SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 1 ǁ January. 2018 ǁ PP 05-10
| Volume 2 | Issue 1 | www.ijrtem.com | 5 |
Improvement of a PIN-Entry Method Resilient to Shoulder-
Surfing and Recording Attacks in ATM
S. Preema ,
Department of Computer Science, VLB Janakiammal College of Arts & Science, Coimbatore, Tamilnadu
ABSTRACT : The scope of this work extends to system components (for example service providers, networks,
servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN
Guidelines in this document encompass PIN security within any one system or sub-system and between systems.
This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for
Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that
reduces the computation time by exploiting the correlations of palette entries between the current and previous
iterations.
KEYWORDS: Palettes , Color quantization, LBG algorithm, finite-state algorithm,
I. INTRODUCTION
This work is designed to provide PIN security guidelines for all payment accounts that use a PIN, including those
associated with magnetic stripe cards, chip cards, ‘hybrid’ cards that incorporate both a magnetic stripe and a chip
or any other cardholder payment device form factor The scope of this work extends to system components (for
example service providers, networks, servers, hosts, applications, processes and personnel) which are used to
exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system
or sub-system and between systems. These guidelines are targeted at PIN protection during PIN processing in the
issuer security domain. PIN processing of interchange transactions is covered by the PCI PIN Security
Requirements. A PIN (Personal Identification Number) is a four to twelve digit number known by a cardholder
and used to authenticate the cardholder to the card-issuing bank (or to the cardholder’s ICC). The transaction PIN
is the PIN entered by the cardholder during a payment transaction. The online PIN is the transaction PIN used to
verify the cardholder online. The offline PIN is the transaction PIN used with an ICC to verify the cardholder
offline. The reference PIN is a stored or derived PIN value used by the issuer to verify the transaction PIN.
If stored in an ICC it may or may not be equal to the online PIN. The PIN management guidelines in this document
refer to the following processes. The primary objective of this research paper is to provide a complete knowledge
of ATM and a solution to its pin entry process. To access the funds which are kept in the bank at any time is not
an easy task but today it is not at all difficult. A person just has to tell his bank that he wants an ATM card. The
bank issues him an ATM card which is pass coded and could be used by him alone. ATM card is called by different
names like bank card, MAC(Money access card), client card, key card or cash card, etc. In most cases even debit
and credit card could be used. The ATM card helps the customer to be identified by a plastic ATM card with a
magnetic stripe or a plastic smartcard with a chip. The security is provided by the customer entering a personal
identification number (PIN). Now the person who needs funds when he is taking his family out of shopping or
when he requires funds for an outing it is easily done. If someone falls very seriously ill the person can remove
the funds in the middle of the night too. The ATM machine helps the customer to make his / her life much easier.
It does most The ATM card is slowly replacing cheque, the personal attendance of various customers, has
increased banking hours and reduced the holidays. They do not require any paper based verification. Due to
heavier computing demands and the falling price of personal computer–like architectures, ATMs have moved
away from custom hardware architectures using microcontrollers or application-specific integrated circuits and
have adopted the hardware architecture of a personal computer, such as USB connections for peripherals, Ethernet
and IP communications, and use personal computer operating systems.
II. NATIONAL / INTERNATIONAL STATUS
Today, the vast majority of ATMs worldwide use a Microsoft Windows operating system, primarily Windows
XP Professional or Windows XP Embedded. A small number of deployments may still be running older versions
of the Windows OS, such as Windows NT, Windows CE, or Windows 2000. There is a computer
industry security view that general public desktop operating systems(Dos) have greater risks as operating systems
for cash dispensing machines than other types of operating systems like (secure) real-time operating systems
(RTOS). RISKS Digest has many articles about ATM operating system vulnerabilities.]
With the onset of
Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 6 |
Windows operating systems and XFS on ATMs, the software applications have the ability to become more
intelligent. This has created a new breed of ATM applications commonly referred to as programmable
applications. These types of applications allows for an entirely new host of applications in which the ATM
terminal can do more than only communicate with the ATM switch. It is now empowered to connect to other
content servers and video banking systems. Notable ATM software that operates on XFS platforms include Triton
PRISM, Diebold Agilis EmPower, NCR APTRA Edge, Absolute Systems AbsoluteINTERACT, KAL Kalignite
Software Platform, Phoenix Interactive VISTAatm, Wincor Nixdorf ProTopas, Euronet EFTS and Intertech inter-
ATM. With the move of ATMs to industry-standard computing environments, concern has risen about the
integrity of the ATM's software stack.Security Experts says that Automatic Teller Machine (ATM) in future will
have biometric authentication techniques to verify identities of customer during transaction. In South America,
there are companies that have introduced fingerprint technology as a embedded part of ATM systems, where
citizens have already started using fingerprint in place of PIN or Password for general identification with their ID
cards. Nowadays, there are devices to perform biometric identification and authentication of following:
fingerprint, hand, retina, iris, face, and voice. India is still lacking in implementing biometric with smart card as a
safety approach. Fingerprint approach for identification given by Oko S. and Oruh J. (2012) not proved efficient
as when citizen will move to ATM system, fingers may become dirty from natural environment and will not be
