Security System based on QR Code with Iris Recognition

Now a day’s security is inevitable in each aspect. There are some existing systems like smart cards, biometric etc. but they are vulnerable. These smart cards are meant to be carried and presented accordingly. Thus the user is entrusted with a responsibility of caring for the card. In biometric like fingerprint scanner, injury to the fingers of the user may result in the failure of the system. In retina scanning systems, if user suffers from diseases like cataract, diabetes then it causes slight deformation in retina, resulting to the failure of the system. By considering above flaws in systems the level of security is increased in the proposed system by using QR Code with Iris recognition. QR-Code is portable and can be used securely in untrusted computers. QR-Code is extremely secure as all the sensitive data stored and transmitted is encrypted, but it is also easy to use and cost-efficient solution. Iris doesn’t get affected throughout the life of human being. By understanding the vulnerability of the existing system, a new two level security system is proposed. This system takes the best suitable characteristics of both iris and QR code; this enhances the isolation of the system.

[1]  Hyotaek Lim,et al.  Online banking authentication system using mobile-OTP with QR-code , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[2]  David Argles,et al.  An Anti-Phishing mechanism for single sign-on based on QR-code , 2011, International Conference on Information Society (i-Society 2011).

[3]  S Sophia,et al.  Security System Based on Iris Recognition , 2013 .

[4]  David Pintor Maestre QRP: An improved secure authentication method using QR codes , 2012 .

[5]  Jaesik Lee,et al.  Secure quick response-payment(QR-Pay) system using mobile device , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[6]  Lorenz Froihofer,et al.  QR-TAN: Secure Mobile Transaction Authentication , 2009, 2009 International Conference on Availability, Reliability and Security.

[7]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[8]  Edgar R. Weippl,et al.  QR Code Security: A Survey of Attacks and Challenges for Usable Security , 2014, HCI.

[9]  Wei-Hsun Lee,et al.  A Novel User Authentication Scheme Based on QR-Code , 2010, J. Networks.

[10]  A. Porter Phishing on Mobile Devices , 2011 .

[11]  Dimitri do B. DeFigueiredo,et al.  The Case for Mobile Two-Factor Authentication , 2011, IEEE Security & Privacy.

[12]  Helena Rifà-Pous A Secure Mobile-Based Authentication System for e-Banking , 2009, OTM Conferences.