Corpus ID: 13155412

Banking Authentication System Using QR-code and Mobile OTP

@inproceedings{Murkute2013BankingAS,
  title={Banking Authentication System Using QR-code and Mobile OTP},
  author={Jaideep Vitthal Murkute and Hemant Nagpure and Harshal A. Kute and Neha A. Mohadikar and Chaitali Devade},
  year={2013}
}
This paper explains implementation details of online banking authentication system. Security is an important issue for online banking application which can be implemented by various internet technologies and gap between real world and virtual world can be filled up. While implementing online banking system, secure data transfer need can be fulfilled by using https data transfer and database encryption techniques for secure storage of sensitive information. To eliminate threat of phishing and to… Expand

Figures from this paper

PENERAPAN METODE SMART AUTHENTICATION DALAM LAYANAN E-BANKING MENGGUNAKAN TWO CHANNEL AUTHENTICATION DAN QR-CODE PADA PERANGKAT MOBILE ANDROID
E-banking is one of the banking service that applies technology and information which is progressing rapidly, because E-banking services on mobility and flexibility so that customers are able toExpand
Multilevel Authentication using QR code based watermarking with mobile OTP and Hadamard transformation
  • Jisha Thomas, R. Goudar
  • Computer Science
  • 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI)
  • 2018
TLDR
A hybrid mechanism with the use of Quick Response code, One Time Password, and digital watermarking-a data hiding technique to enable high security during the online transaction is proposed. Expand
E-Voting System Using QR Code and Mobile OTP Based on Android Platform for Modern Individuals
The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The e- voting promises theExpand
Confidential Data Protection Using Fingerprint Minutiae
TLDR
The security to the confidential data of the user is provided using the OTP and the Biometric Fingerprint scanner using the enrolled fingerprint in the database is authenticated to validate the user and to give him access to his own data. Expand
QR Code Integrity Verification Based on Modified SHA-1 Algorithm
TLDR
The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology and it was identified that the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. Expand
Online Voting System via Mobile
In today’s world of growing advanced mobile technologies, the traditional voting method can be changed to a newer and effective approach termed as mobile voting. The Mobile voting system provides aExpand
Turkish Folk Music Phonetic Notation System Datamatrix Characteristics/TFMPNS DC: Urfa Region Sample
Datamatrix which was developed by Japanese Denso firm in 1994 is a type of two-dimensional barcode which can be scanned with the digital camera of mobile devices. Datamatrix application which isExpand
Querying Cadastral Parcel Data Defined by Inspire Uri Model by Using Qr Code : Turkish Case Study
Together with the development of modern technology, a new communication media for accessing to the quality information has emerged. In order to access quality information faster and more practically,Expand

References

SHOWING 1-10 OF 11 REFERENCES
Online banking authentication system using mobile-OTP with QR-code
TLDR
This paper proposes a new Online Banking Authentication system which used Mobile OTP with the combination of QR-code which is a variant of the 2D barcode. Expand
HOTP: An HMAC-Based One-Time Password Algorithm
TLDR
This document describes an algorithm to generate one-time password values, based on Hashed Message Authentication Code (HMAC), which will facilitate adoption of two-factor authentication on the Internet by enabling interoperability across commercial and open-source implementations. Expand
Barcode readers using the camera device in mobile phones
TLDR
New algorithms and the implementations of image reorganization for EAN/QR barcodes in mobile phones are shown and the introduced algorithm is based on the code area found by four corners detection for 2D barcode and spiral scanning for 1D barcodes using the embedded DSP. Expand
Security and usability: the gap in real-world online banking
TLDR
It is found that many security requirements of online banking are too difficult for regular users to follow, and believe that some marketing-related messages about safety and security actually mislead users. Expand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
The QR-code reorganization in illegible snapshots taken by mobile phones
  • A. Sun, Yan Sun, Caixing Liu
  • Computer Science
  • 2007 International Conference on Computational Science and its Applications (ICCSA 2007)
  • 2007
TLDR
An algorithm for the analysis and correction of the distorted QR barcode (QR-code) image is given and a detail description on how to use inverse perspective transformation in rebuilding a QR-code image from a distorted one is given. Expand
Spatial resource analysis of two dimensional barcodes
TLDR
The study shows that compression software GZIP and BZIP2 and 2D barcode QR Code or Data Matrix display effective spatial usage and is appropriate for the application in integrity verification of hardcopy document system. Expand
Analysis of the SSL 3.0 protocol
TLDR
A number of minor flaws in the protocol and several new active attacks on SSL are presented; however, these can be easily corrected without overhauling the basic structure of the protocol. Expand
Optimisation of the SHA-2 family of hash functions on FPGAs
TLDR
A new VLSI architecture for the SHA-256 and SHA-512 hash functions is presented, which combines two popular hardware optimisation techniques, namely pipelining and unrolling, to achieve the fastest data throughputs in the literature to date. Expand
Hypertext transfer protocol
...
1
2
...