The objective of the proposed system is designed to perform mobile banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct measurements of a part of the human body and Behavioral is based on the action performed by the user. So, I decided to use the face recognition method, which is purely based on the physiological characteristic of the human body. The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible with the small handheld devices. For the image capturing and forwarding process the Android mobile is used.

">

Mobile Banking using Android based Biometrics System

N.Rajganesh*
Assistant Professor [Sl.Grade], Department of Information Technology, A.V.C.College of Engineering, Mannampandal, India.
Periodicity:March - May'2013
DOI : https://doi.org/10.26634/jit.2.2.2285

Abstract

The objective of the proposed system is designed to perform mobile banking in a secured way. To achieve this, the concept of Biometric person recognition method is introduced through the mobile devices. Biometrics can be categorized into two categories, they are Physiological and Behavioral. Physiological is based upon the direct measurements of a part of the human body and Behavioral is based on the action performed by the user. So, I decided to use the face recognition method, which is purely based on the physiological characteristic of the human body. The Face recognition technique implementation is done with the two existing algorithms (i.e) Viola Jones and Principle Component Analysis(PCA).The Viola Jones method is mainly used to check whether the image is present in the frame or not. The PCA method is based on Eigen values and Eigen vectors and performs distance calculation based on features of the face. With this proposed idea, secured access to restricted data/services during a standard Web Session is possible with the small handheld devices. For the image capturing and forwarding process the Android mobile is used.

Keywords

Android, Viola Jones, PCA

How to Cite this Article?

Rajganesh, N. (2013). Mobile Banking Using Android Based Biometrics System. i-manager’s Journal on Information Technology, 2(2), 17-22. https://doi.org/10.26634/jit.2.2.2285

References

[1]. N. L. Clarke and S. M. Furnell (2005), Authentication of users on mobile telephones—A survey of attitudes and practices, Computers and Security, Vol. 24, no. 7, pp. 519–527.
[2]. N. L. Clarke and A. Mekala (2007), The application of signature recognition to transparent handwriting verification for mobile devices, Inf. Manage. Computer and Security, Vol. 15, no. 3, pp. 214–225.
[3]. X. Chen, J. Tian, Q. Su, X. Yang, and F. Wang (2005), A secured mobile phone based on embedded fingerprint recognition systems, in Proc. ISI (Lect. Notes Computer and Security, vol. 3495), pp. 549–553.
[4]. Ephraim, Theo,(2009), Real-Time Viola-Jones Face Detection in a Web Browser, Computer and Robot Vision, CRV '09, pp.321-328
[5]. R. M. Godbole and A. R. Pais,(2008), Secure and efficient protocol for mobile payments, Proceeding 10th Int. Conf. Electron. Commerce, pp. 1–10.
[6]. J. Gonzalez-Rodriguez, D. T. Toledano, and J. Ortega-Garcia(2008), Voice biometrics in Handbook on Biometrics, A. K. Jain, A. A. Ross and P. Flynn, Eds. New York: Springer-Verlag, pp. 151–170.
[7]. Hu,Jhe-Yi , Nat. Yunlin, Taiwan Sueng, Chien-Cheng; Liao, Wei-Hsiang; Ho,Chian C(2012), Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking, Computing, Communications and Applications Conference (ComComAp ), pp.111-116.
[8]. S.M.E. Hossain , G. Chetty (2011), Next Generation Identity Verification Based on Face-Gait Biometrics, International Conference on Biomedical Engineering and Technology IPCBEE, Vol.11, IACSIT Press, Singapore.
[9]. D. J. Hurley, B. Arbab-Zabar, and M. S. Nixon(2008), The ear as a biometric, in Handbook on Biometrics, A. K. Jain, A. A. Ross, and P. Flynn, Eds.New York: Springer-Verlag, pp. 131–150.
[10]. D. S. Jeong, H.-A. Park, K. R. Park, and J. Kim(2005), Iris recognition in mobile phone based on adaptive gabor filter, Lect. Notes Computer and Security, Vol. 3832, pp. 457–463.
[11]. R. L. Kay Protecting mobility, IDC White Paper [Online]. Available at: http://www.tsi.enst.fr/.
[12]. Livingston, Adam R. Old Dominion Univ., Norfolk Asari, Vijayan (2007), Regional Variance Dependant Sub-frame Reduction for Face Detection in, High Definition Video Frames, Applied Imagery Pattern Recognition Workshop, 36th IEEE, Date of Conference: 10-12 ,pp. 89 - 94.
[13]. Malachi, Tobias, Bambuch, Petr, Malach, Jindrich (2012), Face detection in video sequences, Radioelektronika (RADIOELEKTRONIKA), 22nd international Conference, pp. 1 – 4.
[14]. S. McCallum, Evaluability assessment of mobile biometric facial recognition Technology, Pinellas County, FL. [Online].Available:http://www.ncjrs.gov/ pdffiles1/nij/mobile-biometric-facial.pdf.
[15]. Pramod Kumar Pandey, Yaduvir Singh, Sweta Tripathi (2011), Image Processing using Principle Component Analysis, International Journal of Computer Applications (0975 – 8887), Volume 15– No.4.
[16]. I.K. Shlizerman, R. Basri (2011), 3D Face Reconstruction from a Single Image Using a Single Reference Face Shape, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 33, No. 2.
[17]. Q. Zhang, J. N. Moita, K. Mayes, and K.Markantonakis (2004), The secure and multiple payment system based on the mobile phone platform, presented at Workshop Inf. Secur. Appl., Jeju Island, Korea, 2004.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.