Hidden Markov Model Based Fault Tolerance in Credit Card Transaction Security

  • Authors

    • N Arunachalam
    • P Prabavathy
    • S Priyatharshini
    2018-05-31
    https://doi.org/10.14419/ijet.v7i2.32.15392
  • Comparative analysis, Credit card fake, Detector, Fake detection model, Hidden Markov Model And Image processing, Signal processing on graphs
  • Credit card fake detection has raised unique challenges due to the streaming, imbalanced, and non-stationary nature of the data that has been transacted. It had additionally included an active learning step, since the labeling (fake or genuine) use of a subset on transactions is obtained in near-real time through human investigators contacted the cardholders. In this paper, the Hidden Markov Model (HMM) algorithm has been used for sequence of Credit card operations for transaction processing and the fake can be detected by using the fake detection model during transaction processing. HMM, Fake detection model and image process had played an imperative role in the detection of credit card fake in online transactions. In fake detection, most challenging is a data problem, due to two major reasons – first, the profiles of cardholders are normal and fake lent behaviors changed constantly and secondly, credit card fake data sets are highly changed its position. Using fake detection (FD) algorithm the performance of detection in credit card transactions had highly affected by the sampling approach on dataset, selection of HMM, Fake detection model. Using fake detection (FD) algorithm an image technique had been used. A reliable augmentation of the target scarce population of fakes are  important considering issues such as labeling cost; algorithm HMM, fake detection and outlines in the data streamed source. We have approached several scenarios which showed the feasibility of improving detection capabilities evaluated by means of receiver operating characteristic (ROC) curves and several key performance indicators (KPI) commonly used in financial business.

     

     

  • References

    1. [1] H.V. Poor, “Information and inference in the wireless physical layer, â€IEEE Wireless Communications, 19, pp. 40-47, 2012.

      [2] L. Sankar, S.R. Rajagopalan, and V.H. Poor, “Utility-Privacy Tradeoff in Databases: An Information-theoretic Approach,†to IEEE Trans. Inf.Forens. Sec., 8 (6), pp. 838-852, 2013.

      [3] S. Pawar, S. El Rouayheb, and K. Ramchandran, “Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial Attacks,†IEEE Transactions on Information Theory, 57 (10), pp. 6734- 6753, 2011.

      [4] L. Lifeng, S.-W. Ho, and H.V. Poor, “Privacy-Security Trade-Offs in Biometric Security Systems - Part I: Single Use Case,†IEEE Trans. Inf. Forensics Security, 6, pp. 122-139, 2011.

      [5] S. Bhattacharyya, S. Jha, K. Tharakunnel, and J. C. Westland, “Datamining for credit card fake: A comparative study,†Decision SupportSystems, 50, pp. 602-613, 2011.

      [6] V. Hodge, J. Austin, “A survey of outlier detection methodologies,†J. ofArt. Intel, 22 (2), pp. 85-126, 2004.

      [7] D. Tax and R. Duin, “Uniform object generation for optimizing one class classifiers,†Journal of Machine Learning Research, 2, pp. 155-173, 2001.

      [8] P. Danenas, “Intelligent financial fake detection and analysis: a surveyof recent patents,†Recent Patents on Computer Science, 8 (1), pp. 13-23, 2015.

      [9] A. Salazar, G. Safont, A. Soriano, L. Vergara, "Automatic credit cardfake detection based on non-linear signal processing," 46th Annual IEEE International Carnahan Conference (ICCST), Boston, USA, pp.207-212, 2012.

      [10] R.H. Girgenti, T.P. Hedley, Managing the risk of fake and misconduct: meeting the challenges of a global, regulated and digital environment, McGraw-Hill, 2011.

      [11] Nabha Kshirsagar et al, “Credit Card Fake Detection System using Hidden Markov Model and Adaptive Communal Detection†(IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (2) , 2015.

      [12] Akash Pawar, Vishwajit Patil, “Credit Card Fake Detection Using Hidden Markov Model†International journal on information Technology, Mumbai, India.

      [13] Vishwesh Satyanarayan Rathi, “Credit Card Fake Detection System using HMM and Image Click Point Authentication†Journal on Computer Engineering, SSBT COET, Bambhori, Jalgaon, India.

      [14] Twinkle Patel, Ms. Ompriya Kale, “A Secured Approach to Credit Card Fake Detection Using Hidden Markov Model†International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 3 Issue 5, May 2014 .

      [15] Prajakta Akole, Nikita Mane, “Secure Transactio :An Credit Card Fake Detection System Using Visual Cryptography†International Journal on Computer Engineering, JSPM’s BSIOTR College, Wagholi, Pune.

      [16] Vivek Kumar Prasad, “Method and System for Detecting Fake in Credit Card Transaction†International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 5, July 2013.

      [17] S Santhosh Baboo, N Preetha,â€Analysis of Spending Outline on Credit Card Fake Detection†IOSR Journal of Computer Engineering (IOSR-JCE), Volume 17, Issue 2, Ver. 1 (Mar – Apr. 2015).

      [18] Y. Sahin and E. Duman “Detecting Credit Card Fake by Decision Trees and Support Vector Machines†Proceedings of the international Multi-Conference of Engineers and Computer Scientists 2011 Vol I, IMECS 2011, March 16 – 18, Hong Kong.

  • Downloads

  • How to Cite

    Arunachalam, N., Prabavathy, P., & Priyatharshini, S. (2018). Hidden Markov Model Based Fault Tolerance in Credit Card Transaction Security. International Journal of Engineering & Technology, 7(2.32), 153-157. https://doi.org/10.14419/ijet.v7i2.32.15392