7
JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617 HTTPS://SITES.GOOGLE.C OM/SITE/JOURNALOFCOMPUTING/ WWW.JOURNALOFCOMPUTING.ORG 27 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time Hamdan O.  Alanazi,  Prof. Dr. Patrice Boursier  Abstract--In the past, the banks used to do the banking manually and there were very long queue with low services for the customers. In this age of technology and with the fast growth of local mobile customers, more banks are actively competing for a larger slice of the mobile banking business. Banks which have Internet banking services are looking to further improve this relatively new service while the smaller ones are beginning to look at it more seriously. In this paper, the secured mobile banking system has been proposed to avoid the delay and to get high bandwidth and to do the banking flexibly and safely . Index Terms— Mobile Banking, Bandwidth, Delay Time, and Mobility Problems.  ——————————  —————————— 1. INTRODUCTION he evolution of science world has moved from stagnation to speed on everything, and the urgent need for a computer in all aspects of life led today to change our life. Life now looking for sophistication over all starting from the small things reach to the big things, every thing in our life become electronic, mail it became Email, bank it became Ebank, in general life it became elife. With this development in science and these changes in life made lot difficulties because the security issue[5],[6],[7],[8],[9],[10],[11],Nowadays[12][13][14] [15][16][17][18][19][20][21],these applications which are classified as security applications for very important to human life [22][23][24][25][26][27]. on the other side make life easier, our job is reduce this difficulties and make life more easy. Nowadays every one talk about ebank and mbank actually both of them represent emoney or (transactions with out cash). In this paper , the auther will focus on the mobile banking, as the auther mansion in the proposal there are lot of problems in this technology since it new technology, the auther classify this problems to economic problems and technical problems, in the proposed system the auther try to solve the technical problems (related to computer) by using a command method to reduce this problems. Today, the advancement of mobile technologies has provided an opportunity for financial providers in Introducing new financial innovations. One of the emerging financial innovations introduced by financial providers is mobile banking. The rapid development of information technology has affected the banking industry globally. An impact of information technology in the banking sector is the introduction of mobile banking. Earlier studies have shown the usefulness of mobile banking in facilitating the financial transactions between banks and their customers [1],[2]. However, these earlier studies on mobile banking and factors influencing its usage have produced mixed results. In [1] found perceived usefulness to be less significant in explaining the adoption of mobile financial services. On the other hand [2], concluded that perceived usefulness to be a significant factor in mobile banking. Also, in [3] he found risk to be a very significant factor in adopting mobile banking. Due to these differences, research on mobile banking remains inconclusive and needs further investigation. 2. MOBILE BANKING BACKGROUND he first mobile banking and payment initiatives were announced during 2003 (the same year that Fundament deployed their first prototype). The first major deployment was made by a company called Pay box (largely supported financially by Deutsche Bank). The company was founded by two young German’s (Mathias Entemann and Eckart Ortwein) and successfully deployed the solution in Germany, Austria, Sweden, Spain and the UK. At about 2003 more than a million people were registered on Pay box and the company was rated by Gartner as the leader in the field [4]. Unfortunately Deutsche Bank withdraws their financial support and the company had to reorganise quickly. All but the operations in Austria closed down. Today, there are huge researches in this area on the other hand whenever T T

Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

Embed Size (px)

Citation preview

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 1/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 27 Secured Mobile Banking System with an Efficient

Bandwidth and Prevent the Delay Time

Hamdan O. Alanazi, Prof. Dr. Patrice Boursier Abstract--In the past, the banks used to do the banking manually and there were very long queue with low services for thecustomers. In this age of technology and with the fast growth of local mobile customers, more banks are actively competing for alarger slice of the mobile banking business. Banks which have Internet banking services are looking to further improve thisrelatively new service while the smaller ones are beginning to look at it more seriously. In this paper, the secured mobile bankingsystem has been proposed to avoid the delay and to get high bandwidth and to do the banking flexibly and safely.

Index Terms— Mobile Banking, Bandwidth, Delay Time, and Mobility Problems. 

