Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Biometric secure in e-truncation
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Biometric secure in e-truncation


[attachment=66178]

ABSTRACT
In the present day world, onlineshopping using WAP enabled mobile phone haswidely come into use. Credit cards serve as thecurrency during e-business and e-Shopping.As technology has advanced in thenegative side also hackers and spoofers stealmisuse credit card numbers, even though thenetwork has been made secure.So, in this paper, we have proposed amulti-biometric model
(Integrating voice,fingerprint and facial scanning) that can beembedded in a mobile phone, this making e-transactions more secure. The model is very costeffective as we have tried to use the hardwarealready present in the phone.
This paper uses for image processing or facial recognition andfinger print.



INTRODUCTION

What is Biometrics?

A biometric system is a recognitionsystem, which makes a personal identification bydetermining the authenticity of a specific physiological or behavioral characteristic possessed by the user.

This method of identification is preferred over traditionalmethods involving passwords and PIN numbersfor various reasons:

•The person to be identified is requiredto be physically present at the point of identification.

•Identification based on biometrictechniques eliminates the need toremember a password or carry anidentity.Depending on the context on which a biometricsystem works, it can be either classified as anIdentification system or a verification(authentication)
system. Identification involvesin establishing a person’s identify whereas inverification involves confirming or denying a person’s claiming identity.


What is Biometrics?

A biometric system is a recognitionsystem, which makes a personal identification bydetermining the authenticity of a specific physiological or behavioral characteristic possessed by the user.

This method of identification is preferred over traditionalmethods involving passwords and PIN numbersfor various reasons:

•The person to be identified is requiredto be physically present at the point of identification.

•Identification based on biometrictechniques eliminates the need toremember a password or carry anidentity.Depending on the context on which a biometricsystem works, it can be either classified as anIdentification system or a verification(authentication)
system. Identification involvesin establishing a person’s identify whereas inverification involves confirming or denying a person’s claiming identity.



NEED FOR BIOMETRICS INMOBILE PHONES:

Mobile phones have ceased to beexclusive status of the high class and, today has become an indispensable electronic gadget in thelife of many. The main reason for their higher market penetrations in recent days is their incredible array of functions at an affordablecost. Apart from setting remainders and sending
e-mails, they are also used in
• e-business
• SMS messaging
• Chatting
• Telemedicine and teleconferencingThus, these phones with wideroaming facility prove to be a really versatiledevice.

Nowadays, shopping through the internethas become very popular andsurely, a WAPenabled mobile phone provides thefacilities toconsumers to shop online. Credit cards continueto be an efficient tool for online moneytransactions. But, on the other hand, credit card’snumber can be stolen on its way to its destinationand can be misused by hackers. Thus, e-Businessthrough a mobile phone becomes insecure.
Also, a report in www.download.com stated that much anti-fraud Software, like those provided by ArticSoft and ISC, created a back door entry and were largely involved in dataspoofing. In addition to this, many user andcompanies were prone to the attack of manyviruses and Trojan horses.
With so much of problems faced, theservice provide turned their attention towards biometrics to prevent data spoofing and to provide secure e-TransactionsThough security applications that verify a person's identity based on their physicalattributes, such as fingerprint readers or irisscanners, have been in use for some time, biometric security has only recently started toappear in mobile phones, PDAs and notebook computers where the need for miniaturizationrepresents a technological challenge.
So far biometric data has been used to tie thedevice to a person to prevent it from being usedillegitimately if lost or stolen. But the IST projectSecurePhone is taking a new approach,employing physical attributes to enable the user to digitally sign audio, text or image files, providing proof of their origin and authenticity.
Although existing communications infrastructure based on the GSM, GPRS and UMTS mobilesystems provides a secure means of communication, it lacksany robust method of user identification. Text, audio and image filescan be sent by anyone to anyone with noauthentication and there are no guarantees the person you are talking to in a phoneconversation, if you've never met them before, isreally who they claim to be.
The upshot is that data exchanged over mobiledevices is of limited use for legally bindingtransactions even though mobile devices, giventheir ubiquity, would be a prime candidate for carrying out e-commerce (or m-commerce),managing business processes such as signingcontracts or even in securing the exchange of data in e-healthcare and e-government systems.
A digitally signed and authenticated voicerecording during a telephone conversationwould, for example, give the speaker's wordslegal value.
"The aim is to enable users to exchangeinformation that can't be disputed afterward.That could be a voice recording that isauthenticated to eliminate any doubt about whothe speaker is, what they actually said and provethat it has not been manipulated," Ricci explains."To achieve that it is necessary to digitally signthe data and to ensure that only the legitimateuser can perform the signing."
The system developed by the SecurePhone project partners consists of two main elements.
The first, an authentication module, uses biometric security applications to verify theuser's identity. That in turn gives them access tothe second module which digitally signs the datausing a Public Key Infrastructure (PKI).
The system, which is designed primarily for PDA-phones but could also be used in newgeneration smart phones and Wi-Fi-enabledPDAs, offers three methods of biometricidentification. One employs the digital camerasthat have become commonplace in mobiledevices along with a face recognition applicationto identify the user based on their facial features.
Another uses voice recognition software – alsodetecting any asynchrony between speech and lipmovements - and the third verifies thehandwritten signature of the user on the device'stouch screen. The three methods are used incombination to enhance the overall levels of security and reliability, and most importantlythey require no hardware additions to mobiledevices.


VOICE RECOGNITION:

The speaker-specific characteristics of speechare due to difference in physiological and behavioral aspects of the speech productionsystem in humans. The main physiologicalaspect of the human speech production system isthe vocal tract shape. The vocal tract modifiesthe spectral content of an acoustic wave as it passes through it, thereby producing speech.
Therefore, it is common inspeaker verificationsystems to make use of features derived onlyfrom the vocal tract.

The microphone in the mobile phonecaptures the speech. Then, using
cepstralanalysis, an utterance may be represented as asequence of feature vectors. Utterances, spoken by the same person but at difference times, resultin similar yet a different sequence of featuresvectors. So, the irrespective of the mood of theconsumer, his transaction is accepted or rejected.The following algorithm may be used in voiceverification.




FINGERPRINT ACQUISITION:

Finger based scanning is oneof the oldest methods used for verification.Fingerprints, unique and immunable for all aremade of series of ridges and furrows on thesurface of the finger. These ridges and furrowsdetermine the uniqueness of the fingerprints.Apart from these, minute points (i.e. local ridgecharacteristics that occur at either a ridge bifurcation or a ridge ending also play role infool-proofing this biometric technique.
To reduce the search time andthe computational complexity, fingerprintclassification is undertaken and thus fingerprintsare classified as whorl, right loop, left loop, arch,and arch. Recently researchers and scientistsachieved a great feat by improving thefingerprint classification to 94%.
In today’s world, fingerprintmatching techniques can be placed into twocategories: minutiae-based and correlation based.In minutiae based technique, the minutiae pointsare found and their relative placement aremapped on the finger whereas in correlation based technique, the fingerprint acquired fromthe person is checked for certain points previously stored in the database. If bothmatches, the person is given authentication, elsehe is denied permission.



CONCLUSION:

Thus, this mobile multi-biometricscan be embedded in mobile phone. Phone is costeffective since no special hardware in requiredand is highly secured. Thus, this mobile phone becomes a reality will provide more e-Businessand e-Transactions.