Biometrics in Secure E-Transactions
Biometrics in Secure E-Transactions
Customer id,
Amount &
Biometric Data
Customer
Orders with
Amount request and Customer id
subsequent sanction
Retailer
7. VOICE RECOGNITION:
The speaker-specific
characteristics of speech are due to
difference in physiological and
behavioral aspects of the speech
production system in humans. The
main physiological aspect of the
human speech production system is the
vocal tract shape. The vocal tract
modifies the spectral content of an
acoustic wave as it passes through it,
thereby producing speech. Therefore, it
is common in speaker verification
systems to make use of features
derived only from the vocal tract.
The microphone in the
mobile phone captures the speech.
Then, using cepstral analysis, an
utterance may be represented as a
sequence of feature vectors. We recorded a person saying the letter
Utterances, spoken by the same person ‘a’ directly into a sound recorder and
but at difference times, result in similar plotted the graph1. This was
yet a different sequence of features simultaneously recorded in a tape
vectors. So, the irrespective of the recorder and
mood of the consumer, his transaction Graph2 was plotted. The above graph
is accepted or rejected. The following shows some minute differences which
algorithm may be used in voice prove that this system cannot be fooled
verification. by imitation.
Identity claim
Minutiae
Database browser Extractor
Extractor
Image acquisition Cepstral analysis
Module
Template Database
Cepstral HMM
Speech acquisition Analyzer Scoring
module
VERFICATION MODULE
fingerprints are classified as whorl,
right loop, left loop, arch, and arch.
Recently researchers and scientists
achieved a great feat by improving the
fingerprint classification to 94%.
In today’s world,
fingerprint matching techniques can be
placed into two categories: minutiae-
based and correlation based. In
minutiae based technique, the minutiae
As every mobile phone have an in- points are found and their relative
built microphone and some have video placement are mapped on the finger
camera, the need for an extra hardware whereas in correlation based technique,
for the speech and image acquisition is the fingerprint acquired from the
eliminated. A proposal for the display person is checked for certain points
screen to act as a fingerprint previously stored in the database. If
acquisition is dealt later. both matches, the person is given
authentication, else he is denied
8. FINGERPRINT ACQUISITION: permission.
Finger based scanning
is one of the oldest methods used for
verification. Fingerprints, unique and
immunable for all are made of series of
ridges and furrows on the surface of
the finger. These ridges and furrows
determine the uniqueness of the
fingerprints. Apart from these, minute
points (i.e. local ridge characteristics
that occur at either a ridge bifurcation
or a ridge ending also play role in fool-
proofing this biometric technique.
Transaction scanner embedded
To reduce the search time and the
above display screen
computational complexity, fingerprint
classification is undertaken and thus
The scanner here is a
transparent layer above the screen. The
scanner consists of arrays of capacitors
of the size of 0.03m. capacitors with
such a small size can be manufactured
with MEMS technology. When the
consumer places his thumb on the
scanner, the points at which his
fingerprint touches the screen get
discharged whereas others remain
charged. Thus the fingerprint is
scanned and is then sent for further
process
9.CONCLUSION:
Thus, this mobile multi-
biometrics can be embedded in mobile
phone. Phone is cost effective since no
special hardware in required and is
highly secured. Thus, this mobile
phone becomes a reality will provide
more e-Business and
E-Transactions
.
10.REFERENCES:
1)”Biometrics” by Samir Nanavathi,
Dreamtech Wiley Publications.
2)”Biometrics made easy for you” by
John walker.
3)”Science and Technology” a
supplementary of “The HINDU”