We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
The credit card visual authentication scheme based on GF(2) field.
- Authors
Wang, Feng; Chang, Chin-Chen; Lyu, Wan-Li
- Abstract
Recently, with the popular use of the credit cards, credit card fraud has become a severe problem. Merchants suffer great losses from credit card fraud. In this paper, we focus on 'chip and signature' card, propose a credit card visual authentication scheme to resist lost and stolen card attack and protect the benefits of merchants. Inspired from the QR decomposition, we introduce image processing techniques to credit card transactions at POS terminals in order to ensure that the payer is the real cardholder, which gives an approach for credit card authentication. Our proposed scheme combines a one-time credit card transaction number and image processing techniques without changing the cardholders' transaction habit. We use a hash function to generate a one-time credit card transaction number with the shared secret only known to the cardholder and the bank, and a mathematical method of GF(2) to solve the image problem, which will provide a math tool on image research. Analysis and comparison show that our scheme is secure in practical applications.
- Subjects
COMPUTER access control; CREDIT cards; IMAGE processing; CREDIT card fraud; DIGITAL signatures
- Publication
Multimedia Tools & Applications, 2015, Vol 74, Issue 24, p11451
- ISSN
1380-7501
- Publication type
Article
- DOI
10.1007/s11042-014-2238-1