Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
282
281
280
change the new password for the mobile application. After this
process, the user logs into the Android Application, and he/she
can use the application for transaction purposes.
283
282
281
In the DB credentials are validated, and the user is logged in. V. SCREENSHOTS
284
283
282
well as waiting time in ATM is also decreased. Nowadays, Electronic Commerce Research and Applications”.
mainstream authentication systems of ATM have high risk. vo10(6):605-14,Dec 2011.
Since these systems do not have resistance to peeping attack.
Finger vein authentication system and authentication system [8]. Altinkemer K, Wang T. Cost and benefit analysis of
using one-time passwords have a vulnerability. For these authentication systems. Decision Support Systems. 2011 Jun
reasons, we proposed the system without risk of peeping 30;51(3):394-404.
attacks. However, this technology displays privacy information
such as payment and payees. It may be able to be read by [9]. Prabakaran G, Bhakkiyalakshmi R. Transmission of Data
unauthorized users. Therefore, the transfer information Using Arm Based Privacy Protection QR-code. InInternational
displayed on ATM. Illegal users are unable to find out the Journal of Engineering Development and Research (Vol. 2,
confidential information including the user’s privacy. No. 2 (June 2014)). IJEDR.June 2014.
6.2 FUTURE WORK PART: [10]. Tandon A, Sharma R, Sodhiya S, Vincent PM. “QR Code
The problem is that the users should have basic based secure OTP distribution scheme for Authentication in
knowledge of mobile phone as well as scanning QR code Net-Banking”. International Journal of Engineering &
process, so there is a complication for illiterate peoples. In the Technology. 0975-4024.,June 2013.
future enhancement of this paper, We can invent QR code
based swipe machines which reduce the usage of smart cards [11]. Petrlic R, Sorge C. Establishing user trust in automated
in retail shopping and disadvantage is online shopping using teller machine integrity. Information Security, IET.
smart cards cannot be carried out. We conclude that this system Vol8(2):132-9;Mar 2014.
has resistance to peeping attacks, can make operation time
short, and also can protect user’s privacy. [12]. Leu JS, Hsieh WB. Efficient and secure dynamic ID-
based remote user authentication scheme for distributed
systems using smart cards. Information Security, IET.;Vol
8(2):104-13. Mar 2014.
VII. REFERENCE
[13]. Onwudebelu U, Longe O, Fasola S, Obi NC, Alaba OB.”
[1] .Lin SS, Hu MC, Lee CH, Lee TY. “Efficient QR Code Real Time SMS-Based hashing scheme for securing financial
Beautification With High Quality Visual Content. transactions on ATM systems. InAdaptive Science and
Multimedia”, IEEE Transactions,vol.17(9):1515-24., . Sep Technology (ICAST), 2011 3rd IEEE International Conference
2015. (pp. 1-6). IEEE Nov 2011.
[2]. Tkachenko, I., Puech, W., Destruel, C., Strauss, O., [14] P.Vijayakumar, M.Azees, A.Kannan, L.Jegatha Deborah,
Gaudin, J.M. and Guichard, C.” Two level QR code for private “Dual Authentication and Key Management Techniques for
message sharing and document authentication.”IEEE Secure Data Transmission in Vehicular Ad-hoc Networks”,
Transaction: ,vol 11(3) :571 - 583 ,March 2016 . IEEE Transactions on Intelligent Transportation Systems,
vol.17,no.4, 1015 - 1028, (2016)
[3]. Lin YH, Chang YP, Wu JL. Appearance-based QR code
beautifier. Multimedia, IEEE Transactions vol.15(8):2198- [15] P.Vijayakumar, R.Naresh, L. Jegatha Deborah, SK
207,Dec 2013. Hafizul Islam, “Computation Cost Efficient Group Key
Agreement Protocol for Secure Peer to Peer Communication”,
[4].Lin, Pei-Yu. "Distributed Secret Sharing Approach with Security and Communication Networks, Wiley, Accepted for
Cheater Prevention based on QR Code." IEEE Publication.DOI:10.1002/Sec. 1578.
Transaction.vol.12(1): 384 - 392 ,Feb 2016.
[16] S.Audithan, T.S.Murunya,P.Vijayakumar, “Anonymous
[5]. Chiang JS, Hsia CH, Li HT. High density QR code with Authentication for Secure Mobile Agent Based Internet
multi-view scheme. Electronics Letters. Vol 49(22):1381- Business”, Circuits and Systems (CS), Scientific Research
3.Oct 2013. Publishing
285
284
283