Abstract: Highly Secured Net Banking System Using Fingerprinting Recognition Technology
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 5, May 2017

Highly Secured Net Banking System Using Fingerprinting Recognition Technology

Pooja Diggavi, Pooja Patil, Krupa R, Padma S.K, Sridevi Malipatil

Nowadays, the banking and financial systems have been changed due to the environment and globalization changes and competition of business services. Net banking become very popular with the general public or their availability and general user friendliness. Online banking is used to describe the banking transactions through the internet application. Web banking means user can login to his banks website by using his personal computer, smart phone or tablet etc. But one of the major problem with the internet banking is the inherent lack of security of traditional authentication techniques, passwords and passwords and pin numbers. So our system gives a solution with a fingerprint biometric of user in order to overcome from these problems.

Keywords: secure internet banking, finger print recognition and authentication, minutiae, ridger, bifurcation and photo response

Edition: Volume 6 Issue 5, May 2017

Pages: 1619 - 1621

Share this Article

How to Cite this Article?

Pooja Diggavi, Pooja Patil, Krupa R, Padma S.K, Sridevi Malipatil, "Highly Secured Net Banking System Using Fingerprinting Recognition Technology", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20173616, Volume 6 Issue 5, May 2017, 1619 - 1621

Enter Your Email Address


Similar Articles with Keyword 'minutiae'

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1974 - 1979

Implementation of Enhanced Feedback in Automated Latent Fingerprint Matcher

Lekshmi S P, Lizmol Stephen

Share this Article

Downloads: 105

Comparative Studies, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2049 - 2052

Fingerprint Compression Technique using Sparse Representation

Swapnil Raut, Nisha Wankhade

Share this Article

Similar Articles with Keyword 'secure'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1240 - 1249

Secure Methods for Supplychain Management to Protect from Attacks in Blockchain

B. Ratnakanth, K. Venkata Ramana

Share this Article

Similar Articles with Keyword 'internet'

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 720 - 724

Review on Deep Learning and IoT Techniques on Corono Virus

Mansi Kambli

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 627 - 631

A Survey based IoT Model to Maintain Social Distancing

Deepa Sonal

Share this Article

Similar Articles with Keyword 'banking'

Downloads: 105

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1478 - 1481

A Secure Protocol for SMS Mobile Banking

Amol B. Jawanjal, R. B. Joshi

Share this Article

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2313 - 2317

Enhanced Phishing Detection based on Image Differentiation

B. Jenny Jyoshna, Shaik Nyamathulla

Share this Article

Similar Articles with Keyword 'finger'

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Downloads: 93

Informative Article, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 85 - 88

CBCD Methods in Video Copy Detection

Jan Mary Thomas

Share this Article

Similar Articles with Keyword 'print'

Downloads: 9

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 68

Research Paper, Computer Science & Engineering, Congo, Volume 10 Issue 3, March 2021

Pages: 61 - 70

Contribution of an Embedded and Biometric System in a Replicated Database for Access Control in a Multi-Entry Institution

Bopatriciat Boluma Mangata, Eugene Mbuyi Mukendi, Jean-Didier Batubenga

Share this Article

Similar Articles with Keyword 'recognition'

Downloads: 108

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1375 - 1390

A Survey of Thinning Techniques on Two Dimensional Binary Images

Moumita Sarkar, Santanu Chatterjee

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 6, June 2021

Pages: 1717 - 1724

Krashi Prabhandak (Agricultural Manager)

Prafful Mundra, A V Pavan Krishna, Swarnalatha P, Venkata Sumanth Kakollu

Share this Article

Similar Articles with Keyword 'authentication'

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Downloads: 3 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top