able to access his account with ATM system, since fingerprints will not match from the one that was traced during
identification. Secondly, a iris and retina approach proposed by Bhosale S. and Sawant B.(2012) as a identification
method, but citizens might not want a laser beamed into their eyes for retina scan at every time he wants to access
account through ATM. Thus, iris and retina as identification authentication proved inefficient. Vibration detector
sensor were also proposed as a security system for ATM machines by Ajaykumar M. And Bharath Kumar
N.(2013). Voice was also proposed for security in ATM systems as a biometric with smart card. The cons were
there at the same time as two citizens can have same voice and one can easily hack and can fraud with another’s
account.
Objectives : Our proposed scheme is based on an elegant adaptive black-and-white to coloring of the 10-digit
keypad in the standard layout. Proposed method requires many user inputs, so that human guessing pin Entry
becomes a difficult process. The new scheme has the remarkable property of resisting camera-based recording
attacks over an unlimited number of authentication sessions without leaking any of the PIN digits. In the earlier
method user enters a pre-arranged textual, numerical password directly through the user interface of the
authentication system. So, the password submission process is prone to direct observational attacks. Entry of a
password can easily be observed by nearby adversaries in crowded places, aided by vision enhancing and/or
recording devices. Due to its short length and the simplicity of the ten-digit keypad guess of password is easy.
The main features include:
1. Pin security is very high.
2. Tictoc PIN holds two measures that can prevent information leakage.
3. More Efficient so that we can use any Type of pin Entry application.
III. METHODOLOGY
This project, proposes virtualizing Harvard architecture on top of the existing memory architecture of modern
computers, including those without non-executable memory page support, so as to prevent the injection of
malicious code entirely. Harvard architecture is simply one wherein code and data are stored separately. Data
cannot be loaded as code and vice-versa. In essence, we create an environment wherein any code injected by an
attacker into a process’ address space cannot even be addressed by the processor for execution. In this way, we
are attacking the code injection problem at its root by regarding the injected malicious code as data and making it
unaddressable to the processor during an instruction fetch. Split memory architecture produces an address space
where data cannot be fetched by the processor for execution. For an attacker attempting a code injection, this will
prevent him from fetching and executing any injected code. It includes the following process:
PIN LAYOUT DESIGN PROCESS: This process designs 10 digit keypad with random RGB color SCHEME
using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite-
state LBG (CFSLBG) algorithm that reduces the computation time by exploiting the correlations of palette entries
between the current and previous iterations. Instead of searching the whole color palette, the
CFSLBG algorithm searches only a small number of colors that are very close to the training vector. Thus, the
computation time for color quantization is reduced. The proposed approach generates RGB palettes efficiently.
This work describes the implementation of this algorithm and simulation results. Video monitors typically use the
three primary color components, red, green, and blue, to specify the color of each pixel in a color image. Each
Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 7 |
primary component usually provides 8 bits for specifying the color of each pixel in a full-color digitized image.
Color quantization algorithms can be grouped into splitting algorithms and clustering-based algorithms.
Clustering-based algorithms extract quantized colors by applying various clustering algorithms. In this paper, we
propose an effortless and straightforward clustering algorithm, which is fast and excellent for generating colour
palette. Vector quantization (VQ) has been shown to be an efficient method of image coding. The input vectors
are individually quantized to the closest codeword in the codebook. The codebook is generated by using some
clustering algorithms from a set of digits. The iterative clustering algorithm proposed by Linde, Buzo, and Gray
(LBG) is usually used in VQ . A number of methods for generating color palettes using the VQ codebook design
techniques were proposed. In view of color image coding, each pixel can be considered as a 3-dimension vector
in the RGB color space. These vectors are the input vectors of the color VQ (CVQ) scheme. The LBG algorithm
is most popular method used to select a color palette with a limited number of colors from a full-color digitized
image. In each iteration of the LBG algorithm, it searches the whole color palette in order to find the corresponding
palette entry for each training vector. That is, the LBG algorithm requires a large amount of computation for color
quantization. This paper proposes a novel color finite-state LBG (CFSLBG) algorithm that reduces the
computation time required to select palettes . Instead of searching the whole color palette, the proposed algorithm
searches only a small part of the palette to find the corresponding palette entry for each training vector. In the
CFSLBG algorithm, the number of palette entries that need to be searched for a training vector in each iteration
is always much smaller than the size of the whole palette. For this reason, the duration of each iteration is greatly
reduced.
COLOR FSLBG ALGORITHM : Although the VQ scheme yields acceptable performance for image coding,
the finite-state vector quantization (FSVQ) schemes [16-21] improve performance for an ordinary VQ. An FSVQ
can be viewed as a finite collection of ordinary VQ’s, each with its own codebook associated with a state, which
is called the state codebook. The encoding state of the current input vector is decided by a state function F(x).
This coding state may be described by a state variable s ∈ S = {si : i = 1, …, M}, where M is the total number of
states. The FSVQ is defined as a mapping from Rk × S to a subset of a master codebook MC = {xi : i = 1, …, N}.