——————————    —————————— 

1. INTRODUCTION

he evolution of science world has moved fromstagnation to speed on everything, and the urgentneed for a computer in all aspects of life led todayto change our life. Life now looking forsophistication over all starting from the small thingsreach to the big things, every thing in our lifebecome electronic, mail it became Email, bank itbecame Ebank, in general life it became elife. Withthis development in science and these changes inlife made lot difficulties because the securityissue[5],[6],[7],[8],[9],[10],[11],Nowadays[12][13][14]

[15][16][17][18][19][20][21],these applications whichare classified as security applications for veryimportant to human life [22][23][24][25][26][27]. onthe other side make life easier, our job is reduce thisdifficulties and make life more easy. Nowadaysevery one talk about ebank and mbank actuallyboth of them represent emoney or (transactionswith out cash). In this paper , the auther will focuson the mobile banking, as the auther mansion in theproposal there are lot of problems in thistechnology since it new technology, the autherclassify this problems to economic problems andtechnical problems, in the proposed system theauther try to solve the technical problems (related tocomputer) by using a command method to reducethis problems. Today, the advancement of mobiletechnologies has provided an opportunity forfinancial providers in Introducing new financialinnovations. One of the emerging financialinnovations introduced by financial providers ismobile banking. The rapid development ofinformation technology has affected the banking

industry globally. An impact of informationtechnology in the banking sector is the introduction

of mobile banking. Earlier studies have shown theusefulness of mobile banking in facilitating thefinancial transactions between banks and theircustomers [1],[2]. However, these earlier studies onmobile banking and factors influencing its usagehave produced mixed results. In [1] foundperceived usefulness to be less significant inexplaining the adoption of mobile financial services.On the other hand [2], concluded that perceivedusefulness to be a significant factor in mobilebanking. Also, in [3] he found risk to be a verysignificant factor in adopting mobile banking. Dueto these differences, research on mobile bankingremains inconclusive and needs furtherinvestigation.

2.  MOBILE BANKING BACKGROUND 

he first mobile banking and payment initiativeswere announced during 2003 (the same year thatFundament deployed their first prototype). The firstmajor deployment was made by a company calledPay box (largely supported financially by DeutscheBank). The company was founded by two youngGerman’s (Mathias Entemann and Eckart Ortwein)

and successfully deployed the solution in Germany,Austria, Sweden, Spain and the UK. At about 2003more than a million people were registered on Paybox and the company was rated by Gartner as theleader in the field [4]. Unfortunately Deutsche Bankwithdraws their financial support and the companyhad to reorganise quickly. All but the operations inAustria closed down. Today, there are hugeresearches in this area on the other hand whenever

T

T

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 2/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 28 have developing system; weaknesses came again.We found a study on the current area with a staticvalue, from this study the auther came out with anidea based on the problems.

3. PROBLEM BACKGROUND

Mobile banking, which uses mobile devices for self-service functions? Several major banks, includingCitibank, Wachovia, and Bank of America, havelaunched mobile applications that will allowcustomers to view their account balances, pay bills,transfer money, and even call customer service repswith one click -- all using a cell phone or smartphone. Contact less payment, which enables cellphones to be used as payment devices instead ofcredit cards. As a separate effort, top credit cardissuers MasterCard and Visa are paving the way for"contact less" payments, where cell phones serve as

electronic wallets for purchases that can be made atCVS, McDonald's, and many other retailers. Thephones use Near Field Communication, or NFC, awireless technology for short-rangecommunications between electronic devices. Mobilemarketing, which includes things such as loyaltyprograms, ads, and electronic coupons? MasterCardplans to offer rewards and special offers via textmessages that customers can redeem when theyvisit stores, as an incentive for using its mobileservices. Similarly, Visa will provide customerswith electronic coupons on their cell phones as partof its payment-related services. Other companieshave similar mobile marketing efforts under way."Banks are scrambling today to get customers tosign up for their services," says Richard Crone, ofCrone Consulting. There were 236 million U.S.wireless subscribers at the end of 2006 and theirdata revenue totaled $4.8 billion in the fourthquarter, according to research firm IDC. Withincreased usage of data services, banks see this asthe right time to introduce their mobile apps. Whatthe banks and the wireless carriers have yet tofigure out is how to get consumers to actually usemobile banking and their cell phones as paymentdevices. Solving the challenge will require a lot ofindustry collaboration, and a lot of trial and error,of course.. Are you interested in mobile banking orusing your cell phone as a wallet?

