Technical Seminar Report
Technical Seminar Report
A Seminar Report
On
Submitted By
ANUSHREE H R
[1DT20CS017]
CERTIFICATE
Certified that the Technical Seminar Entitled “Biometric in Secure E-Transaction” carried out by
ANUSHREE H R, bearing 1DT20CS017, bonafide student of Dayananda Sagar Academy of
Technology and Management,in partial fulfillment for the award of the BACHELOR OF
ENGINEERING in Computer Science and Engineering from Visvesvaraya Technological
University, Belagavi during theyear2022-2023.Thereporthasbeenapproved as it satisfies the academic
requirements in respect of the Technical Seminar work prescribed for the said degree.
The satisfaction and the euphoria that accompany the successful completion of any task
wouldbeincompletewithoutthementionofthepeoplewhomadeitpossible.Theconstantguidance
ofthesepersonsandencouragementprovided,crownedoureffortswithsuccessandglory.Although it is
not possible to thank all the members who helped for the completion of the seminar work
individually, I take this opportunity to express my gratitude to one andall.
I wish to place on record, my grateful thanks to Dr. Kavitha C, Head, Department of CSE,
Dayananda Sagar Academy of Technology and Management, for the constant encouragement
provided to me.
I am indebted with a deep sense of gratitude for the constant inspiration, encouragement, timely
guidance and valid suggestion given to me by my guide Dr. Bhagyashri R Hanji, Proffesor,
Department of CSE, Dayananda Sagar Academy of Technology and Management.
I am thankful to all the staff members of the department for providing relevant information and
helped in different capacities in carrying out this academic work.
Last, but not least, I owe my debts to my parents, friends and also those who directly or indirectly
have helped me to make the seminar a success.
Information security is concerned with the assurance of confidentially, integrity and availability of
information in all forms. This is the ancient Greek word: bios = “life” and metron = “measure.” In the
present day world, online shopping using WAP enabled mobile phone has widely come into use. Credit
cards serve as the currency during e-business and e-Shopping. As the Hacking or Spoofing or the Misuse
of the credit card is continuously increasing even you are using a secure network. Also, some Spam
software is sent to your system or device through the internet that helps spammers to get the desires
relevant information about your credit card and financial data. To solve these problems or get out of these
insecurities the Bio-metric System that provides the secure E-transaction by improving the prevention of
data spoofing. So in this paper, we have proposed a multi-biometric model (integrating voice, fingerprint
and facial scanning) that can be embedded in a mobile phone, this making e-transactions more secure.
In the digital age, secure e-transactions are vital for ensuring the integrity and confidentiality of sensitive
financial and personal information. Traditional authentication methods such as passwords and PINs are
susceptible to various security threats including phishing attacks and brute-force hacking. Biometric
authentication has emerged as a promising solution to bolster the security of e-transactions by utilizing
unique physiological or behavioural characteristics of individuals.
This paper presents an overview of biometric authentication methods and their application in secure e-
transactions. We explore various biometric modalities including fingerprint recognition, iris scanning,
facial recognition, and voice authentication, highlighting their strengths and limitations in the context of
e-commerce and online banking. Additionally, we discuss the importance of multi-factor authentication
incorporating biometrics alongside other authentication factors for enhanced security.
TABLE OF CONTENTS
Sl. Page
Contents
No No.
1. Acknowledgement 3
2. Abstract 4
3. Table of Contents 5
4. Introduction 6
5. System Architecture 7
Conclusion 12
References 13
Biometric in secure e-transaction
CHAPTER 1
INTRODUCTION
This paper provides a broad overview of the subject of biometrics, their usage, how performance
is measured, the typical construction of systems and practical implementation issues. A basic
understanding of computer networks is requisite in order to understand the principles of network
security. A network has been defined as any set of interlinking lines resembling a net, a network
of roads an interconnected system, a network of alliances. This definition suits our purpose well.
A computer network is simply a system of inter connected computers.
CHAPTER 2
SYSTEM ARCHITECTURE
CHAPTER 3
8. Logging and Auditing: All authentication attempts and transaction activities should be
logged for auditing purposes. This helps in tracking any suspicious activities and maintaining
a record of user interactions with the system.
