Volume-10 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Credit Card Duplication and Crime Prevention Using Biometrics |
| Country | : | India |
| Authors | : | Prithika.M, P.Rajalakshmi |
| : | 10.9790/0661-01010107 ![]() |
Abstract: A phenomenal growth in the number of credit card transactions, especially for on-line purchases, has also led to a substantial rise in fraudulent activities. Credit card fraudulent transactions are very easy to conduct, while very difficult to recover, compared to the fraud cases in hard-products transactions. In real life, fraudulent transactions could be interspersed with genuine transactions and simple pattern matching techniques are not often sufficient to detect the fraudulent transactions efficiently. Moreover, surrogate representations of identity can be easily forgotten, lost, guessed, stolen, or shared. Further it can be hacked through malicious websites or prone to security breaches. Implementation of efficient fraud detection systems has thus become imperative for all credit card companies in order to minimize their losses. In this paper, we propose a IRPV (Iris Recognition and Palm Vein) recognition technology which will help add even more security to existing biometric devices that may be susceptible to fraud. The techniques used are Palm vein technology, along with iris recognition. It is difficult to crack, because each person's vein pattern is unique. Thus, biometric systems impart higher levels of security when appropriately integrated into applications requiring user authentication. The experimental results show that the detection rate would prove 99.995% compared to traditional methods.
Index Terms - Credit Card Fraud, Iris Recognition, Palm Vein technology.
[1] Benson Edwin Raj, S.; Portia, A.A.; , "Analysis on credit card fraud detection methods," Computer, Communication and Electrical Technology (ICCCET), 2011 International Conference on , vol., no., pp.152-156, 18-19 March 2011
[2] Murdoch, Steven J.; Drimer, Saar; Anderson, Ross; Bond, Mike; , "Chip and PIN is Broken," Security and Privacy (SP), 2010 IEEE Symposium on , vol., no., pp.433-446, 16-19 May 2010
[3] Nasir, M.H.N.; Hamid, S.; Hassan, H.; , "Thread-Level Parallelism & Shared-Memory Pool Techniques for Authorization of Credit Card System," Communications and Information Technologies, 2008. ISCIT 2008. International Symposium on , vol., no., pp.447-452, 21-23 Oct. 2008
[4] Xiangqian Wu; Enying Gao; Youbao Tang; Kuanquan Wang; , "A Novel Biometric System Based on Hand Vein," Frontier of Computer Science and Technology (FCST), 2010 Fifth International Conference on , vol., no., pp.522-526, 18-22 Aug. 2010
[5] Shitu Luo; Yanling Wang; Yin Liu; Xiaopin Hu; , "Research on geomagnetic-matching technology based on improved ICP algorithm," Information and Automation, 2008. ICIA 2008. International Conference on , vol., no., pp.815-819, 20-23 June 2008
[6] Nguyen, M.H.; Ho, D.N.; Luu, D.H.; Moldovyan, A.A.; Moldovyan, N.A.; , "On functionality extension of the digital signature standards," Advanced Technologies for Communications (ATC), 2011 International Conference on , vol., no., pp.6-9, 2-4 Aug. 2011
[7] Zuguang Xuan; Zhenjun Du; Rong Chen; , "Comparison Research on Digital Signature Algorithms in Mobile Web Services," Management and Service Science, 2009. MASS '09. International Conference on , vol., no., pp.1-4, 20-22 Sept. 2009 doi: 10.1109/ICMSS.2009.
[8] "Statistics for General and On-Line Card Fraud," http://www.epaynews.com/statistics/fraud.html , Mar. 2007.
[9] S. Ghosh and D.L. Reilly, "Credit Card Fraud Detection with a Neural-Network," Proc. 27th Hawaii Int'l Conf. System Sciences: Information Systems: Decision Support and Knowledge-Based Systems,vol. 3, pp. 621-630, 1994.
[10] M. Syeda, Y.Q. Zhang, and Y. Pan, "Parallel Granular Networks for Fast Credit Card Fraud Detection," Proc. IEEE Int'l Conf. Fuzzy Systems, pp. 572-577, 2002.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Video face recognition is a widely used method in which security is essential that recognizes the human faces from subjected videos. Unlike traditional methods, recent recognition methods consider practical constraints such as pose and illumination variations on the facial images. Our previous work also considers such constraints in which face recognition was performed on videos that were highly subjected pose and illumination variations. The method asserted good performance however; it suffers due to high computational cost. This work overcomes such drawback by proposing a simple face recognition technique in which a cost efficient Active Appearance Model (AAM) and lazy classification are deployed. The deployed AAM avoids nonlinear programming, which is the cornerstone for increased computational cost. Experimental results prove that the proposed method is better than the conventional technique in terms of recognition measures and computational cost.
