Secured Netbanking Using Minutiae Methodm
Journal Title: International Journal of Scientific Research and Management - Year 2015, Vol 3, Issue 4
Abstract
The main objective of this project is to avoid hacking process in an on - line banking sector by using finger print recognition technique. Minutiae is the most effective method in which the finger prints are extracted in the form of points and it can be viewed in the two dimensional plane. These finger prints are stored in the data base and then each user is provided with the unique id as OTP using random number generation algorithm. The unique id is sent to the user’s personnel e - mail id. During the net banking process the user id is encrypted and decrypted using triple DES and MD5 algorithms. In which each key has 56 bit and it can encrypt and decrypt each block which has 64 bit of data. After the key pair generation the given finger print is verified then the most secured transaction can be made. These transactions are maintained in log and updated immediately by the administrator
Authors and Affiliations
K. Dharani
Exposing Digital Image Forgeries by Illumination Color Classification
In this paper, we tend to analyze one amongst the foremost common styles of photographic manipulation,called image composition or splice. We tend to propose a forgery detection me...
Travelling Wave Solutions of the Perturbed Wadati-Segur-Ablowitz Equation by (G'/G)-Expansion Method
The investigation of the exact solutions of NLPDEs plays an im- portant role for the understanding of most nonlinear physical phenomena. Also, the exact solutions of this equations aid the numerical solvers to assess...
Role of Independent Directors in the Changing Business Scenario in India
The literature on corporate governance and various codes emphasis that the Board of directors should provide direction to the company, evaluate and approve strategies, appoint and remove the chief executi...
Framework for Splitting Algorithm of NCAC - MAC Protocol for collision Avoidance in Wireless Ad Hoc Network
Ad Hoc Network used in military and emergency rescue environment. Co - operative communication effective technique to deal with the channel fading and improve network performance , and provides hi gher th...
Proactive Mechanism of Protection against SQL Injection Attac
In this fast growing environment most of the organizations are now computerized and those are not seeking computerization. As the use of computer increases the need of the database is also increasing and hence the datab...