Biometrics in Secure E-Transaction: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Biometrics in Secure E-Transaction: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Biometrics in Secure E-Transaction: International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)
Web Site: www.ijettcs.org Email: [email protected], [email protected] Volume 2, Issue 2, March April 2013 ISSN 2278-6856
Post Graduate Student, Dept of Computer Science, Arts, Commerce & Science College, Amravati Asstt. Professor, Dept of Computer Science, Arts Commerce & Science College, Amravati
2
Telemedicine and teleconferencing Thus, these phones with wide roaming facility prove to be a really versatile device. Biometrics in Secure ETransactions clearly explains the indispensable role of biometrics for secure-transactions. This paper discusses that as technology has advanced there has been a negative side also hackers as spoofers steal / misuse credit card numbers, even though the network has been made secure. This paper, proposes a multi-biometric model (integrating voice, fingerprint and facial scanning) that can be embedded in a mobile phone this making etransactions more secure.
2. BIOMETRICS
The term biometrics is derived from the Greek words bio (life) and metrics (to measure). Automated biometric systems have only become available over the last few decades, due to significant advances in the field of computer processing. Many of these new automated techniques, however, are based on ideas that were originally conceived hundreds, even thousands of years ago. Biometrics(or biometric authentication ) refers to the identification of humans by their characteristics or traits. Biometrics is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance. A biometric system is a recognition system, which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons: The person to be identified is required to be physically present at the point of identification. Identification based on biometric techniques eliminates the need to remember a password or carry an identity. Depending on the context on which a biometric system works, it can be Either classified as an identification system or a verification (authentication) system identification involves in establishing a persons identify whereas in verification involves confirming or denying a persons claiming identity. More traditional means of access control include token-based identification systems , such as a driver's license or passport, and knowledge-based identification systems, such as a password or personal identification Page 243
Keywords-Biometrics, Multibiometrics, Face Recognition, Voice Recognition, Iris Recognition, Finger Print Identification
1.INTRODUCTION
In an era of Information Technology, mobile phones are more and more widely used Worldwide, not only for basic communications, but also as a tool to deal with personal Affairs and process information acquired anywhere at any time. It is reported that there are more than 4 billion cell phone users over the world and this number still continues to grow as predicted that by 2015 more than 86% of the world population will own at least one cell phone. Mobile phones have ceased to be exclusive status of the high class and, today has become an indispensable electronic gadget in the life of many. The main reason for their higher market penetrations in recent days is their incredible array of functions at an affordable cost. Apart from setting remainders and sending e-mails, they are also used in e-business SMS messaging Chatting Volume 2, Issue 2 March April 2013
Figure 1. Biometric Systems Classes[1] It is unlikely that several unimodal systems will suffer from identical limitations. Multibiometric systems can integrate these unimodal systems sequentially, simultaneously, a combination thereof, or in series, which refer to sequential, parallel, hierarchical and serial integration modes, respectively Multi-biometric obtain sets of information from the same marker (i.e., multiple images of an iris, or scans of the same finger) or information from different biometrics (requiring fingerprint scans and, using voice recognition, a spoken pass-code) cannot be performed. Biometric security systems are using: Physical human identifiers like fingerprint, face, iris, retina, DNA, hand geometry and vein geometry Behavioral identifiers like speech, signature, and keystroke timing Chemical identifiers like odor and body heat. Biometric systems are used for two purposes. One is to verify that the user is genuine by comparing the acquired biometric trait with the one stored for that user. The other purpose the biometrics are used is to identify a user in which case the acquired biometric trait is compared with a collection of the same traits from multiple users.[3]
3. MULTIBIOMETRICS
A multi-biometrics system is obtained by the integration of multiple individual biometrics models. A numbers of models integrating hand geometry, keystroke dynamics, Volume 2, Issue 2 March April 2013
Figure 4.future mobile phone [1] example of recent advances which successfully implemented biometrics on mobile phones
7. FACE RECOGNITION
Facial recognition is considered to be one of the most tedious among all scans. Further, difficulty in acquisition of face and cost of equipments make it more complex. However, some WAP enabled phones like CX 400K and LG-SD1000 manufactured by LG electronics, have built in camera that can acquire images and can be transmitted over internet. This it is sent to the credit card company to verify the face received matches with the face in their database. If it matches, the goods are sent, else the order is rejected. We in our IMAGE PROCCESSING LAB took two faces with small differences (you see a small dot in the forehead of second face) and programmed MATLAB to find the difference between the two. The output is place below:[1]
Figure 2. Feasible scenarios of biometrics on mobile phone[1] Incorporated with advanced sensing platforms which could detect physiological and behavioral signals of various kinds, many types of biometric methods could be implemented on cell phones. This offers a wide range of possible applications such as personal privacy protection, mobile bank transaction service security, and telemedicine monitoring. The use of sensor data collected by mobile phones for biometric identification and authentication is an emerging frontier and has been increasingly explored in the recent decade. A typical architecture of this technology can be seen in Fig. 4.