For each state si, the FSVQ encoder selects Nf codewords by means of the state function from the master codebook
MC as the state codebook SCs. For each input vector x, the encoder decides the current state s and then searches
the state codebook SCs to find its corresponding codeword. The codebook size of the state codebook is much
smaller than that of the master codebook. Hence, the searching time can be reduced. A fast finite-state algorithm
that reduces the computation time for vector quantizer design by exploiting FSVQ techniques shows that the fast
finite-state algorithm can reserve the quality of encoding. For each state s, the state palette SPs is the subset of
whole palette Pi, and the size of SPs is Nf. The Nf codewords in SPs are the closest codewords to s in the whole
palette Pi−1. Thus, the first iteration of the CFSLBG algorithm is the same as that of the ordinary LBG algorithm,
in which the full search algorithm is used to select a codeword for each training vector. At the following iteration,
i.e. i ≥ 2, the information in the previous iteration is used to determine the states of the training vectors. The
CFSLBG algorithm is described in the following steps.
Step 1: Design an initial RGB color palette P0 and set DAVG0 ← ∞.
Step 2: For each training vector x, find the closest palette entry 0 xˆ by searching the whole color palette P0.
Compute the average distortion DAVG1 .
Step 3: For each palette entry 0 xˆ in P0, generate a new entry 1 xˆ ← centroid(CS( ˆ )) 0 x and add 1 xˆ into P1.
Set i ← 2.
Step 4: Set the state space S = Pi−1.
Step 5: For each state s in S, find the set of the Nf closest codewords in the whole color palette Pi−1 and define
this set as the state palette SPs. For each training vector x, use the previous codeword -1 ˆi x as the state
s. Find the closest palette entry ˆi x by searching the state palette SPs.
Step 6: Compute the average distortion DAVGi . If | DAVGi-1 − DAVGi | / DAVGi is smaller than ε, then stop.
Step 7: For each entry -1 ˆi x in Pi−1, generate a new entry ˆi x ← centroid(CS( ˆ )) i-1 x and add ˆi x into Pi. Set
i ← i + 1 and go to step 4.
Note that the state palette size Nf is much smaller than the whole color palette size N. The Nf codewords for each
state are found by an insertion sorting algorithm applied to the entire palette.
ENROLLMENT PROCESS :In Enrollment process user/admin fills their personal details like name, address,
phone no, username and submit the user registration form. Automatically 4 digit pin will be generated and send
to the corresponding user mail id. And user can change the pin also.
Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 8 |
SPLIT AND MERGE SCHEME : This process collects all the colors from GUI after user enters it in the system.
The colors are spilt in to four groups and each and every groups consist of three color combination of colors
.every group have one user entered pin digit.
PIN IDENTIFICATION AND AUTHENTICATION PROCESS : Finally this process identifies four digit pin.
It compares each group with another group and apply random color match scheme for identifying user pin. The
color combinations are compared with each and every group and this pin is finally compared with the user’s
original pin.
TRANSACTION : This process includes the user account details entry process along with the bank ATM
transactions. The transaction such as deposit and withdraw will be performed after the successful login. This
feature will allow a customer to transfer money from any of their accounts to another account, and also this feature
will allow customers to check money transfer information report and balance details.
Modules
User Table
Report
User
Login
2
Pin
Authenticatio
n
. 3
Admin
3.1 pin
color
verification
Generate
pin to
user .
4
color Table
Registration
(ADMIN)
1
Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 9 |
IV. CONCLUSION
Every application has its own merits and demerits. The project has covered almost all the requirements. Further
requirements and improvements can easily be done since the coding will be mainly structured or modular in
nature. Changing the existing modules or adding new modules can append improvements. Further enhancements
can be made to the application, so that the system will be immediately blocked while attacks take place. In future
all transaction will be processed in a secure manner and can find the intruders activity by getting all relevant
details. In future it will capture all actions of the intruder by using screen capturing mechanism. It is concluded
that the application will work well and satisfy the needs. It also acts as the sharing of files to the valuable
resources.
REFERENCES
1. Y. W. Lim and S. U. Lee, “On the color image segmentation algorithm based on the thresholding and
the fuzzy C-means techniques,” Pattern Recognition, Vol. 23, 1990, pp. 935-952.
2. Z. Xiang, “Color image quantization by minimizing the maximum intercluster distance,” ACM
Transactions on Graphics, Vol. 16, 1997, pp. 260-276.
3. I. S. Hsieh and K. C. Fan, “An adaptive clustering algorithm for color quantization,” Pattern
Recognition Letters, Vol. 21, 2000, pp. 337-346.
4. E. Rendon, L. Salgado, J. M. Menendez, and N. Garcia, “Adaptive palette determination for color
images based on Kohonen networks,” in Proceedings of the International Conference on Image
Processing (ICIP), Vol. 1, 1997, pp. 830-833.
5. J. S. Kirk, D. J. Chang, and J. M. Zurada, “A self-organizing map with dynamic architecture for
efficient color quantization,” in Proceedings of the International Joint Conference on Neural
Networks (IJCNN), Vol. 3, 2001, pp. 2128-2132.
6. J. Foster, R. M. Gray, and M. O. Dunham, “Finite-state vector quantization of waveform coding,”
IEEE Transaction on Information Theory, Vol. IT-31, 1985, pp. 348- 359.
7. W. T. Chen, R. F. Chang, and J. S. Wang, “Image sequence coding using finite-state vector
quantization,” IEEE Transaction on Circuits Systems for Video Technology, Vol. 2, 1992, pp. 15-24.
Improvement of a PIN-Entry Method Resilient…
| Volume 2 | Issue 1 | www.ijrtem.com | 10 |
8. M. O. Dunham and R. M. Gray, “An algorithm for the design of label-transition finite state vector
quantizers,” IEEE Transactions on Communications, Vol. COM-33, 1985.
9. R. Aravind and A. Gersho, “Low-rate image coding with finite-state vector quantization,” in
Proceedings of the International Conference on Acoustics, Speech, and Signal
Processing (ICASSP), 1986, pp. 137-140.

