Skip to main content

Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme – B-PASS

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2014)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 420))

  • 2501 Accesses

Abstract

Biometrics (or biometric authentication) which is more secure than conventional password based scheme, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometrics has become increasingly more valuable as a tool for verifying identities in a new and deeply interconnected national security environment. It plays a major role in almost all e-transactions. These e-transactions require a commitment to secure transactional details, including credit card information of the customers from various attacks such as replay attack, circumvention, repudiation and covert acquisition. To overcome the above mentioned attacks, a system that enhances E-payment security through Biometric PASS (Personal Authentication using Steganography Scheme) has been proposed. In this system a B-PASS card is generated by collecting the user’s fingerprint and pin number during registration, which is later checked during verification phase. Transaction is possible only if all the three components (fingerprint, pin number and B-PASS card) are available and verified to be genuine. This system gives the internet users the confidence to perform e-transactions without the need to worry about the hackers or online shopping frauds.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gartner, Inc.: The Evolution of e-Business Security Requirements. VeriSign. Inc White Paper, 1–52 (2001)

    Google Scholar 

  2. Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C e-Business. International Journal of Retail and Distribution Management 34(7), 541–555 (2006)

    Article  Google Scholar 

  3. Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–144 (2006)

    Article  Google Scholar 

  4. Knorr, K., Röhrig, S.: Security of Electronic Business Applications: Structure and Quantification. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 25–37. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  5. Jewson, R.: E-payments: Credit Cards on the Internet. Aconite White paper, 1–33 (2001)

    Google Scholar 

  6. Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. WILEY Computer Publishing (2001)

    Google Scholar 

  7. Wolrath, C.: Secure Electronic Transaction: a market survey and a test implementation of SET technology. Master Thesis, UPPSALA University (1998)

    Google Scholar 

  8. Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3–18 (2006)

    Article  Google Scholar 

  9. Ross, A.: Information Fusion in fingerprint Authentication. PhD Thesis, Michigan State University (2003)

    Google Scholar 

  10. Maniam, B., Naranjo, L., Subramaniam, G.: E-Commerce Best Practices: How to Achieve an Environment of Trust and Security. International Journal of Innovation, Management and Technology 3(4), 396–401 (2012)

    Google Scholar 

  11. Houmani, H., Mejri, M.: Formal analysis of SET and NSL protocols using the interpretation functions-based method. Journal of Computer Networks and Communications 12, 36–48 (2012)

    Google Scholar 

  12. Visa International, 3-D Secure Introduction, Visa International Service Association (2002)

    Google Scholar 

  13. GPayments, VISA 3-D Secure vs. MasterCard SPA, http://www.gpayments.com

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chelliah, B., Geetha, S. (2014). Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme – B-PASS. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-54525-2_41

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-54524-5

  • Online ISBN: 978-3-642-54525-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics