Automatic Recognition of Bank Security Card Using Smart Phone
نویسندگان
چکیده
منابع مشابه
Implement Security using smart card on Cloud
Cloud is a concept of accessing the data from their own datacenters such that the chances of eavesdropping have been reduced and storage cost is reduced. Here in this paper we are giving a brief survey of various cloud based technique implemented so far. Although there are various techniques implemented so far for the cloud computing but here we are giving a survey of not only cloud based techn...
متن کاملSmart Card Content Security
Smart Cards are often touted as “secure” portable storage devices. A complete, high-level design metodology has been proposed for embedded information systems based on smart card devices. However, this metodology takes as granted that informations stored on the card will be really securely stored, and access control will be correctly maintained. Unfortunately, standards and specifications, crea...
متن کامل: Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure
The widespread of Internet usage has resulted in a greater number and variety of applications involving different types of private information. In order to diminish privacy concerns and strengthen user trust, security improvements in terms of authentication are necessary. The solutions need to be convenient, entailing ease of use and higher mobility. The suggested approach is to make use of the...
متن کاملHuman Activity Recognition Using Smart Phone (Android)
The goal for this project is to develop an android application that tracks and notifies the following to the user: • Detect simple activities performed by the user like sitting, standing and walking. • Use only accelerometer sensor to detect activities. • Duration of each activity performed. • Quickly identify the change in activity and notify the user. Step 1: Collect data. Step 2: Collected d...
متن کاملSecurity Vulnerabilities of User Authentication Scheme Using Smart Card
With the exponential growth of Internet users, various business transactions take place over an insecure channel. To secure these transactions, authentication is the primary step that needs to be passed. To overcome the problems associated with traditional password based authentication methods, smart card authentication schemes have been widely used. However, most of these schemes are vulnerabl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Journal of the Korea Contents Association
سال: 2016
ISSN: 1598-4877
DOI: 10.5392/jkca.2016.16.12.019