CFP last date
20 December 2024
Reseach Article

Secure Transaction of Indian Currency through Biometric Technique

by Vipin Saxena, Pawan Kumar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 50
Year of Publication: 2023
Authors: Vipin Saxena, Pawan Kumar
10.5120/ijca2023922621

Vipin Saxena, Pawan Kumar . Secure Transaction of Indian Currency through Biometric Technique. International Journal of Computer Applications. 184, 50 ( Mar 2023), 22-26. DOI=10.5120/ijca2023922621

@article{ 10.5120/ijca2023922621,
author = { Vipin Saxena, Pawan Kumar },
title = { Secure Transaction of Indian Currency through Biometric Technique },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2023 },
volume = { 184 },
number = { 50 },
month = { Mar },
year = { 2023 },
issn = { 0975-8887 },
pages = { 22-26 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number50/32644-2023922621/ },
doi = { 10.5120/ijca2023922621 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:24:30.335174+05:30
%A Vipin Saxena
%A Pawan Kumar
%T Secure Transaction of Indian Currency through Biometric Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 50
%P 22-26
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the current era, every country is using the physical currency through the Automated Teller Machine (ATM), but, from the literature, it is revealed that the transaction of physical currency from the ATM is still challenging issue. Therefore, present work is an attempt for secure transaction of currency from the ATM used in the context of Indian country. In this country, ATM machine is not using the transaction of currency using biometric technique which is to be linked through the Aadhar card which is the unique identity of the Indian citizen. A concept of Unified Modeling Language (UML) is used to propose a Unified model with inclusion of biometric technique and further it is validated through the concept of Finite State Machine (FSM). Using presented model, only authorized users may use for transactions of currency.

