ATM Password Encryption Using LCD Pad

M.Pushpavalli*, K.Ramya**, R.Chandraleka***
**-*** PG Scholar, Embedded Systems, Bannari Amman Institute of Technology, India.
Periodicity:August - October'2015
DOI : https://doi.org/10.26634/jes.4.3.4892

Abstract

This paper describes about the prevention of hacking at the ATM centers. LCD pads have been used in the ATM centers, instead of mechanical keypads. It avoids 99% hacking at the ATM centers. Nowadays, one of the most challenging problems of the world is hacking of pin number in the ATM centers. It majorly occurs due to the use of Mechanical Keyboards and one main problem is key de-bouncing, that occurs in these mechanical keyboards. To overcome this, LCD pads are used. Based on the properties of human vision and the traditional cryptography, messages are graphically encoded and hidden into the password displayed on an LCD screen. The digits will be changed or reversed so as to provide security. The message recovery and decoding can be achieved through manipulating the corresponding password entered. LCD pads can thus be replaced for the mechanical Keyboards in order to prevent hacking at the ATM centers.

Keywords

ATM, LCD Displays, Password Security, Traditional Security.

How to Cite this Article?

Pushpavalli.M., Chandraleka.R., and Ramya.K. (2015). ATM Password Encryption Using LCD Pad. i-manager’s Journal on Embedded Systems, 4(3), 1-6. https://doi.org/10.26634/jes.4.3.4892

References

[1]. Gerson de Souza Faria and Hae Yong Kim (2013). “Identification of Pressed Keys From Mechanical Vibrations”. IEEE Transactions on Information Forensics and Security ,Vol.8 No.7, pp. 1556-6013.
[2]. T. Halevi and N. Saxena, (2010).“On paring constrained wireless devices based on secrecy of auxiliary channels: The case of acoustics th eavesdropping”. in Proc, of 17 ACM Conference on Computer and Communication, pp.97-108.
[3]. A. Verma. H. Carter, and P. Traynor, (2011). “(sp) iphone : Decoding vibration from nearby keyboard using th mobile phone accelerometers”. in Proc, of 18 ACM Conference on Computer and Communication, Security.
[4]. F. Standaert, T. Malkin, and M. Yung, (2009). “A unified framework for the analysis of side channel key recovery attacks”. International Association for Cryptographic Research , pp. 443-461.
[5]. Ron kohavi, (1995). “A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection”. IJCAI.
[6]. Johan A. K. Suykens, Dirk-Emma Baestaens, AnnemieLambrechts, and GerLanckriet, (2001). “Financial Time Series Prediction Using Least Squares Support Vector Machines Within the Evidence Framework”. IEEE Transactions on Neural Network, pp. 809- 821.
[7]. Cai,L. and Chen, H(2011). “Touch Logger: Inferring Keystrokes On Touch Screen From Smart phone motion”. in th Proc of the 6 USENIX Conference on Hot topics in Security.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.