Weitere ähnliche Inhalte

Was ist angesagt?

IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET Journal
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Cardjournal ijrtem
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET Journal
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged peopleIRJET Journal
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyRima Hajou
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card SecurityPrav_Kalyan
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET Journal
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET Journal
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET Journal
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerceAmira Serag
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation ppriteshs
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elcMohitKataria15
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET Journal
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemSensePost
 

Was ist angesagt? (20)

IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)IRJET- A Survey on Cardless Automated Teller Machine(ATM)
IRJET- A Survey on Cardless Automated Teller Machine(ATM)
 
Analysis on need of Smart Card
Analysis on need of Smart CardAnalysis on need of Smart Card
Analysis on need of Smart Card
 
Card reader
Card readerCard reader
Card reader
 
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
IRJET - Secure Electronic Transaction using Strengthened Graphical OTP Authen...
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
000
000000
000
 
ATM for visually challenged people
ATM for visually challenged peopleATM for visually challenged people
ATM for visually challenged people
 
Document Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - CopyDocument Verification through C-One E-Id - Copy
Document Verification through C-One E-Id - Copy
 
FINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEMFINGERPRINT BASED ATM SYSTEM
FINGERPRINT BASED ATM SYSTEM
 
Smart Card Security
Smart Card SecuritySmart Card Security
Smart Card Security
 
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
IRJET- A Noval and Efficient Revolving Flywheel Pin Entry Method Resilient to...
 
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
IRJET- Implementation of Secured ATM by Wireless Password Transfer and Keypad...
 
IRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATMIRJET- Artificial Intelligence based Smart ATM
IRJET- Artificial Intelligence based Smart ATM
 
PCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commercePCI,Smart Card,ATM and E-commerce
PCI,Smart Card,ATM and E-commerce
 
Fingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication SystemFingerprint Based Biometric ATM Authentication System
Fingerprint Based Biometric ATM Authentication System
 
Smart Card Presentation
Smart Card Presentation Smart Card Presentation
Smart Card Presentation
 
SMART CARDS
SMART CARDSSMART CARDS
SMART CARDS
 
Electronic key-card & ELC;elc
Electronic key-card & ELC;elcElectronic key-card & ELC;elc
Electronic key-card & ELC;elc
 
IRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking SystemIRJET- Two Level Authentication for Banking System
IRJET- Two Level Authentication for Banking System
 
Inside .NET Smart Card Operating System
Inside .NET Smart Card Operating SystemInside .NET Smart Card Operating System
Inside .NET Smart Card Operating System
 

Ähnlich wie Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording Attacks in ATM

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATMParas Garg
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Networkdbpublications
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...inventionjournals
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationIRJET Journal
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris ScannerIRJET Journal
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformaticsijtsrd
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...IRJET Journal
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsIJRES Journal
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital PaymentIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMIRJET Journal
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMIRJET Journal
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 

Ähnlich wie Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording Attacks in ATM (20)

Fingerprint Authentication for ATM
Fingerprint Authentication for ATMFingerprint Authentication for ATM
Fingerprint Authentication for ATM
 
An ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation NetworkAn ATM Multi-Protocol Emulation Network
An ATM Multi-Protocol Emulation Network
 
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
Augment the Safety in the ATM System with Multimodal Biometrics Linked with U...
 
C132733
C132733C132733
C132733
 
Transactions Using Bio-Metric Authentication
Transactions Using Bio-Metric AuthenticationTransactions Using Bio-Metric Authentication
Transactions Using Bio-Metric Authentication
 
D0351022026
D0351022026D0351022026
D0351022026
 
IRJET - Precocious ATM System using Iris Scanner
IRJET -  	  Precocious ATM System using Iris ScannerIRJET -  	  Precocious ATM System using Iris Scanner
IRJET - Precocious ATM System using Iris Scanner
 
Biometric ATM2.docx
Biometric ATM2.docxBiometric ATM2.docx
Biometric ATM2.docx
 
A011140104
A011140104A011140104
A011140104
 
Secure E-Banking Using Bioinformatics
Secure E-Banking Using BioinformaticsSecure E-Banking Using Bioinformatics
Secure E-Banking Using Bioinformatics
 
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...Integration  Of Triangular  Location  Detection, IoT, Open CV - User Authenti...
Integration Of Triangular Location Detection, IoT, Open CV - User Authenti...
 
SMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactionsSMS hashing system (Real-Time) for the reliability of financial transactions
SMS hashing system (Real-Time) for the reliability of financial transactions
 
IRJET - A Survey Paper on Secure Digital Payment
IRJET -  	  A Survey Paper on Secure Digital PaymentIRJET -  	  A Survey Paper on Secure Digital Payment
IRJET - A Survey Paper on Secure Digital Payment
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATMBIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
BIOMETRIC AND MAGIC PIN AUTHENTICATION SYSTEM FOR ATM
 
Advanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSMAdvanced Security System for Bank Lockers using Biometric and GSM
Advanced Security System for Bank Lockers using Biometric and GSM
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 

Mehr von IJRTEMJOURNAL

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...IJRTEMJOURNAL
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...IJRTEMJOURNAL
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessIJRTEMJOURNAL
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...IJRTEMJOURNAL
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain managementIJRTEMJOURNAL
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...IJRTEMJOURNAL
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERIJRTEMJOURNAL
 
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...IJRTEMJOURNAL
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A PrimerIJRTEMJOURNAL
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyIJRTEMJOURNAL
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...IJRTEMJOURNAL
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaIJRTEMJOURNAL
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomIJRTEMJOURNAL
 
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisOptimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisIJRTEMJOURNAL
 
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...IJRTEMJOURNAL
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloIJRTEMJOURNAL
 
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...IJRTEMJOURNAL
 
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...IJRTEMJOURNAL
 
What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...IJRTEMJOURNAL
 
Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...IJRTEMJOURNAL
 

Mehr von IJRTEMJOURNAL (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain managementA study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
Assessment of Building Failure: The Case of Saint Thomas’s Anglican Church, A...
 
Data Warehouse: A Primer
Data Warehouse: A PrimerData Warehouse: A Primer
Data Warehouse: A Primer
 
Resource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economyResource recycling and waste-to-energy: The cornerstones of circular economy
Resource recycling and waste-to-energy: The cornerstones of circular economy
 
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
Survivin Immunoreactivity in the Gastric Mucosa of Rats Feedind with Carpet S...
 
Security and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in NigeriaSecurity and Crime Management in University Libraries in Nigeria
Security and Crime Management in University Libraries in Nigeria
 
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster MushroomInfluence of heat treatment on Vitamin C Levels in Oyster Mushroom
Influence of heat treatment on Vitamin C Levels in Oyster Mushroom
 
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element AnalysisOptimization of Design Parameters for Crane Hook Using Finite Element Analysis
Optimization of Design Parameters for Crane Hook Using Finite Element Analysis
 
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
Macroeconomic stability in the DRC: highlighting the role of exchange rate an...
 
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa GorontaloReserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
Reserves Estimating Carbon in Forest City District Village Bongohulawa Gorontalo
 
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
An Analysis of Tourism Competitiveness Index of Europe and Caucasus: A Study ...
 
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
Translation Errors of Public Signs in English Subtitle: Residents’ Poor Forei...
 
What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...What are the determinants of the non-reimbursement for SMEs in Central Africa...
What are the determinants of the non-reimbursement for SMEs in Central Africa...
 
Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...Multivariate regression methods with infrared spectroscopy to detect the fals...
Multivariate regression methods with infrared spectroscopy to detect the fals...
 

Kürzlich hochgeladen

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersMairaAshraf6
 

Kürzlich hochgeladen (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 

Improvement of a PIN-Entry Method Resilient to ShoulderSurfing and Recording Attacks in ATM