4. PROBLEM STATEMENT 

Since this technology is new over the world, wefind serious Problems fact.

4.1 FINANCIAL TRANSACTIONS PROBLEMS 

In the statistical case study the auther have noted

that: Technical problems (encryption, differentstandards of devices/configuration problems,interface problems/ complexity, display/ GUIproblems) 12 Bank of the 24 bank sample of thestudy. Usability (Speed of data transfer, displaysize, WAP navigation) 12 Bank of the 24 banksample of the study. Risk of acceptance 13 Bank ofthe 24 bank sample of the study. Delay oftechnological development (standardization, digitalsignatures, UMTS, lack of an overall standard) 6Bank of the 24 bank sample of the study. Cost risks6 Bank of the 24 bank sample of the study. Noprofound analysis of costs and benefits, no market

analysis, no risk analysis 6 Bank of the 24 banksample of the study. High costs for users(particularly with UMTS (Universal MobileTelecommunications System) in the future) 4 Bankof the 24 bank sample of the study. Start with anarrow scope of features due to risks, service notattractive, 4 Bank of the 24 bank sample of thestudy. Restrictions of SMS (content) 1 Bank of the 24bank sample of the study. Outsourcing problems 1Bank of the 24 bank sample of the study. Finally, thetime-consuming maintenance 1 Bank of the 24 banksample of the study. Add to these problems themobility issues and the bandwidth and the security

issues and so many think which is need to make ahuge research to come out with a system whichminimize these problems. I can classify theproblems and weaknesses in to tow type.

4.2 COMPUTER PROBLEMS

1-1 network problems (technical problems)(bandwidth, mobility) 1-2 security problems (risks,attackers).

4.3 ECONOMIC PROBLEMS

The proposed system will solve at least problemswhich related to software, network security andother related problems. The idea is not that giganticand also it’s not an imposable, it’s a merge betweenmethods; which is already implemented. Howeverthese methods are certified by specialists also itproofed its cost affect; where. The auther try tomake it affective and efficient with lower cost,

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 3/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 29 finally such technologies need to use new moderndevices which might help to get the proposedresults.

5. OBJECTIVE OF STUDY

This includes:

a.  To study the different types of using mobileagent in our life.

b.  To design and implement m-bank system whichsolve the security issues and not affecting onthe bandwidth.

c.  To find the solution for delay by using a lowbandwidth in the proposed system so thatminimize the mobility problem.

d.  To test the proposed system to not be able toattacked.

6. SYSTEM DESCRIPTION 

Through the previously study, the auther find thatmost of the problems in the previously mentionedfocus in to two things:

1. User should be trust on the system (securityproblems) since it related to the money.

2. Technology problems like delay.

7. PROPOSED SOLUTIONS 

Proposed system solutions is divided into twotypes,

1. Distribution users on the banks branches notwith the main Bank only, there is more than oneway to distribute users to bank branches, such as: The distribution depending on where they areregistering, and here it possible to get problems,first Users variation volume with each branch

which is need different type of servers for eachbranch depend on the number of users, seconddistribution of users depend on the currentgeographic area which is the most commendsolution.

2. Come with a good way for checkingauthentication and make a high level of security this

addition make a trust between the user and thebank.

8. SYSTEM INFRASTRUCTURE

An overview over the system starting with theenvironment, my plan for this system to work withGSM and 2G, 3G as wall once you click on theapplication in your mobile you may login by insertyour username and your password as show as in fig1:

Fig 1. Shown the login Interface.

Your mobile send a request to the main bank, theserver in the main bank verify your username andyour password as shown as in the fig 2, after thatthe main bank send back the ID and the passwordof the nearest branch to your area as shown as inthe fig 3, and then the branch verify this ID andpassword, once it have been verified you get. Anew page in your mobile as shown as in fig 4. Andthen browse your account as shown as in fig 5

Fig 2. Shown The Main bank Verify your Username

and password 

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 4/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 30 

Fig 3. Shown that Your mobile may login automatically tothis branch after the previous login.

