Digital Check Forgery Attacks on Client Check Truncation Systems

نویسندگان

  • Rigel Gjomemo
  • Hafiz Malik
  • Nilesh Sumb
  • V. N. Venkatakrishnan
  • Rashid Ansari
چکیده

In this paper, we present a digital check forgery attack on check processing systems used in online banking that results in check fraud. Such an attack is facilitated by multiple factors: the use of digital images to perform check transactions, advances in image processing technologies, the use of untrusted client-side devices and software, and the modalities of deposit. We note that digital check forgery attacks offer better chances of success in committing fraud when compared with conventional check forgery attacks. We discuss an instance of this attack and find several leading banks vulnerable to digital check forgery.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fusion of Multiple Biometric For Photo-Attack Detection in Face Recognition Systems

A spoofing attack is a situation in which one person successfully masquerades as another by falsifying data and gaining illegitimate access. Spoofing attacks are of several types such as photograph, video or mask. Biometrics are playing the role of a password which cannot be replaced if stolen, so there is the necessity of counter-measures to biometric spoofing attacks. Face biometric systems a...

متن کامل

Trends in the Efficiency of Federal Reserve Check Processing Operations

rules adopted in 1994 caused the number of checks processed by the Fed to fall sharply, to a low of 15.5 billion in 1995.2 Although the Fed’s processing volume rose annually between 1995 and 1999, in 1999 the Fed handled 17.1 billion checks and volume has since been declining steadily. The Monetary Control Act of 1980 requires the Federal Reserve to charge fees for providing payments services, ...

متن کامل

A Hybrid Technique for Copy-move Forgery Detection in Digital Images

With the high availability of image-editing softwares, authenticity of images is a major concern. This has led to the various forgery detection methods to check if a particular image is doctored or original. Copy-Move is a most difficult forgery to detect as the part which is pasted is taken from the same image. In this paper, a hybrid approach by combining the features of DCT (Discrete Cosine ...

متن کامل

A New Joint Compression-Watermarking Scheme using Truncation Coding

Block Truncation coding (BTC) is a technique for image compression. To divide the original image into many nonoverlapped blocks, each of which is represented by two distinct values. In traditional BTC, the two values preserve the firstand second-moment characteristics of the original block. Nowadays, most of the multimedia is compressed before it is stored. It is more appropriate to embed infor...

متن کامل

HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets

Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014