Digital Check Forgery Attacks on Client Check Truncation Systems
نویسندگان
چکیده
In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital check forgery attacks offer better chances of success in committing fraud when compared with conventional check forgery attacks. We discuss an instance of this attack and find several leading banks vulnerable to digital check forgery.
منابع مشابه
Fusion of Multiple Biometric For Photo-Attack Detection in Face Recognition Systems
A spoofing attack is a situation in which one person successfully masquerades as another by falsifying data and gaining illegitimate access. Spoofing attacks are of several types such as photograph, video or mask. Biometrics are playing the role of a password which cannot be replaced if stolen, so there is the necessity of counter-measures to biometric spoofing attacks. Face biometric systems a...
متن کاملTrends in the Efficiency of Federal Reserve Check Processing Operations
rules adopted in 1994 caused the number of checks processed by the Fed to fall sharply, to a low of 15.5 billion in 1995.2 Although the Fed’s processing volume rose annually between 1995 and 1999, in 1999 the Fed handled 17.1 billion checks and volume has since been declining steadily. The Monetary Control Act of 1980 requires the Federal Reserve to charge fees for providing payments services, ...
متن کاملA Hybrid Technique for Copy-move Forgery Detection in Digital Images
With the high availability of image-editing softwares, authenticity of images is a major concern. This has led to the various forgery detection methods to check if a particular image is doctored or original. Copy-Move is a most difficult forgery to detect as the part which is pasted is taken from the same image. In this paper, a hybrid approach by combining the features of DCT (Discrete Cosine ...
متن کاملA New Joint Compression-Watermarking Scheme using Truncation Coding
Block Truncation coding (BTC) is a technique for image compression. To divide the original image into many nonoverlapped blocks, each of which is represented by two distinct values. In traditional BTC, the two values preserve the firstand second-moment characteristics of the original block. Nowadays, most of the multimedia is compressed before it is stored. It is more appropriate to embed infor...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کامل