Figure 3 Mobile biometric authentication system (Xie & Liu, 2010) [5] Volume 2, Issue 2 March April 2013 Page 245
Figure.5. Snapshots of fingerprint security - Pro (retrieved from company release news )[6] We in our IMAGE PROCCESSING LAB took two faces with small differences (you see a small dot in the forehead of second face) and programmed MATLAB to find the difference between the two. The output is place below:[1]
Figure 6
F Fffffff
Figure 7
Figure 9. Voice biometric authentication for e-commerce transactions via mobile phone. [7]
9. IRIS RECOGNITION
Figure 8. Difference between two image can be found by MATLAB [1] The above simulations shows that even two persons having almost similar face with minute difference can also be differentiated. Now, there arises a problem. A man, without bread, make as a transaction successfully .A week later he makes another transaction with some hair grown on his chin and go for acquiring images of any part of the face like forehead, nose, ear etc. Hence, this type of facial scanning system can be used as a part of the multi-biometric system we have presented above. With the integration of digital cameras that could acquire images at increasingly high resolution and the increase of cell phone computing power, mobile phones have evolved into networked personal image capture devices, which can perform image processing tasks on the phone itself and use the result as an additional means of user input and a source of context data (Rohs, 2005). This image acquisition and processing capability of mobile phones could be ideally utilized for mobile iris biometric. Recently, iris recognition technology has been utilized for the security of mobile phones. As a biometric of high reliability and accuracy, iris recognition provides high level of security for cellular phone based services for example bank transaction service via mobile phone. One major challenge of the implementation of iris biometric on mobile phone is the iris image quality, since bad image quality will affect the entire iris recognition process. Previously, the high quality of iris images was Page 246
8. VOICE RECOGNITION
The speaker-specific characteristics of speech are due to difference in physiological and behavioral aspects of the speech production system in humans. The main Volume 2, Issue 2 March April 2013
Figure11. An outline of future development in biometrics on mobile phone[1] Numerous types of biometrics hold the potentials of being implemented onmobile phones. According to the different types of signals needed to be collected for feature extraction, applicable biometric methods can be classified into the imaging type, mechanical type and electrical type. The imaging type includes, but is not limited to the recognition of face, teeth and palm print in addition to fingerprint and iris, utilizing images captured by the camera embedded in the mobile phone. The mechanical type involves voice, heart sound using microphones and blood pressure by specific and miniaturized sensors attached to the mobile phone. Not only ECG can be used in mobile biometrics, the electroencephalography (EEG) identification also has applicability in this new area. The mobile phone based biometrics is also developing towards a multimodal functionality, which combines several biometric recognition methods to provide more reliable and flexible identification and authentication. Promising applications include personal privacy security, ecommerce, mobile bank transactions, e-health technology, etc. A grand outlook of future development in mobile phone based biometrics is outlined in the diagram below:
12. CONCLUSION
In this Paper, we study how the mobile phone can be used in biometrics. This versatile technique has so far proven to be a unique and promising participant in the areas of biometrics. Not only can mobile phone deliver successful solutions in the traditional biometric arenas of human identification and authentication, it has also been instrumental in securing the resource-constrained body sensor networks for health care applications in an efficient and practical manner. At the same time, there remain many challenges to be addressed and a lot more new technologies to be explored and developed. Before successful consumer-ready products are available, a great deal of research and development is still needed to improve all aspects of the mobile phone based biometric system. With a modicum of expectation, it is hoped that this chapter will play a part in further stimulating the research momentum on the mobile phone based biometrics. The paper concludes that the mobile multibiometrics can be embedded in mobile phone. Phone is cost effective since no special hardware is required and is Page 247
Page 248