later checked during verification phase. Transaction is possible only if all the three components (fingerprint, pin number and B-PASS card) are available and verified to be genuine. This system gives the internet users the confidence to perform e-transactions without the need to worry about the hackers or online shopping frauds.
KeywordsE-Payment Security E-Commerce Steganography Biometric authentication B-PASS
Unable to display preview. Download preview PDF.
- 1.Gartner, Inc.: The Evolution of e-Business Security Requirements. VeriSign. Inc White Paper, 1–52 (2001)Google Scholar
- 5.Jewson, R.: E-payments: Credit Cards on the Internet. Aconite White paper, 1–33 (2001)Google Scholar
- 6.Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. WILEY Computer Publishing (2001)Google Scholar
- 7.Wolrath, C.: Secure Electronic Transaction: a market survey and a test implementation of SET technology. Master Thesis, UPPSALA University (1998)Google Scholar
- 9.Ross, A.: Information Fusion in fingerprint Authentication. PhD Thesis, Michigan State University (2003)Google Scholar
- 10.Maniam, B., Naranjo, L., Subramaniam, G.: E-Commerce Best Practices: How to Achieve an Environment of Trust and Security. International Journal of Innovation, Management and Technology 3(4), 396–401 (2012)Google Scholar
- 11.Houmani, H., Mejri, M.: Formal analysis of SET and NSL protocols using the interpretation functions-based method. Journal of Computer Networks and Communications 12, 36–48 (2012)Google Scholar
- 12.Visa International, 3-D Secure Introduction, Visa International Service Association (2002)Google Scholar
- 13.GPayments, VISA 3-D Secure vs. MasterCard SPA, http://www.gpayments.com