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 2 Issue 1 ǁ January. 2018 ǁ PP 05-10 | Volume 2 | Issue 1 | www.ijrtem.com | 5 | Improvement of a PIN-Entry Method Resilient to Shoulder- Surfing and Recording Attacks in ATM S. Preema , Department of Computer Science, VLB Janakiammal College of Arts & Science, Coimbatore, Tamilnadu ABSTRACT : The scope of this work extends to system components (for example service providers, networks, servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system or sub-system and between systems. This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite-state LBG (CFSLBG) algorithm that reduces the computation time by exploiting the correlations of palette entries between the current and previous iterations. KEYWORDS: Palettes , Color quantization, LBG algorithm, finite-state algorithm, I. INTRODUCTION This work is designed to provide PIN security guidelines for all payment accounts that use a PIN, including those associated with magnetic stripe cards, chip cards, ‘hybrid’ cards that incorporate both a magnetic stripe and a chip or any other cardholder payment device form factor The scope of this work extends to system components (for example service providers, networks, servers, hosts, applications, processes and personnel) which are used to exchange PIN-related data. The PIN Guidelines in this document encompass PIN security within any one system or sub-system and between systems. These guidelines are targeted at PIN protection during PIN processing in the issuer security domain. PIN processing of interchange transactions is covered by the PCI PIN Security Requirements. A PIN (Personal Identification Number) is a four to twelve digit number known by a cardholder and used to authenticate the cardholder to the card-issuing bank (or to the cardholder’s ICC). The transaction PIN is the PIN entered by the cardholder during a payment transaction. The online PIN is the transaction PIN used to verify the cardholder online. The offline PIN is the transaction PIN used with an ICC to verify the cardholder offline. The reference PIN is a stored or derived PIN value used by the issuer to verify the transaction PIN. If stored in an ICC it may or may not be equal to the online PIN. The PIN management guidelines in this document refer to the following processes. The primary objective of this research paper is to provide a complete knowledge of ATM and a solution to its pin entry process. To access the funds which are kept in the bank at any time is not an easy task but today it is not at all difficult. A person just has to tell his bank that he wants an ATM card. The bank issues him an ATM card which is pass coded and could be used by him alone. ATM card is called by different names like bank card, MAC(Money access card), client card, key card or cash card, etc. In most cases even debit and credit card could be used. The ATM card helps the customer to be identified by a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip. The security is provided by the customer entering a personal identification number (PIN). Now the person who needs funds when he is taking his family out of shopping or when he requires funds for an outing it is easily done. If someone falls very seriously ill the person can remove the funds in the middle of the night too. The ATM machine helps the customer to make his / her life much easier. It does most The ATM card is slowly replacing cheque, the personal attendance of various customers, has increased banking hours and reduced the holidays. They do not require any paper based verification. Due to heavier computing demands and the falling price of personal computer–like architectures, ATMs have moved away from custom hardware architectures using microcontrollers or application-specific integrated circuits and have adopted the hardware architecture of a personal computer, such as USB connections for peripherals, Ethernet and IP communications, and use personal computer operating systems. II. NATIONAL / INTERNATIONAL STATUS Today, the vast majority of ATMs worldwide use a Microsoft Windows operating system, primarily Windows XP Professional or Windows XP Embedded. A small number of deployments may still be running older versions of the Windows OS, such as Windows NT, Windows CE, or Windows 2000. There is a computer industry security view that general public desktop operating systems(Dos) have greater risks as operating systems for cash dispensing machines than other types of operating systems like (secure) real-time operating systems (RTOS). RISKS Digest has many articles about ATM operating system vulnerabilities.] With the onset of
  • 2. Improvement of a PIN-Entry Method Resilient… | Volume 2 | Issue 1 | www.ijrtem.com | 6 | Windows operating systems and XFS on ATMs, the software applications have the ability to become more intelligent. This has created a new breed of ATM applications commonly referred to as programmable applications. These types of applications allows for an entirely new host of applications in which the ATM terminal can do more than only communicate with the ATM switch. It is now empowered to connect to other content servers and video banking systems. Notable ATM software that operates on XFS platforms include Triton PRISM, Diebold Agilis EmPower, NCR APTRA Edge, Absolute Systems AbsoluteINTERACT, KAL Kalignite Software Platform, Phoenix Interactive VISTAatm, Wincor Nixdorf ProTopas, Euronet EFTS and Intertech inter- ATM. With the move of ATMs to industry-standard computing environments, concern has risen about the integrity of the ATM's software stack.Security Experts says that Automatic Teller Machine (ATM) in future will have biometric authentication techniques to verify identities of customer during transaction. In South America, there are companies that have introduced fingerprint technology as a embedded part of ATM systems, where citizens have already started using fingerprint in place of PIN or Password for general identification with their ID cards. Nowadays, there are devices to perform biometric identification and authentication of following: fingerprint, hand, retina, iris, face, and voice. India is still lacking in implementing biometric with smart card as a safety approach. Fingerprint approach for identification given by Oko S. and Oruh J. (2012) not proved efficient as when citizen will move to ATM system, fingers may become dirty from natural environment and will not be able to access his account with ATM system, since fingerprints will not match from the one that was traced during identification. Secondly, a iris and retina approach proposed by Bhosale S. and Sawant B.