Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
2
Page No.
243 - 254
Enhancing Secure Transaction and User Authentication Method Based on Fingerprint Mechanism Using Fuzzy Logic Amalgam Encryption for PIN Distribution Process in M-Commerce
Authors :
B. Vanathi,
K. Shanmugam
and
V. Rhymend Uthariaraj
References
Belkhede, M., V. Gulhane and P. Bajaj, 2012. Biometric mechanism for enhanced security of online transaction on android system: A design approach. Proceedings of the 2012 14th International Conference on Advanced Communication Technology (ICACT), Feburary 19-22, 2012, IEEE, PyeongChang, pp: 1193-1197.
Gao, J., V. Kulkarni, H. Ranavat, L. Chang and H. Mei, 2009. A 2D barcode-based mobile payment system. Proceedings of the MUE'09. Third International Conference on Multimedia and Ubiquitous Engineering, 2009, June 4-6, 2009, IEEE, Qingdao, China, pp: 320-329.
Nambiar, S., C.T. Lu and L.R. Liang, 2004. Analysis of payment transaction security in mobile commerce. Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI 2004, November 8-10, 2004, IEEE, New Jersy, USA., pp: 475-480.
Pawar, P.Y. and S.H. Gawande, 2012. M-Commerce security using random LSB steganography and cryptography. Int. J. Machine Learn. Comput., 212: 427-430.
Direct Link | Rajanna, U., A. Erol and G. Bebis, 2010. A comparative study on feature extraction for fingerprint classification and performance improvements using rank-level fusion. Pattern Anal. Appl., 13: 263-272.
CrossRef | Direct Link | Sanyal, S., A. Tiwari and S. Sanyal, 2010. A Multifactor Secure Authentication System for Wireless Payment. In: Emergent Web Intelligence: Advanced Information Retrieval. Chbeir, R., Y. Badr, A. Abraham and A.E. Hassanien (Eds.). Springer London, England, pp: 341 369.
Shanmugam, K. and B. Vanathi, 2014. Enhancing secure transaction and identity authentication in m-commerce. Int. J. Adv. Sci. Eng. Technol., 1: 2321-9009.
Shanmugam, K. and B. Vanathi, 2014. Fuzzy logic implementation of fingerprint mechanism for secure transaction and identity authentication in m-commerce. Int. J. Recent Adv. Eng. Technol., 2: 2347-2812.
Weerasinghe, T.D.B., 2012. Secrecy and performance analysis of symmetric key encryption algorithms. Int. J. Inf. Net. Secur., 1: 77-87.
Direct Link |