Secured Online Payment Using Biometric Identification System

Article Preview

Abstract:

In this paper, we will investigate the possibilities of using highly secured online payment via biometric system in the Nigerian environment. The system proposed enables the user to purchase any product online just by slotting a biometric embedded smart card in a portable handheld smart card reader that has a fingerprint scanner touch pad and can generate different code to authenticate online transactions. While online identification and verification processes are facing frauds and undesirable incidents, this biometric payment technology offers best solution. With the help of this technology, you can ensure that transactions on purchase of any product online are made in a reliable manner. Thus, no scope is left for criminal-minded people to create loopholes in e-commerce security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

193-199

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] A. W. Naji, A. S. Housain, B. B. Zaidan, A. A. Zaidan and A. H. Shihab, Security improvement of credit card online purchasing system, Scientific Research and Essays 6: 16 (2011), pp.3357-3370.

DOI: 10.5897/sre11.117

Google Scholar

[2] X. Hannan, B. Christianso and Z. Ying, A purchase protocol with live cardholder authentication for online credit card payment, Proceedings of IEEE Computer Society Fourth International Conference on Information Assurance and Security, Washington, DC, USA, 2008, pp.15-20.

DOI: 10.1109/ias.2008.44

Google Scholar

[3] I. Adebayo, E-commerce – Nigerian Goldmine? www. ifeadebayo. com.

Google Scholar

[4] H. O. Alanazi, H. A. Jalab, G. M. Alam, B. B. Zaidan and A. A. Zaidan, Securing electronic medical records transmissions over unsecured communications: an overview for better medical governance, Journal of Medical Plants Research, 4: 19 (2010).

DOI: 10.5897/jmpr10.325

Google Scholar

[5] S. Saini, How do sensitive screens work? www. engineering. mit. edu/live/news/1439, (2011).

Google Scholar

[6] D. Kumar, R. Yeonseung and K. Dongseop, A survey on biometric fingerprints: the cardless payment system, Proceedings of International Symposium on Biometrics and Security Technologies, Islamabad, Pakistan, 2008, pp.1-6.

DOI: 10.1109/isbast.2008.4547633

Google Scholar

[7] S. Sumanjeet, Emergence of payment systems in the age of electronic commerce: the state of art, Global Journal of Business Research, 2: 2 (2009), pp.17-36.

Google Scholar

[8] J. Trevathan, A. McCabe and W. Read, Online payments using handwritten Signature verification, Proceedings of IEEE Computer Society Sixth International Conference on Information Technology: New Generations, Las Vegas, Nevada, USA, 2009, pp.901-907.

DOI: 10.1109/itng.2009.105

Google Scholar

[9] K. Woong-Sik, K. Byung-Ik and C. Yun-Seung, A credit card verification system by biometric method, Proceedings of the 9th International Conference on the Control, Automation, Robotics and Vision, Singapore, 2006, p.1 – 4.

DOI: 10.1109/icarcv.2006.345119

Google Scholar

[10] A. A. Zaidan, B. B. Zaidan, A. K. Al-Frajat and H. A. Jalab, An overview: theoretical and mathematical perspectives for advance encryption standard/rijndael, Journal of Applied Science, 10: 18 (2010), pp.2161-2167.

DOI: 10.3923/jas.2010.2161.2167

Google Scholar

[11] H. Ihmaidi, A. Al-Jaber and A. Hudaib, Securing online shopping using biometric personal authentication and steganography, 2nd IEEE International conference on Information and Communication Technologies: From Theory to Applications, 2006, Damascus, Syria, pp.233-238.

DOI: 10.1109/ictta.2006.1684376

Google Scholar

[12] A. A. Zaidan, B. B. Zaidan, H. O. Alanazi, A. Gani, O. Zakaria and G. M. Alam, Novel approach for high (secure and rate) data hidden within triplex space for executable file, Science Research Essays, 5: 15 (2010), p.1965–(1977).

Google Scholar

[13] A. A. Zaidan, B. B. Zaidan, A. Y. Taqa, K. M. S. Mustafa, G. M. Alam and H. A. Jalab, Novel multi-cover steganography using remote sensing image and general recursion neural cryptosystem, International Journal of the Physical Sciences, 5: 21 (2010).

Google Scholar

[14] A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the capacity and security of steganography approaches: an overview. Journal of Applied Science, 10: 16 (2010), pp.1825-1833.

DOI: 10.3923/jas.2010.1825.1833

Google Scholar

[15] A. K. Hmood, H. A. Jalab, Z. M. Kasirun, A. A. Zaidan and B. B. Zaidan, On the accuracy of hiding information metrics: counterfeit protection for education and important certificates, International Journal of the Physical Sciences. 5: 7 (2010).

Google Scholar

[16] A. K. Hmood, B. B. Zaidan, A. A. Zaidan and H. A. Jalab, An overview on hiding information technique in images, Journal of Applied Science, 10: 18 (2010), pp.2094-2100.

DOI: 10.3923/jas.2010.2094.2100

Google Scholar

[17] B. B. Zaidan, A. A. Zaidan, A. K. Al-Frajat and H. A. Jalab, On the differences between hiding information and cryptography techniques: an Overview, Journal of Applied Science, 10: 15 (2010), pp.1650-1655.

DOI: 10.3923/jas.2010.1650.1655

Google Scholar

[18] B. B. Zaidan, A. A. Zaidan, A. Taqa, G. M. Alam, M. L. M. Kiah and H. A. Jalab, StegoMos: a secure novel approach of high rate data hidden using mosaic image and ANN-BMP cryptosystem, International Journal of the Physical Sciences 5: 11 (2010).

Google Scholar

[19] Shihab AH, Zaidan BB, Zaidan AA, Naji AW, Omar F. Accurate Method to Measure Three Dimensional Skull Bio-Metric, J. Appl. Sci., 10: 2 (2010), pp.145-150.

DOI: 10.3923/jas.2010.145.150

Google Scholar