E-CHEQUE: Re-Defined Era for Financial Transactions

Authors

  • Sithma Tilakaratne Undergraduate Student, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka
  • Pasindu Jayasuriya Undergraduate Student, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka
  • Shuhaib Riyaj Undergraduate Student, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka
  • Maleesha Rodrigo Undergraduate Student, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka
  • Kanishka Yapa Msc, Lecturer, Department of Information Security Engineering, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka, Msc, Industry Engagement Unit, Department of Information Security Engineering, Sri Lanka Institute of Information Technology Malabe Campus, Malabe, 10115 Sri Lanka
  • Amila Senaratne

Keywords:

E-cheque, money, compliance, paper, public key encryption, QR Code, Password, Dynamic

Abstract

Cheques are used to transfer money from one party to another, has the potential to capture a massive amount of financial value but on the other hand is a piece of paper which can be tarnished and torn into pieces and is fragile. The main objective is to create a E-Cheque application, where the mentioned issues will be eradicated by simply digitizing the cheque. Using an E-Cheque would raise a handful of security questions but utilizing the help of four security technologies these problems are minimized. The approach for dynamic password generation is to generate a password which would be resistant to a selected cyber security attack and would be a key-helping hand to remember the password. Secondly, with the use of OTP together with Voice Biometrics, where an OTP would be used as the first level of security and voice biometrics as the second level to increase security. To cover the compliance point of view, a comprehensive compliance policy is created hence applied to the application. Finally, QR Code generation which is generated with a E-cheque details received from user, then encrypted to generate the QR code and transferred through a chat socket where digital signature will be mandatory to transfer the QR based E-cheque, and therefore when all components are paired together creating a world security standard E-Cheque application.  

References

U. H. H. S. S. D. H. D. W. W. D. D. L.S.Y. Dehigaspege, "Secure Authentication: Defending Social Networks from Cyber Attacks Using Voice Recognition," vol. 06, no. 10, pp. 120-124, 2016.

P. S. Ruby Shukla, "E-Banking : Problems and Prospects," E-Banking : Problems and Prospects, vol. 01, no. 01, pp. 23-25, 2011.

M. H. &. E. Weippl, "QR Code Security: A Survey of Attacks and Challenges for Usable Security," [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-07620-1_8.

B. D. P. J. Y. &. K. N. B. P. Kiran, "Offline Signature Recognition Using Image Processing Techniques and Back Propagation Neuron Network System," [Online]. Available: https://link.springer.com/article/10.1007/s42979-021-00591-y#:~:text=Preprocessing%20of%20signature%20can%20be,to%20reduce%20the%20processing%20time.

G. Peru, "Password Statistics in 2022 – How to Save & Protect Your Data," 13 March 2022. [Online]. Available: https://webhostingprof.com/blog/password-statistics/. [Accessed 30 June 2022].

"Average Business User Has 191 Passwords," 6 November 2017. [Online]. Available: https://www.securitymagazine.com/articles/88475-average-business-user-has-191-passwords.

IBM, "Decision Trees," [Online]. Available: https://www.ibm.com/topics/decision-trees. [Accessed 30 June 2022].

J. M. Lowery, "MD5 vs SHA-1 vs SHA-2 - Which is the Most Secure Encryption Hash and How to Check Them," 26 March 2020. [Online]. Available: https://www.freecodecamp.org/news/md5-vs-sha-1-vs-sha-2-which-is-the-most-secure-encryption-hash-and-how-to-check-them/#:~:text=Probably%20the%20one%20most%20commonly%20used%20is%20SHA-256%2C,considerably%20more%20secure%20than%20either%20MD5%20or%20SHA-1. [Accessed 30 June 2022].

S. T, "Entropy: How Decision Trees Make Decisions," 11 January 2019. [Online]. Available: https://towardsdatascience.com/entropy-how-decision-trees-make-decisions-2946b9c18c8. [Accessed 30 June 2022].

CBSL, "Central Bank Of Sri Lanka," 01 2020. [Online]. Available: https://www.cbsl.gov.lk/sites/default/files/cbslweb_documents/laws/cdg/psd_guideline_no_1_of_2020_e.pdf. [Accessed 28 06 2022].

J.-P. C. Hao Chen, "Security Testing and Compliance for Online," International MultiConference of Engineers and Computer Scientists, vol. 01, no. 01, 2009.

Downloads

Published

2022-11-19

How to Cite

Tilakaratne, S., Pasindu Jayasuriya, Riyaj, S., Rodrigo, M., Kanishka Yapa, & Amila Senaratne. (2022). E-CHEQUE: Re-Defined Era for Financial Transactions. American Scientific Research Journal for Engineering, Technology, and Sciences, 90(1), 260–276. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/8016

Issue

Section

Articles