0% found this document useful (0 votes)
165 views

Transaction Authentication Using Face and OTP Verification

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020,Pdf Url :https://www.ijtsrd.com/papers/ijtsrd30952.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30952/transaction-authentication-using-face-and-otp-verification/pratyay-mukherjee

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
165 views

Transaction Authentication Using Face and OTP Verification

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020,Pdf Url :https://www.ijtsrd.com/papers/ijtsrd30952.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/30952/transaction-authentication-using-face-and-otp-verification/pratyay-mukherjee

Uploaded by

Editor IJTSRD
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

International Journal of Trend in Scientific Research and Development (IJTSRD)

Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470

Transaction Authentication using Face and OTP Verification


Pratyay Mukherjee1, Dr. Lakshmi JVN2
1MCA
Student, 2Lecturer,
1,2Department of Computer Science & IT-MCA, Jain University, Bangalore, India

ABSTRACT How to cite this paper: Pratyay


In face authentication system we authenticate a user using one’s face and OTP Mukherjee | Dr. Lakshmi JVN "Transaction
received through mobile communication services this is a two layered Authentication using Face and OTP
authentication system where first the face of the user is verified using Verification"
traditional face structure authentication then when the authentication process Published in
is complete the service provider will send a onetime password to the user International Journal
mobile number which has to be entered to complete the process. of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456- IJTSRD30952
6470, Volume-4 |
Issue-4, June 2020, pp.272-273, URL:
www.ijtsrd.com/papers/ijtsrd30952.pdf

Copyright © 2020 by author(s) and


International Journal of Trend in Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION Proposed System:
All online transaction and login using browser or android By using two-layer verification system we are trying to
application are done after authenticating the user identity secure the user authenticity and increase the security as in
using OTP verification within a time session, but it can still normal verification which is in current use has only one lair
be bypass if the user’s mobile device is in possession of the of security. So, by implementing facial verification before
attacker as they will have access to it. So, to solve this OTP verification it confirms the identity of the person
problem we are adding facial verification as an extra security initiating the transaction.
layer after which the OTP verification will be done in a given
time session, if not verified within that time session the Architecture:
whole transaction or the login will be terminated. As the This gateway will be triggered when the payment gateway
transaction and the login process has facial verification the will be called, when the payment is initiated the front facing
authentication process may get slow compared to normal camera of the phone will start capturing the face of the
OTP authentication but the security level will be way higher person initiating the transaction which will be verified using
that a normal OTP authentication. the mobile database sample

Motivation:
As mobile devices can be hacked in many ways and if anyone
has access to our phone, they can easily initiate a transaction
and authenticate it without our permission.
 Misuse of one’s phone by friends
 Mobile device highjacked by an attacker illegally
 Unlocked mobile device

Existing system:
Currently there is a use of simple OTP authentication before
a transaction in which the transaction is authenticated using
One Time Password. In this a OTP is generated from the One
Time Password generator from the bank side, which is then
send to the mobile device through SMS services which is Algorithm:
then entered in transaction gateway to confirm the PRINCIPAL COMPONENT ANALYSIS (PCA) Principal
transaction. Component Analysis (or Karhunen-Loeve expansion) is a

