Example of fingerprints 

Example of fingerprints 

Source publication
Article
Full-text available
Two step verification of ATM card is required to prevent the illegal access of an account. This paper describes the two step verification of account by matching the distance of the top, left, right, bottom of the human skull image. The skull of the human is captured by the pseudo 3D image capture at the ATM terminal. The feature points are calculat...

Similar publications

Article
Full-text available
The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and managing here we have tendency to are pr...

Citations

... In particular, the Design Fiction will illustrate the use of Digital Signature (DS, e.g. pin, password) [17,18], DFS [19] and Contactless Palm Vein Authentication (CPVA) [20] to authenticate (authorise) access to user identification transaction systems (UITS). The research project builds a simulation of an e-commerce application that will accept DS, DFS and CPVA access to a UITS, where in this case the UITS will be a simulated payment system, i.e. a simulation model that deploys various technology prototypes, and existing ICTs to implement the scenarios depicted in a Design Fiction [21]. ...
Chapter
Full-text available
e-Commerce has contributed immensely to the economies of developed countries and a factor in its success can be attributed to the adoption of e-commerce by their citizens. As such, it is perceived that e-commerce can also be an economic driver for developing countries. However, security has been identified as a major barrier that prevents citizens from adopting e-commerce in developing countries. Therefore, this paper examines Security Authentication Techniques (SAT), particularly Digital Signature (DS) and Digital Fingerprint Systems (DFS), including the limitations of these two security techniques, and then proposes Contactless Palm Vein Authentication (CPVA) as a potentially much better solution to increase adoption of e-commerce in developing countries. The architecture of this new CPVA technique is discussed in relation to Security, Privacy, Trust and Reliability. Participants are treated to a Design Fiction Documentary (DFD) and Design Fiction Simulation Experiment (DFSE) in our experimental design method to measure the potential Technology Acceptance (adoption) of the proposed CPVA technique over DS and DFS authentication techniques. The result of our pilot study indicates that citizens may be willing to adopt the proposed CPVA technique, which may increase their trust and likely adoption of more e-commerce applications. A larger main study is planned in the field in Nigeria starting January 2020.