Biometrics in SECURE e-transactions
A biometric system is a recognition system, which makes a personal identification by determining the authenticity of a specific physiological or behavioral characteristic possessed by the user. This method of identification is preferred over traditional methods involving passwords and PIN numbers for various reasons:
The person to be identified is required to be physically present at the point of identification.
Identification based on biometric techniques eliminates the need to remember a password or carry an identity.
Depending on the context on which a biometric system works, it can be
Either classified as an identification system or a verification (authentication) system identification involves in establishing a person's identify whereas in verification involves confirming or denying a person's claiming identity
NEED FOR BIOMETRICS IN MOBILE PHONES:
Nowadays, shopping through the internet has become very popular and surely, a WAP enabled mobile phone provides the facilities to consumers to shop online. Credit cards continue to be an efficient tool for online money transactions. But, on the other hand, credit card's number can be stolen on its way to its destination and can be misused by hackers. Thus, e-Business through a mobile phone becomes insecure.
Also anti-fraud Software, like those provided by ArticSoft and ISC, created a back door entry and were largely involved in data spoofing. In addition to this, many user and companies were prone to the attack of many viruses and Trojan horses.
With so much of problems faced, the service provide turned their attention towards biometrics to prevent data spoofing and to provide secure e-Transactions
Finger based scanning is one of the oldest methods used for verification. Fingerprints, unique and immunable for all are made of series of ridges and furrows on the surface of the finger. These ridges and furrows determine the uniqueness of the fingerprints. Apart from these, minute points (i.e. local ridge characteristics that occur at either a ridge bifurcation or a ridge ending also play role in fool-proofing this biometric technique.
To reduce the search time and the computational complexity, fingerprint classification is undertaken and thus fingerprints are classified as whorl, right loop, left loop, arch, and arch. Recently researchers and scientists achieved a great feat by improving the fingerprint classification to 94%
You may also like this : 4G Broadband seminar report, Finger Tracking In Real Time Human Computer Interaction, Eye Movement-Based Human Computer Interaction Techniques, Ethical Hacking, E-Cash Payment System PPT, Cyborgs, Brain Fingerprinting Biometrics in SECURE e-transaction, X- Internet, Surface Computer, Secure ATM by Image Processing, Mobile Ad-Hoc Networks Extensions to Zone Routing Protocol, Wibree PDF , Telepresence, System in Package, Smart Memories, Slammer Worm, Sensitive Skin, Pixie Dust, Linux Kernel 2.6, Lamp Technology, Humanoid Robot, HTAM, Haptic Technology, Elastic Cluster, Digital Scent Technology, Distributed Interactive Virtual Environment, Dynamic TCP Connection Elapsing, CAPTCHA, Virtual Retinal Display, Wireless LAN Security, Chameleon Chip, Haptics, Intelligent RAM, iSCSI, Linux Kernel 2.6, 3D Searching, Biological Computers, Rain Technology, Real Time Application Interface, GPS, HALO , BitTorrent, Compositional Adaptation, Rover Technology,Computer Seminars