Department of Computer systems Engineering-Scopes
Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/2178
Browse
2 results
Search Results
Publication Embargo A steganography-based fingerprint authentication mechanism to counter fake physical biometrics and trojan horse attacks(IEEE, 2021-12-06) Karunathilake, H; Shahan, A. R. M; Shamry, M. N. M; De Silva, M. W. D. S; Senarathne, A. N; Yapa, KIn the modern world, unique biometrics of every individual play a vital role in authentication processes. However, as convenient as it seems, biometrics come with their own set of drawbacks. For instance, if a passphrase is compromised (which is highly likely), changing it to a new passphrase would solve the issue. However, when someone's biometrics are compromised, there is no turning back. Simultaneously, biometric systems are often compromised due to the use of fake physical biometrics and trojan horse attacks that are capable of modifying the authentication process to fulfill a malicious user's intents. This research focuses on proposing a novel and secure authentication process that uses steganography. This “all-in-one” solution also focuses on mitigating the aforementioned drawbacks with the use of four modules, namely, the feature extraction module, the payload generation and authentication module, the fake physical biometrics countering module and the trojan horse countering module. This solution is implemented such that the idea behind it can be easily adopted to enhance the existing biometric authentication systems as well as improve the overall condition and user experience of the multi-factor authentication processes that are widely in use today.Publication Embargo Credit Card Fraud Prevention Using Blockchain(IEEE, 2021-04-02) Balagolla, E. M. S. W; Fernando, W. P. C; Rathnayake, R. M. N. S; Wijesekera, M. J. M. R. P; Senarathne, A. N; Abeywardhana, K. YWith the advancement of online payments in various products and services, the likelihood of credit card fraud has risen compared to the decades-long history of credit cards. When blockchain systems' immutability meets smart contracts, third-party removal and decentralization could be met as a high level of security. Proposed blockchain with fraud detection technology will assist to mitigate fraudulent credit card transactions due to its intermediate parties. Authors propose a solution (B-Box.com) where credit card transactions are modeled on a blockchain so that the credit card processing can be decentralized and verifiable with an accredited set of computing nodes. This solution reduces fraud due to ambiguous contracts with the use of a smart contract between the bank and the customer. Also, this project includes a scaling mechanism to blockchain because the current projects have a lack of scalability. Moreover, the solution introduces a proactive anomaly detection to detect fraudulent credit card transactions, in which the system will resist frauds before the fraudulent transaction enters the blockchain. So the proposed solution will make transparency between the banks and the end-users and at the same time prevents frauds before it happens which helps the banks to save millions in otherwise lost due to fraud.