@ IJTSRD | Unique Paper ID – IJTSRD30952 | Volume – 4 | Issue – 4 | May-June 2020 Page 272
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
suitable strategy for face recognition because it identifies Systems”, IEEE TRANSACTIONS ON INDUSTRIAL
variability between human faces, which may not be INFORMATICS, VOL. 9, NO. 1, FEBRUARY 2013
immediately obvious. Principal Component Analysis
[5] Mr. Mayur Patil, Mr. Vijay Pimplodkar, Ms. Anuja R.
(hereafter PCA) does not attempt to categorise faces using
Zade, Mr. Vinit Vibhute, Mr. Ratnakar Ghadge, “A
familiar geometrical differences, such as nose length or
Survey on Voting System Techniques”, International
eyebrow width. Instead, a set of human faces is analysed
Journal of Advanced Research in Computer Science and
using PCA to determine which 'variables' account for the
Software Engineering, Volume 3, Issue 1, January 2013
variance of faces. In face recognition, these variables are
ISSN: 2277 128X.
called eigen faces because when plotted they display an eerie
resemblance to human faces. Although PCA is used [6] Trisha Patel, Maitri Chokshi, Nikhil Shah, “Smart Device
extensively in statistical analysis, the pattern recognition Based Election Voting System Endorsed through Face
community started to use PCA for classification only Recognition”, International Journal of Advance
relatively recently. As described by Johnson and Wichern Research in Computer Science and Software
(1992), 'principal component analysis is concerned with Engineering, Volume 3, Issue 11, November 2013 ISSN:
explaining the variance- covariance structure through a few 2277 128X.
linear combinations of the original variables.' Perhaps PCA's
[7] Hari K. Prasad, J. Alex Haldermany, Rop Gonggrijp,
greatest strengths are in its ability for data reduction and
Scott Wolchoky, Eric Wustrowy, Arun Kankipati, Sai
interpretation. For example a 100x100 pixel area containing
Krishna Sakhamuri, Vasavya Yagati, “Security Analysis
a face can be very accurately represented by just 40 eigen
of India’s Electronic Voting Machines”, April 29, 2010.
values. Each eigen value describes the magnitude of each
eigen face in each image. Furthermore, all interpretation (i.e. [8] Ganapatikrishna P. Hegde1, M. Seetha2, “Real Time
recognition) operations can now be done using just the 40 Voting System Using Face Recognition for Different
eigen values to represent a face instead of the manipulating Expressions and Pose Variations”, IJRET: International
the 10000 values contained in a 100x100 image. Not only is Journal of Research in Engineering and Technology,
this computationally less demanding but the fact that the eISSN: 2319-1163 | pISSN: 23217308.
recognition information of several thousand.
[9] K. P. Kaliyamurthie, R. Udayakumar, D. Parameswari
and S. N. Mugunthan, “Highly Secured Online Voting
Reference
System over Network”, Indian Journal of Science and
[1] Hemlata Sahu, Anupam Choudhray, “Polling System
Technology.
Using GSM Facility”, International Journal of Scientific
& Engineering Research Volume 2, Issue 10, Oct-2011 1 [10] VINAY HIREMATH, ASHWINI MAYAKAR, “FACE
ISSN 2229-5518. RECOGNITION USING EIGENFACE APPROACH”.
[2] Gomathi. B, Veena priyadarshini. S, “Modernized Voting [11] S. Ravi, S. Wilson, “Face Detection with Facial Features
Machine using Finger Print Recognition”, International and Gender Classification Based On Support Vector
Journal of Scientific & Engineering Research, Volume 4, Machine”, 2010 Special Issue - International Journal of
Issue 5, May2013 156 ISSN 2229- 5518. Imaging Science and Engineering.
[3] Dr. Aree Ali Mohammed, Ramyar Abdolrahman [12] Sanjay Kumar, Manpreet Singh, “Design a Secure
Timour, “Efficient E-voting Android Based System”, Electronic Voting System Using Fingerprint
International Journal of Advanced Research in Technique”, IJCSI International Journal of Computer
Computer Science and Software Engineering, Volume 3, Science Issues, Vol. 10, Issue 4, No 1, July 2013.
Issue 11, November 2013 ISSN: 2277 128X.
[13] Sheifali Gupta, O. P. Sahoo, Ajay Goel, Rupesh Gupta, “A
[4] Feng-Li Lian, Yi-Chun Lin, Chien-Ting Kuo, and Jong- New Optimized Approach to Face Recognition Using
Hann Jean, “Voting-Based Motion Estimation for Real- Eigen Faces”, Global Journal of Computer Science and
Time Video Transmission in Networked Mobile Camera Technology Vol. 10 Issue 1, April 2010.

@ IJTSRD | Unique Paper ID – IJTSRD30952 | Volume – 4 | Issue – 4 | May-June 2020 Page 273

You might also like