iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.1007/s11042-014-2238-1
The credit card visual authentication scheme based on GF(28) field | Multimedia Tools and Applications Skip to main content
Log in

The credit card visual authentication scheme based on GF(28) field

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Recently, with the popular use of the credit cards, credit card fraud has become a severe problem. Merchants suffer great losses from credit card fraud. In this paper, we focus on “chip and signature” card, propose a credit card visual authentication scheme to resist lost and stolen card attack and protect the benefits of merchants. Inspired from the QR decomposition, we introduce image processing techniques to credit card transactions at POS terminals in order to ensure that the payer is the real cardholder, which gives an approach for credit card authentication. Our proposed scheme combines a one-time credit card transaction number and image processing techniques without changing the cardholders’ transaction habit. We use a hash function to generate a one-time credit card transaction number with the shared secret only known to the cardholder and the bank, and a mathematical method of GF(28) to solve the image problem, which will provide a math tool on image research. Analysis and comparison show that our scheme is secure in practical applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Bhatla TP, Prabhu V, Dua A (2003) Understanding credit card frauds. Cards Business Review # 2003–1. http://www.popcenter.org/problems/credit_card_fraud/PDFs/Bhatla.pdf

  2. Card Verification Methods: PIN vs. Signature vs. None http://www.emv411.com/2012/07/13/card-verification-methods-pin-vs-signature-vs-none/. Accessed 2 Feb 2014

  3. EMV. http://en.wikipedia.org/wiki/EMV. Accessed 15 Jan 2014

  4. EMVCo (2011) EMV integrated circuit card specifications for payment systems (version 4.2). https://www.emvco.com/specifications.aspx?id=223. Accessed 3 Feb 2014

  5. European Central Bank (2012) Report on card fraud. http://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201207en.pdf. Accessed 28 Jan 2014

  6. Federal Information Processing Standards Publication 180–2 (2001) Announcing the secure hash standard

  7. Federal Information Processing Standards Publication 197 (2001) Announcing the advanced encryption standard (AES)

  8. Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York

    MATH  Google Scholar 

  9. Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10

    Article  Google Scholar 

  10. Li X, Fan HH (2000) QR factorization based blind channel identification with second-order statistics. IEEE Trans Sig Proc 48:60–69

    Article  MATH  Google Scholar 

  11. Li YJ, Zhang XW (2005) Securing credit card transactions with one-time payment scheme. Electron Commer Res Appl 4:413–426

    Article  Google Scholar 

  12. Lu SY, Smolka SA (1999) Model checking the secure electronic transaction (SET) protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. College Park, Maryland, pp. 358–364

  13. Mao W (2004) Modern cryptography: theory and practice. Publishing House of Electronics Industry, Beijing

    Google Scholar 

  14. Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton

    Book  Google Scholar 

  15. Pashalidis A, Mitchell CJ (2004) Using EMV cards for single sign-on. In Proc. of First European PKI Workshop on Research and Applications - EuroPKI 2004. Samos Island, Greece, pp. 205–217

  16. Rubin AD, Wright RN (2001) Off-line generation of limited-use credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 196–209

  17. Shamir A (2001) Secureclick: a web payment system with disposable credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 232–242

  18. Strang G (2009) Introduction to linear algebra, 4th edn. Wellesley-Cambridge, Wellesley

    Google Scholar 

  19. Su QT, Niu YG, Wang G, Jia SL, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235

    Article  Google Scholar 

  20. Sullivan RJ (2013) The U.S. adoption of computer-chip payment cards: implications for payment fraud. Econ Rev Fed Reserv Bank Kans City 1:59–87

    Google Scholar 

  21. Watson EJ (1962) Primitive polynomials (mod 2). Math Comp 16:368–369

    MATH  MathSciNet  Google Scholar 

  22. Weaver AC (2006) Secure sockets layer. Computer 39:88–90

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Feng Wang or Chin-Chen Chang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, F., Chang, CC. & Lyu, WL. The credit card visual authentication scheme based on GF(28) field. Multimed Tools Appl 74, 11451–11465 (2015). https://doi.org/10.1007/s11042-014-2238-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-014-2238-1

Keywords

Navigation