Abstract
Recently, with the popular use of the credit cards, credit card fraud has become a severe problem. Merchants suffer great losses from credit card fraud. In this paper, we focus on “chip and signature” card, propose a credit card visual authentication scheme to resist lost and stolen card attack and protect the benefits of merchants. Inspired from the QR decomposition, we introduce image processing techniques to credit card transactions at POS terminals in order to ensure that the payer is the real cardholder, which gives an approach for credit card authentication. Our proposed scheme combines a one-time credit card transaction number and image processing techniques without changing the cardholders’ transaction habit. We use a hash function to generate a one-time credit card transaction number with the shared secret only known to the cardholder and the bank, and a mathematical method of GF(28) to solve the image problem, which will provide a math tool on image research. Analysis and comparison show that our scheme is secure in practical applications.
Similar content being viewed by others
References
Bhatla TP, Prabhu V, Dua A (2003) Understanding credit card frauds. Cards Business Review # 2003–1. http://www.popcenter.org/problems/credit_card_fraud/PDFs/Bhatla.pdf
Card Verification Methods: PIN vs. Signature vs. None http://www.emv411.com/2012/07/13/card-verification-methods-pin-vs-signature-vs-none/. Accessed 2 Feb 2014
EMV. http://en.wikipedia.org/wiki/EMV. Accessed 15 Jan 2014
EMVCo (2011) EMV integrated circuit card specifications for payment systems (version 4.2). https://www.emvco.com/specifications.aspx?id=223. Accessed 3 Feb 2014
European Central Bank (2012) Report on card fraud. http://www.ecb.europa.eu/pub/pdf/other/cardfraudreport201207en.pdf. Accessed 28 Jan 2014
Federal Information Processing Standards Publication 180–2 (2001) Announcing the secure hash standard
Federal Information Processing Standards Publication 197 (2001) Announcing the advanced encryption standard (AES)
Hankerson D, Menezes A, Vanstone S (2004) Guide to elliptic curve cryptography. Springer, New York
Li CT (2013) A new password authentication and user anonymity scheme based on elliptic curve cryptography and smart card. IET Inf Secur 7:3–10
Li X, Fan HH (2000) QR factorization based blind channel identification with second-order statistics. IEEE Trans Sig Proc 48:60–69
Li YJ, Zhang XW (2005) Securing credit card transactions with one-time payment scheme. Electron Commer Res Appl 4:413–426
Lu SY, Smolka SA (1999) Model checking the secure electronic transaction (SET) protocol. In: Proc. of 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. College Park, Maryland, pp. 358–364
Mao W (2004) Modern cryptography: theory and practice. Publishing House of Electronics Industry, Beijing
Menezes AJ, van Oorschot PC, Vanstone SA (1996) Handbook of applied cryptography. CRC Press, Boca Raton
Pashalidis A, Mitchell CJ (2004) Using EMV cards for single sign-on. In Proc. of First European PKI Workshop on Research and Applications - EuroPKI 2004. Samos Island, Greece, pp. 205–217
Rubin AD, Wright RN (2001) Off-line generation of limited-use credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 196–209
Shamir A (2001) Secureclick: a web payment system with disposable credit card numbers. In: Proc. of 5th International Conference on Financial Cryptography. Grand Cayman, British West Indies, pp. 232–242
Strang G (2009) Introduction to linear algebra, 4th edn. Wellesley-Cambridge, Wellesley
Su QT, Niu YG, Wang G, Jia SL, Yue J (2014) Color image blind watermarking scheme based on QR decomposition. Signal Process 94:219–235
Sullivan RJ (2013) The U.S. adoption of computer-chip payment cards: implications for payment fraud. Econ Rev Fed Reserv Bank Kans City 1:59–87
Watson EJ (1962) Primitive polynomials (mod 2). Math Comp 16:368–369
Weaver AC (2006) Secure sockets layer. Computer 39:88–90
Author information
Authors and Affiliations
Corresponding authors
Rights and permissions
About this article
Cite this article
Wang, F., Chang, CC. & Lyu, WL. The credit card visual authentication scheme based on GF(28) field. Multimed Tools Appl 74, 11451–11465 (2015). https://doi.org/10.1007/s11042-014-2238-1
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2238-1