Keywords — Active Appearance Model (AAM), lazy classification, shape, model, appearance, recognition, computation.
[1] Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490, November 2004. [2] Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008.
[3] GenciCapi, "A Robotic System for Intelligent Real Time Face Recognition", ICGST International Journal on Automation, Robotics and Autonomous Systems, Vol. 9, No. 1, pp. 25-29, July 2009.
[4] Rehab F. Abdel-Kader, Rabab M. Ramadan and Rawya Y. Rizk, "Rotation Invariant Face Recognition Based on Hybrid LPT/DCT Features", International Journal of Electrical and Computer Engineering, Vol. 3, No. 7, pp. 488-493, 2008.
[5] Shaohua Kevin Zhou and Rama Chellappa, "Image-based face recognition under illumination and pose variations", Journal of the Optical Society of America A, Vol. 22, No. 2, pp. 217-229, 2005.
[6] Brunelli and Poggio, "Face recognition: Features versus templates", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 15, No. 10, pp.1042-1052, 1993.
[7] LaurenzWiskott, Jean-Marc Fellous, Norbert Kruger, and Christoph von der Malsburg, "Face Recognition by Elastic Bunch Graph Matching", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol.19, pp. 775-779, 1997.
[8] Edwards, Cootes and Taylor, "Face recognition using active appearance models", In Proceedings of the 5th European Conference on Computer Vision, Vol. 2, Freeburg, Germany,pp. 581-595, 1998.
[9] Zhao, Chellappa, Phillips and Rosenfeld, " Face Recognition: A Literature survey", Journal of ACM Computing Surveys, Vol. 35, No. 4, pp. 1-72, December 2003.
[10] SushmaJaiswal, Sarita Singh Bhadauria, Rakesh Singh Jadon and Tarun Kumar Divakar, "Brief description of image based 3D face recognition methods", 3D Research, Vol. 1, No. 4, pp. 1-15, 2010 .
- Citation
- Abstract
- Reference
- Full PDF
Abstract: DNA sequencing generates a large number of reads of lengths varying from 100bp to 1000bp, when sequenced using different methods of sequencing. These reads are further assembled to form contigs which are useful in annotation. The library generation using different amplification technique is involved in DNA sequencing process, which generates several identical reads, which are redundant, resulting in degraded quality of sequencing, besides also causing longer time for assembly. Existing computationally complex algorithms use string processing. The paper discusses the signal processing approach with application of Wavelet Transforms, designed to find exact and near exact identical reads. The string processing approach for pattern matching in search of similar patterns is computationally very expensive because the order of complexity of String comparisions is exponential in nature. Whereas Wavelet Transforms translates the sequence in co-efficients which are half of the length of the original sequence. On applying Wavelet Transforms repeatedly on the sequence, the sequence get transformed to half the length of the sequence used for transformations. Thus the order of complexity reduces to O(log n), which is much efficient compared to string processing.
Keywords – Haar wavelets, identical reads, pattern recognition, signal processing, wavelets,.
1] Sanger, F.et al. DNA sequencing with chain-terminating inhibitors. Proc. Natl. Acad. Sci. 1977, 74: 5463–5467.
[2] Ronaghi, M. Pyrosequencing Sheds Light on DNA Sequencing Genome Res. 2001, 11: 3-11
[3] Metzker, M. L. et al. Emerging Technologies in DNA Sequencing. Genome Res. 2005, 15: 1767-1776
[4] Dong, H. et al. Artificial duplicate reads in sequencing data of 454 Genome Sequencer FLX System Acta Biochim Biophys Sin 2011, 43: Issue6: 496–500
[6] Gomez-Alvarez V. et al. Systematic artifacts in metagenomes from complex microbial communities. ISME J, 2009, 3 : 1314–1317
[7] Meher,J. K. et al. Wavelet Based Lossless DNA Sequence Compression for Faster Detection of Eukaryotic Protein Coding Regions , I.J. Image, Graphics and Signal Processing 2012, 7, 47-53
[8] Daubechies, I. Ten Lectures On Wavelets, 1992
[9] Aggarwal, C. C. On the Use of Wavelet Decomposition for String Classification, Springer - Data Mining and Knowledge Discovery, 2005, 10, 117–139
[10] Castleman, K.R. Digital Image Processing, (Englewood Cliffs: Prentice-Hall, 1996)