(2012) as a identification method, but citizens might not want a laser beamed into their eyes for retina scan at every time he wants to access account through ATM. Thus, iris and retina as identification authentication proved inefficient. Vibration detector sensor were also proposed as a security system for ATM machines by Ajaykumar M. And Bharath Kumar N.(2013). Voice was also proposed for security in ATM systems as a biometric with smart card. The cons were there at the same time as two citizens can have same voice and one can easily hack and can fraud with another’s account. Objectives : Our proposed scheme is based on an elegant adaptive black-and-white to coloring of the 10-digit keypad in the standard layout. Proposed method requires many user inputs, so that human guessing pin Entry becomes a difficult process. The new scheme has the remarkable property of resisting camera-based recording attacks over an unlimited number of authentication sessions without leaking any of the PIN digits. In the earlier method user enters a pre-arranged textual, numerical password directly through the user interface of the authentication system. So, the password submission process is prone to direct observational attacks. Entry of a password can easily be observed by nearby adversaries in crowded places, aided by vision enhancing and/or recording devices. Due to its short length and the simplicity of the ten-digit keypad guess of password is easy. The main features include: 1. Pin security is very high. 2. Tictoc PIN holds two measures that can prevent information leakage. 3. More Efficient so that we can use any Type of pin Entry application. III. METHODOLOGY This project, proposes virtualizing Harvard architecture on top of the existing memory architecture of modern computers, including those without non-executable memory page support, so as to prevent the injection of malicious code entirely. Harvard architecture is simply one wherein code and data are stored separately. Data cannot be loaded as code and vice-versa. In essence, we create an environment wherein any code injected by an attacker into a process’ address space cannot even be addressed by the processor for execution. In this way, we are attacking the code injection problem at its root by regarding the injected malicious code as data and making it unaddressable to the processor during an instruction fetch. Split memory architecture produces an address space where data cannot be fetched by the processor for execution. For an attacker attempting a code injection, this will prevent him from fetching and executing any injected code. It includes the following process: PIN LAYOUT DESIGN PROCESS: This process designs 10 digit keypad with random RGB color SCHEME using a Fast Finite-State Algorithm for Generating RGB Palettes of Color. In this work, we propose a color finite- state LBG (CFSLBG) algorithm that reduces the computation time by exploiting the correlations of palette entries between the current and previous iterations. Instead of searching the whole color palette, the CFSLBG algorithm searches only a small number of colors that are very close to the training vector. Thus, the computation time for color quantization is reduced. The proposed approach generates RGB palettes efficiently. This work describes the implementation of this algorithm and simulation results. Video monitors typically use the three primary color components, red, green, and blue, to specify the color of each pixel in a color image. Each
  • 3. Improvement of a PIN-Entry Method Resilient… | Volume 2 | Issue 1 | www.ijrtem.com | 7 | primary component usually provides 8 bits for specifying the color of each pixel in a full-color digitized image. Color quantization algorithms can be grouped into splitting algorithms and clustering-based algorithms. Clustering-based algorithms extract quantized colors by applying various clustering algorithms. In this paper, we propose an effortless and straightforward clustering algorithm, which is fast and excellent for generating colour palette. Vector quantization (VQ) has been shown to be an efficient method of image coding. The input vectors are individually quantized to the closest codeword in the codebook. The codebook is generated by using some clustering algorithms from a set of digits. The iterative clustering algorithm proposed by Linde, Buzo, and Gray (LBG) is usually used in VQ . A number of methods for generating color palettes using the VQ codebook design techniques were proposed. In view of color image coding, each pixel can be considered as a 3-dimension vector in the RGB color space. These vectors are the input vectors of the color VQ (CVQ) scheme. The LBG algorithm is most popular method used to select a color palette with a limited number of colors from a full-color digitized image. In each iteration of the LBG algorithm, it searches the whole color palette in order to find the corresponding palette entry for each training vector. That is, the LBG algorithm requires a large amount of computation for color quantization. This paper proposes a novel color finite-state LBG (CFSLBG) algorithm that reduces the computation time required to select palettes . Instead of searching the whole color palette, the proposed algorithm searches only a small part of the palette to find the corresponding palette entry for each training vector. In the CFSLBG algorithm, the number of palette entries that need to be searched for a training vector in each iteration is always much smaller than the size of the whole palette. For this reason, the duration of each iteration is greatly reduced. COLOR FSLBG ALGORITHM : Although the VQ scheme yields acceptable performance for image coding, the finite-state vector quantization (FSVQ) schemes [16-21] improve performance for an ordinary VQ. An FSVQ can be viewed as a finite collection of ordinary VQ’s, each with its own codebook associated with a state, which is called the state codebook. The encoding state of the current input vector is decided by a state function F(x). This coding state may be described by a state variable s ∈ S = {si : i = 1, …, M}, where M is the total number of states. The FSVQ is defined as a mapping from Rk × S to a subset of a master codebook MC = {xi : i = 1, …, N}. For each state si, the FSVQ encoder selects Nf