References
  1. Kale, A. S., and Nanda, S. K. (2014), A Review Paper on Design of Highly Secured Automatic Teller Machine System by using Aadhaar card and Fingerprint, International Journal of Advance Research in Computer Science and Management Studies Research Paper, Vol. 2, pp. 320-322.
  2. Shah, D. K., Bharadi, V., Kaul, V., Amrutia, S. and Ambardekar, A. (2015), Implementing Enhanced AES for Cloud based Biometric SaaS on Raspberry Pi as a Remote Authentication Node, Proceedings of International Conference and workshop on Communication, Computing and Virtualization, Series icwccv, Vol. 2, pp. 17-22.
  3. Prasanthi, B. V., Hussain, S. M., Kanakam, P. andChakravarthy, A. S. (2015), Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions, International Journal of Computer Applications, Vol. 112, pp. 1–5, doi: 10.5120/19691-1440.
  4. Siddiqui, A. T. (2015), Biometric Authentications to Control ATM Theft, Asian Journal of Technology & Management Research, Vol. 5, no. 1.
  5. Chatterjee, P. andNath, A. (2015), Biometric Authentication for UID-based Smart and Ubiquitous Services in India,Fifth International Conference on Communication Systems and Network Technologies, pp.662-667, doi: 10.1109/CSNT.2015.195.
  6. Nelligani, B. M., Reddy, N. U. and Awasti, N. (2016), Smart ATM Security System using FPR, GSM, GPS,International Conference on Inventive Computation Technologies (ICICT),Vol. 3, pp. 1-5, doi: 10.1109/INVENTIVE.2016.7830093.
  7. Rhmann, W. and Saxena, V. (2016), Test Case Generation from UML Sequence Diagram for Aadhaar Card Number based ATM System, International Journal of Applied Information Systems, Vol. 11, no. 4, pp. 1221-1229, Test Case Generation from UML Sequence Diagram for Aadhaar Card Number based ATM System (ijais.org).
  8. Balaji, S., Reddy, M. J., Khan, H. and Mounika, K. (2017), Development of Fusion Biometric System for ATM Machines, International Journal of Mechanical Engineering and Technology, Vol. 8, no. 7, pp. 649-655.
  9. Dutta, M., Psyche, K. K., Khatun, T., Islam, M. A. and Islam, M. A. (2018), ATM Card Security using Bio-metric and Message Authentication Technology, IEEE International Conference on Computer and Communication Engineering Technology (CCET), pp. 280-285, doi: 10.1109/CCET.2018.8542227.
  10. Sudharsan, K., Kumar, V. A., Venkatesan, R., Sathyapreiya, V. andSaranya, G. (2019), Two Three Step Authentication in ATM Machine to Transfer Money and for Voting Application, Procedia Computer Science, Vol. 165, pp. 300-306, doi.org/10.1016/j.procs.2020.01.046.
  11. Sharma, R. P. and Dey, S. (2019), Two-Stage Quality Adaptive Fingerprint Image Enhancement using Fuzzy C-means Clustering Based Fingerprint Quality Analysis,  Image and Vision Computing, Vol. 83, pp. 1-16, doi.org/10.1016/j.imavis.2019.02.006.
  12. Loya, B. S. and Thithe, M. K. (2019),Aadhar Card: Benefits and Challenges in India. Think India Journal, Vol. 22(33), pp. 407-411.
  13. Balamurugan, C. R., Kumar, K. R. and Thirumalai, A. (2019), Secured Smart ATM Transaction. International Journal of Reconfigurable and Embedded Systems, Vol. 8, no.1, pp. 61-67, doi: 10.11591/ijres.v8.i1.pp61-74.
  14. Shrimandalkar, S. K., Imran, M. and Sagaran, S. I. Design and Implementation of Smart Banking System. Institute of Scholars, 2020.
  15. Ansar, S. A., Kumar, S., Khan, M. W., Yadav, A. and Khan, R. A. (2020), Enhancement of two-tier ATM Security Mechanism: Towards Providing a Real-time Solution for Network Issues,  International Journal of Advanced Computer Science and Applications, Vol. 11, no.7, doi:10.14569/IJACSA.2020.0110717.
  16. Gokul, S., Kukan, S., Meenakshi, K., Priyan, S. V., Gini, J. R. and Harikumar, M. E. (2020), Biometric Based Smart Atm using RFID. Third International Conference on Smart Systems and Inventive Technology (ICSSIT), pp. 406-411, doi: 10.1109/ICSSIT48917.2020.9214287.
  17. Kavitha, S. and Vidhya, D. (2020), Fingerprint Matching based on Fuzzy Attribution. Conference Proceedings, Vol. 2277, No. 1, pp. 090016. https://doi.org/10.1063/5.0025190.
  18. Kumar, M. N., Raghul, S., Prasad, K. N. and Kumar, P. N. (2021), Biometrically Secured ATM Vigilance System,7th International Conference on Advanced Computing and Communication Systems (ICACCS) , Vol. 1, pp. 919-922. doi: 10.1109/ICACCS51430.2021.9441975.
  19. Adleman, L. M. (1994), Molecular Computation of Solutions to Combinatorial Problems, Science, Vol. 266, no. 5187, pp. 1021-1024, doi: 10.1126/science.7973651.
  20. Prasanthi, B. V., Jyothi, U. P., Sridevi, B. and Krishna, T. V. (2014), Security Enhancement of ATM System with Fingerprint and DNA Data, International Journal of Advanced Research in Computer Science and Software Engineering,Vol. 4, no. 12, pp. 477-479.
  21. Raj, B. B., Vijay, J. F. and Mahalakshmi, T. (2016). Secure Data Transfer through DNA Cryptography using Symmetric Algorithm, International Journal of Computer Applications, vol. 133, no. 2, pp. 19-23.
  22. Pushpa, B. R. (2017), A New Technique for Data Encryption using DNA Sequence, International Conference on Intelligent Computing and Control, pp. 1-4, doi: 10.1109/I2C2.2017.8321834.
  23. Roy, M., Chakraborty, S., Mali, K., Swarnakar, R., Ghosh, K., Banerjee, A. and Chatterjee, S. (2019), Data Security Techniques based on DNA Encryption,Proceedings of International Ethical Hacking Conference 2019, Kolkata, India, vol. 1065, pp. 239-249, https://doi.org/10.1007/978-981-15-0361-0_19.
  24. Patel, S., Bharath, K. P. and Kumar, R. (2020), Symmetric Keys Image Encryption and Decryption using 3D Chaotic Maps with DNA Encoding Technique, Multimedia Tools and Applications, Vol. 79, no. 43, pp. 31739-31757, https://doi.org/10.1007/s11042-020-09551-9.
  25. Kumar, B. M., Sri, B. R. S., Katamaraju, G. M. S. A., Rani, P., Harinadh, N. and Saibabu, C. (2020, March). File encryption and decryption using DNA technology. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), pp. 382-385, Doi: 10.1109/ICIMIA48430.2020.9074970.
Index Terms

Computer Science
Information Sciences

Keywords

Aadhar card DNA Cryptography FSM UML Class Model Fingerprint