Abstract
Biometrics (or biometric authentication) which is more secure than conventional password based scheme, consists of methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Biometrics has become increasingly more valuable as a tool for verifying identities in a new and deeply interconnected national security environment. It plays a major role in almost all e-transactions. These e-transactions require a commitment to secure transactional details, including credit card information of the customers from various attacks such as replay attack, circumvention, repudiation and covert acquisition. To overcome the above mentioned attacks, a system that enhances E-payment security through Biometric PASS (Personal Authentication using Steganography Scheme) has been proposed. In this system a B-PASS card is generated by collecting the user’s fingerprint and pin number during registration, which is later checked during verification phase. Transaction is possible only if all the three components (fingerprint, pin number and B-PASS card) are available and verified to be genuine. This system gives the internet users the confidence to perform e-transactions without the need to worry about the hackers or online shopping frauds.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Gartner, Inc.: The Evolution of e-Business Security Requirements. VeriSign. Inc White Paper, 1–52 (2001)
Winch, G., Joyce, P.: Exploring the dynamics of building, and losing, consumer trust in B2C e-Business. International Journal of Retail and Distribution Management 34(7), 541–555 (2006)
Jain, A.K., Ross, A., Pankanti, S.: Biometrics: A Tool for Information Security. IEEE Transactions on Information Forensics and Security 1(2), 125–144 (2006)
Knorr, K., Röhrig, S.: Security of Electronic Business Applications: Structure and Quantification. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds.) EC-Web 2000. LNCS, vol. 1875, pp. 25–37. Springer, Heidelberg (2000)
Jewson, R.: E-payments: Credit Cards on the Internet. Aconite White paper, 1–33 (2001)
Anderson, R.: Security Engineering - A Guide to Building Dependable Distributed Systems. WILEY Computer Publishing (2001)
Wolrath, C.: Secure Electronic Transaction: a market survey and a test implementation of SET technology. Master Thesis, UPPSALA University (1998)
Cappelli, R., Maio, D., Maltoni, D., Wayman, J.L., Jain, A.K.: Performance evaluation of fingerprint verification systems. IEEE Trans. Pattern Anal. Mach. Intell. 28(1), 3–18 (2006)
Ross, A.: Information Fusion in fingerprint Authentication. PhD Thesis, Michigan State University (2003)
Maniam, B., Naranjo, L., Subramaniam, G.: E-Commerce Best Practices: How to Achieve an Environment of Trust and Security. International Journal of Innovation, Management and Technology 3(4), 396–401 (2012)
Houmani, H., Mejri, M.: Formal analysis of SET and NSL protocols using the interpretation functions-based method. Journal of Computer Networks and Communications 12, 36–48 (2012)
Visa International, 3-D Secure Introduction, Visa International Service Association (2002)
GPayments, VISA 3-D Secure vs. MasterCard SPA, http://www.gpayments.com
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chelliah, B., Geetha, S. (2014). Enhancing E-Payment Security through Biometric Based Personal Authentication Using Steganography Scheme – B-PASS. In: Martínez Pérez, G., Thampi, S.M., Ko, R., Shu, L. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-54525-2_41
Download citation
DOI: https://doi.org/10.1007/978-3-642-54525-2_41
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-54524-5
Online ISBN: 978-3-642-54525-2
eBook Packages: Computer ScienceComputer Science (R0)