codewords by means of the state function from the master codebook MC as the state codebook SCs. For each input vector x, the encoder decides the current state s and then searches the state codebook SCs to find its corresponding codeword. The codebook size of the state codebook is much smaller than that of the master codebook. Hence, the searching time can be reduced. A fast finite-state algorithm that reduces the computation time for vector quantizer design by exploiting FSVQ techniques shows that the fast finite-state algorithm can reserve the quality of encoding. For each state s, the state palette SPs is the subset of whole palette Pi, and the size of SPs is Nf. The Nf codewords in SPs are the closest codewords to s in the whole palette Pi−1. Thus, the first iteration of the CFSLBG algorithm is the same as that of the ordinary LBG algorithm, in which the full search algorithm is used to select a codeword for each training vector. At the following iteration, i.e. i ≥ 2, the information in the previous iteration is used to determine the states of the training vectors. The CFSLBG algorithm is described in the following steps. Step 1: Design an initial RGB color palette P0 and set DAVG0 ← ∞. Step 2: For each training vector x, find the closest palette entry 0 xˆ by searching the whole color palette P0. Compute the average distortion DAVG1 . Step 3: For each palette entry 0 xˆ in P0, generate a new entry 1 xˆ ← centroid(CS( ˆ )) 0 x and add 1 xˆ into P1. Set i ← 2. Step 4: Set the state space S = Pi−1. Step 5: For each state s in S, find the set of the Nf closest codewords in the whole color palette Pi−1 and define this set as the state palette SPs. For each training vector x, use the previous codeword -1 ˆi x as the state s. Find the closest palette entry ˆi x by searching the state palette SPs. Step 6: Compute the average distortion DAVGi . If | DAVGi-1 − DAVGi | / DAVGi is smaller than ε, then stop. Step 7: For each entry -1 ˆi x in Pi−1, generate a new entry ˆi x ← centroid(CS( ˆ )) i-1 x and add ˆi x into Pi. Set i ← i + 1 and go to step 4. Note that the state palette size Nf is much smaller than the whole color palette size N. The Nf codewords for each state are found by an insertion sorting algorithm applied to the entire palette. ENROLLMENT PROCESS :In Enrollment process user/admin fills their personal details like name, address, phone no, username and submit the user registration form. Automatically 4 digit pin will be generated and send to the corresponding user mail id. And user can change the pin also.
  • 4. Improvement of a PIN-Entry Method Resilient… | Volume 2 | Issue 1 | www.ijrtem.com | 8 | SPLIT AND MERGE SCHEME : This process collects all the colors from GUI after user enters it in the system. The colors are spilt in to four groups and each and every groups consist of three color combination of colors .every group have one user entered pin digit. PIN IDENTIFICATION AND AUTHENTICATION PROCESS : Finally this process identifies four digit pin. It compares each group with another group and apply random color match scheme for identifying user pin. The color combinations are compared with each and every group and this pin is finally compared with the user’s original pin. TRANSACTION : This process includes the user account details entry process along with the bank ATM transactions. The transaction such as deposit and withdraw will be performed after the successful login. This feature will allow a customer to transfer money from any of their accounts to another account, and also this feature will allow customers to check money transfer information report and balance details. Modules User Table Report User Login 2 Pin Authenticatio n . 3 Admin 3.1 pin color verification Generate pin to user . 4 color Table Registration (ADMIN) 1
  • 5. Improvement of a PIN-Entry Method Resilient… | Volume 2 | Issue 1 | www.ijrtem.com | 9 | IV. CONCLUSION Every application has its own merits and demerits. The project has covered almost all the requirements. Further requirements and improvements can easily be done since the coding will be mainly structured or modular in nature. Changing the existing modules or adding new modules can append improvements. Further enhancements can be made to the application, so that the system will be immediately blocked while attacks take place. In future all transaction will be processed in a secure manner and can find the intruders activity by getting all relevant details. In future it will capture all actions of the intruder by using screen capturing mechanism. It is concluded that the application will work well and satisfy the needs. It also acts as the sharing of files to the valuable resources. REFERENCES 1. Y. W. Lim and S. U. Lee, “On the color image segmentation algorithm based on the thresholding and the fuzzy C-means techniques,” Pattern Recognition, Vol. 23, 1990, pp. 935-952. 2. Z. Xiang, “Color image quantization by minimizing the maximum intercluster distance,” ACM Transactions on Graphics, Vol. 16, 1997, pp. 260-276. 3. I. S. Hsieh and K. C. Fan, “An adaptive clustering algorithm for color quantization,” Pattern Recognition Letters, Vol. 21, 2000, pp. 337-346. 4. E. Rendon, L. Salgado, J. M. Menendez, and N. Garcia, “Adaptive palette determination for color images based on Kohonen networks,” in Proceedings of the International Conference on Image Processing (ICIP), Vol. 1, 1997, pp. 830-833. 5. J. S. Kirk, D. J. Chang, and J. M. Zurada, “A self-organizing map with dynamic architecture for efficient color quantization,” in Proceedings of the International Joint Conference on Neural Networks (IJCNN), Vol. 3, 2001, pp. 2128-2132. 6. J. Foster, R. M. Gray, and M. O. Dunham, “Finite-state vector quantization of waveform coding,” IEEE Transaction on Information Theory, Vol. IT-31, 1985, pp. 348- 359. 7. W. T. Chen, R. F. Chang, and J. S. Wang, “Image sequence coding using finite-state vector quantization,” IEEE Transaction on Circuits Systems for Video Technology, Vol. 2, 1992, pp. 15-24.
  • 6. Improvement of a PIN-Entry Method Resilient… | Volume 2 | Issue 1 | www.ijrtem.com | 10 | 8. M. O. Dunham and R. M. Gray, “An algorithm for the design of label-transition finite state vector quantizers,” IEEE Transactions on Communications, Vol. COM-33, 1985. 9. R. Aravind and A. Gersho, “Low-rate image coding with finite-state vector quantization,” in Proceedings of the International Conference on Acoustics, Speech, and Signal Processing (ICASSP), 1986, pp. 137-140.