Open Access Open Access  Restricted Access Subscription or Fee Access

Security System Using Steganopin

M. Preethirani, K. K. Vaishnavi, D. Monisha rajakumari, L. Gowri, E. Madura

Abstract


The main objective of the system is to develop a secure ATM in the future. In the modern world everything were computerized due to the technological development. The computerized world is full of frauds and crimes so, to reduce it we introduce a new technique. In this technique the main concept is to hide the PIN number, and also to overcome the shoulder surfing attack. The shoulder surfing attack can be done by observing the PIN entry. The shoulder surfing can be done at the distance using the binoculars and nearby using the cameras fixing on the walls etc., to avoid shoulder- surfing and for providing security we can use steganography techniques. Steganography is the technique used to concealing the message with the another message. The secret message can be hidden using the another ordinary message. In this technique the PIN entered by the user can be hidden using the steganography technique so the shoulder- surfing can be avoided.


Keywords


Authentication, Human Machine Interaction, Personalized Identification Number (PIN) Entry, Security, Shoulder-Surfing

Full Text:

PDF

References


Aman kumar, ”Advanced security system for ATM”, International journal of scientific research engineering and technology, vol-04, April 2015.

Arun kumar,”ATM security system using face recognition”, International journal of current engineering and scientific research, vol-05, 2018.

Dhane,”ATM Security system using GSM AND MEMS Sensor”, International research journal of engineering and technology, vol-04 Issue-03, May 2017.

Kumar gupta,”ATM Security using TAC, International journal of advanced research in electronics and communication engineering, vol-05, April 2016.

Sonakshi bahghat,”ATM Security using IRIS technology, International journal of engineering science and computing, vol-07, May 2017.

Taek young knon, stegano pin: two-faced human machine interface for practical enforcement of pin security, IEEE transactions human-machine systems.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.