9. Continuous Improvement: Continuous monitoring and updating of the biometric system are
essential to adapt to emerging threats and technological advancements. Regular security
assessments and updates should be performed to ensure the system's integrity and
effectiveness.
By implementing biometrics in secure e-transactions, organizations can significantly enhance
authentication security, reduce the risk of fraud, and improve the overall user experience by
offering a more convenient and reliable authentication method.
CHAPTER 4
REFLECTION NOTES ON RESULTS
The results of biometric authentication systems are generally presented in terms of their
effectiveness in correctly identifying or verifying individuals. These results are crucial for
evaluating the performance and reliability of biometric systems across various applications. The
key metrics used to measure the results include:
1. True Positive Rate (TPR) or Sensitivity
This metric indicates the proportion of genuine attempts that are correctly identified or verified by
the system. A high TPR means that the system is effectively recognizing legitimate users.
2. True Negative Rate (TNR) or Specificity
It measures the proportion of impostor attempts that the system correctly identifies as
unauthorized. A high TNR indicates effective security against unauthorized access.
3. False Accept Rate (FAR) or False Match Rate (FMR)
FAR refers to the percentage of times the system incorrectly identifies or verifies an impostor as a
legitimate user. It is crucial for security purposes, as a lower FAR means the system is less likely
to grant access to unauthorized users.
4. False Reject Rate (FRR) or False Non-Match Rate (FNMR)
FRR measures the frequency at which the system incorrectly rejects an access attempt by a
legitimate user. For user convenience and efficiency, a lower FRR is preferred, as it means
legitimate users are granted access more consistently.
5. Equal Error Rate (EER)
EER is the point at which the rates of false accepts and false rejects are equal. It is often used as a
summary measure of the system's accuracy. A lower EER indicates a better balance between
security and usability.
6. Decision Threshold
The system's performance can often be adjusted by changing the decision threshold, which affects
the trade-off between FAR and FRR. This adjustment allows system administrators to tailor the
biometric system’s performance to the specific security and usability requirements of an
application.
7. Throughput Rate
This metric indicates the speed at which the system processes authentication attempts. A
higher throughput rate means the system can handle more authentication attempts in a given time
frame, which is important for user experience in high-traffic scenarios.
Practical Implications
The results from these metrics provide a comprehensive overview of a biometric system's
effectiveness, but they need to be considered in the context of the specific application and its
requirements. For example:
High-security environments may prioritize a low FAR, even at the cost of a higher FRR.
Consumer applications, where user convenience is paramount, might accept a higher FAR to
CONCLUSION
Thus, this mobile multi-biometrics can be embedded in the mobile phone. The phone is cost
effective since no special hardware in required and is highly secured. Thus, this mobile phone
becomes a reality will provide more e-Business and transactions.
Implementation of biometric data can work optimally with the help of computer vision and
machine learning, the technology allows users to use the features provided in the library, data
face recognition can be used for personal data security or multi-detection, additional security
features can be used with the eye or Irish recognition , the use of this technology is strongly
influenced by camera input and lighting process, the weakness of the current face detection
technology viola jones algorithm cannot recognize the face area with a tilted position or back
to the camera then to overcome this weakness added body detection method so that the
process of securing and authentication of biometric data can be done optimally if one of the
features does not work.
REFERENCES
1) http://ijettcs.org/Volume2Issue2/IJETTCS-2013- 04-25-181.pdf
2) http://www.techrepublic.com/resourcelibrary/whitepapers/biometrics-in-secure-etransaction/
3) https://www.scribd.com/doc/21522715/BioMetrics-in-Secure-E-transaction
4) https://volumeoftech.wordpress.com/2013/06/07/se cure-e-transaction-through-bio-metric-system/
5) http://1000projects.org/biometric-in-secure-etransaction-computer-science-seminar-report.html
6) http://www.seminarsonly.com/computer%20scienc e/BIOMETRICS-in-SECURE-E-transactions.php
7) http://www.slideshare.net/Pathik504/slideshow-onbiometrics
8) https://www.youtube.com/watch?v=cisw-g7A_Gk
9) http://www.ijarcsms.com/docs/paper/volume3/issu e4/V3I4-0131.pdf
[1]
[2]
[3]
[4]