Open Access Open Access  Restricted Access Subscription or Fee Access

Transaction Fraud Detection Using Face Authentication and Invisible Virtual Keyboard

Paras Patil, Namita Velgekar, Ranjana Tondare, Soumya Jobali, Zarina Shaikh

Abstract


With the popularization of on-line trying, dealing’s fraud is growing seriously. The study on fraud detection is attention-grabbing and vital. A significant manner of police investigation fraud is to extract the behavior profiles (BPs) of users supported their historical dealing’s records, thus to verify if associate degree incoming dealing is also fraud or not ocular of their bits per second. Markov process model’s unit widespread to represent bits per second of users, that’s effective for those users whose dealing’s behaviors unit stable relatively. Here the system tends to area unit able to realize Face by Viola-Jones and LBP acknowledge formula for face detection as the system tends to use shuffled keyword sequence for authentication of OTP, the keyword sequence modification once. The system has got an inclination to also track fraud users with location by mackintosh address of the user laptop or computer that has last dealing’s success. Besides, the system has got an inclination to stipulate a state transition likelihood matrix to capture temporal choices of transactions of a user. Consequently, the system tends to area unit able to construct a BP for each user thus uses it to verify if associate degree incoming dealings are also fraud or not.

Keywords


Behavior profile, e-commerce security, Face detection, Shuffled Keyboard Sequence

Full Text:

PDF

References


Singh R, Kaur M. Face Recognition and Detection using Viola-Jones and Cross Correlation Method. International Journal of Science and Research (IJSR). 2015 Jan;4(1).

Dang K, Sharma S. Review and comparison of face detection algorithms. 2017 7th International Conference on Cloud Computing, Data Science & Engineering- Confluence 2017 Jan 12 (pp. 629– 633). IEEE.

Guo Y, Cai J, Jiang B, Zheng J. Cnn- based real-time dense face reconstruction with inverse-rendered photo-realistic face images. IEEE transactions on pattern analysis and machine intelligence. 2018 May 17;41(6):1294–307.

Shweta Jamkavale, Ashwini Kute, Rupali Pawar, Komal Jamkavale4,PrashantJawalkar,Secure Transaction by Using Wireless Password with Shuffling Keypad, IJRASET Volume 4 Issue X, October 2016

Zhang Z, Chen X, Wang B, Hu G, Zuo W, Hancock ER. Face frontalization using an appearance- flow-based convolutional neural network. IEEE Transactions on Image Processing. 2018 Nov 28;28(5):2187–99.

Azaria A, Richardson A, Kraus S, Subrahmanian VS. Behavioral analysis of insider threat: A survey and bootstrapped prediction in imbalanced data. IEEE Transactions on Computational Social Systems. 2014 Jun;1(2):135–55.

Bhusari V, Patil S. Application of hidden Markov model in credit card fraud detection. International Journal of Distributed and Parallel Systems. 2011 Nov 1;2(6):203.

Brause R, Langsdorf T, Hepp M. Neural data mining for credit card fraud detection. Proceedings 11th International Conference on Tools with Artificial Intelligence 1999 Nov 9 (pp. 103–106). IEEE.

T. Carter, An Introduction to Information Theory and Entropy, S. Fe, Eds. CiteSeer, 2007.

Chen RC, Luo ST, Liang X, Lee VC. Personalized approach based on SVM and ANN for detecting credit card fraud. 2005 International Conference on Neural Networks and Brain 2005 Oct 13 (Vol. 2, pp. 810– 815). IEEE.

Cortes C, Pregibon D. Signature- based methods for data streams. Data Mining and Knowledge Discovery. 2001 Jul 1;5(3):167–82.

Dheepa V, Dhanapal R. Behavior based credit card fraud detection using support vector machines. ICTACT Journal on Soft computing. 2012 Jul;2(07):2012.

Fashoto SG, Owolabi O, Adeleye O, Wandera J. Hybrid methods for credit card fraud detection using K-means clustering with hidden Markov model and multilayer perceptron algorithm. Current Journal of Applied Science and Technology. 2016:1–1.

Global Online Payment Methods: Full Year 2016, GmbH & Co. K G, Berlin, Germany, Mar. 2016.

Gordon S, Ford R. On the definition and classification of cybercrime. Journal in Computer Virology. 2006 Aug 1;2(1):13–20.

Quah JT, Sriganesh M. Real-time credit card fraud detection using computational intelligence. Expert systems with applications. 2008 Nov 1;35(4):1721–32.

Adams NM, Hand DJ, Montana G, Weston DJ, Whitrow CW. Fraud detection in consumer credit. Expert. 2006;9(1):21.


Refbacks

  • There are currently no refbacks.