Nothing Special   »   [go: up one dir, main page]

skip to main content
article

The credit card visual authentication scheme based on GF(28) field

Published: 01 December 2015 Publication History

Abstract

Recently, with the popular use of the credit cards, credit card fraud has become a severe problem. Merchants suffer great losses from credit card fraud. In this paper, we focus on "chip and signature" card, propose a credit card visual authentication scheme to resist lost and stolen card attack and protect the benefits of merchants. Inspired from the QR decomposition, we introduce image processing techniques to credit card transactions at POS terminals in order to ensure that the payer is the real cardholder, which gives an approach for credit card authentication. Our proposed scheme combines a one-time credit card transaction number and image processing techniques without changing the cardholders' transaction habit. We use a hash function to generate a one-time credit card transaction number with the shared secret only known to the cardholder and the bank, and a mathematical method of GF(28) to solve the image problem, which will provide a math tool on image research. Analysis and comparison show that our scheme is secure in practical applications.

References

[1]
Bhatla TP, Prabhu V, Dua A (2003) Understanding credit card frauds. Cards Business Review # 2003---1. http://www.popcenter.org/problems/credit_card_fraud/PDFs/Bhatla.pdf
[2]
Card Verification Methods: PIN vs. Signature vs. None http://www.emv411.com/2012/07/13/card-verification-methods-pin-vs-signature-vs-none/. Accessed 2 Feb 2014
[3]
EMV. http://en.wikipedia.org/wiki/EMV. Accessed 15 Jan 2014
[4]
EMVCo (2011) EMV integrated circuit card specifications for payment systems (version 4.2). https://www.emvco.com/specifications.aspx?id=223. Accessed 3 Feb 2014
[5]
European Central Bank (2012) Report on card fraud. http://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201207en.pdf. Accessed 28 Jan 2014
[6]
Federal Information Processing Standards Publication 180---2 (2001) Announcing the secure hash standard
[7]
Federal Information Processing Standards Publication 197 (2001) Announcing the advanced encryption standard (AES)
[8]
Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York
[9]
Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3---10
[10]
Li X, Fan HH (2000) QR factorization based blind channel identification with second-order statistics. IEEE Trans Sig Proc 48:60---69
[11]
Li YJ, Zhang XW (2005) Securing credit card transactions with one-time payment scheme. Electron Commer Res Appl 4:413---426
[12]
Lu SY, Smolka SA (1999) Model checking the secure electronic transaction (SET) protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. College Park, Maryland, pp. 358---364
[13]
Mao W (2004) Modern cryptography: theory and practice. Publishing House of Electronics Industry, Beijing
[14]
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
[15]
Pashalidis A, Mitchell CJ (2004) Using EMV cards for single sign-on. In Proc. of First European PKI Workshop on Research and Applications - EuroPKI 2004. Samos Island, Greece, pp. 205---217
[16]
Rubin AD, Wright RN (2001) Off-line generation of limited-use credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 196---209
[17]
Shamir A (2001) Secureclick: a web payment system with disposable credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 232---242
[18]
Strang G (2009) Introduction to linear algebra, 4th edn. Wellesley-Cambridge, Wellesley
[19]
Su QT, Niu YG, Wang G, Jia SL, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219---235
[20]
Sullivan RJ (2013) The U.S. adoption of computer-chip payment cards: implications for payment fraud. Econ Rev Fed Reserv Bank Kans City 1:59---87
[21]
Watson EJ (1962) Primitive polynomials (mod 2). Math Comp 16:368---369
[22]
Weaver AC (2006) Secure sockets layer. Computer 39:88---90

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Multimedia Tools and Applications
Multimedia Tools and Applications  Volume 74, Issue 24
December 2015
863 pages

Publisher

Kluwer Academic Publishers

United States

Publication History

Published: 01 December 2015

Author Tags

  1. Authentication
  2. Binary field
  3. Credit card
  4. Image processing technique
  5. One-time credit card transaction number
  6. QR decomposition

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Nov 2024

Other Metrics

Citations

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media