Fig 4. Shown the branch verify this ID and password, once ithave been verified you get 

Fig 5. Shown the mapping for Browse Your Account

This interface look like the ATM machine, as we seeit's easy to be friendly with this UI as shown in thefig 6.

Fig 6. Shown the interface look Like the ATMMachine 

If you have a mobile with a touch screen only whatyou need is to click on the function you want to use.If your mobile is normal one than use the numberbeside the function. For example you want to reloadyour hand phone, press 4 there is other interfacesask you to insert the number you want to have areload for it as shown as in fig 7.

Fig 7 Shown the Chooser Interface from the Previous interface

which shown in the fig 6.

Once you insert the number and confirm with yes,

next step will be the confirmation with yourfingerprint, if is match than the server send youback a report for this transaction. Note: in sated offingerprint chick there are two different methods:

1. Chick the scanned fingerprint in the mobilephone and send yes or no to the bank to confirm thetransaction. 

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 5/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 31 2. Scan the fingerprint and send it to the server to

chick there.

The most common is the first one since it doesn'trequire a lot of process and it's more secure thansend the fingerprint to the bank server (secure of

the fingerprint it self from stalling ).

9. Evaluation of the Proposed System.

Strength points in this part the auther will lookingfor the system, possibility for implementation, alsoif the auther implement it, would it be familiar withus, let we say it's not that easy to be familiar with it,Do you thing we can get the desired results  Toanswer all these questions the auther make a lookover the system and its interface, functions, First toimplement this system ,so the auther neededbetween week and two week , since the auther have

most of codes on the internet like the ATM codeand fingerprint matching code. Second the autherthink it will be easy to be familiar within the systemin one week since most of interface design to beeasy to use. Third If the system right the mainobjectives on the solutions proposed, the auther cansay that a successful. The system should have ahigh level of security like a fingerprint matchingalso easy to use, and access to the stage ofconfidence that make us users of this system. Theauther found only one weakness in this system, thissystem require a type of mobile support thefingerprint its mean that there is a limited people

use this system. The use of fingerprints in thissystem is a weak point in terms of financial, but donot forget that when city bank used the fingerprintin their dealings, the number of users of this systemincrease for next two years.

CONCLUSION

Mobile banking is moving up on the adoptioncurve, which is evident in the number ofimplementations known in the world and the levelof interest and discussion around the technologyand its implementation. It is also evident in the

number of technology providers emerging in themobile banking space. There are several choiceswhen considering how to implement mobilebanking. These choices include whether or not todevelop the technology within the bank, use ashared infrastructure, or purchase the enablingtechnology from one of many vendors. The choicesalso include various mobile bearer channels, suitedto differing market segments and differing

capabilities of consumers handsets. Each of thebearer channels has unique requirements inprovisioning and securing applications, transactionsand consumer data. The selected implementationoption including bearer channel, vendor and valueproposition, should be driven by consumer

adoption of the technology, technical capability ofthe handsets in the target market, affordability ofthe bearer channel, and the consumers ease ofaccessing the service. In a nutshell, the systemwhich has been presented makes the mobilebanking very flexible and at the same time verysecured. In addition, the bandwidth is increased byprevent the delay time.

ACKNOWLEDGEMENT

This research was partially supported by the KingSaud University, Riyadh, Saudi Arabia, theUniversity of Malaya, Kuala Lumpur, Malaysia and“Al-Madinah International University”, Shah Alam,Malaysia. First and foremost I would like to thank“ALLAH” (SWT), most gracious and most merciful.I would like to thank Prof. Dr. Patrice Boursier forhis continue support, encouragement and valuablediscussions during my research work. I also wouldlike to express the deepest appreciation to ProfessorAbdullah Ben Abdul-Rahman Abdullah Al-Othman, Dr. Ali ibn Sulaiman Al-Attiyah and Prof.Dr. Mohammad Khalifa Al-Tamimi. My thanks are

also extended to Dr. Ali bin Abdullah Alafnan, Dr.Abdullah Alsbail, Dr. Muhammed Al Arifi, Dr.Musaed AL-Jrrah, and Mr. Abdullah Alsbait.Dr.Khalid Alhazmi, Mr. Seraj, Mr. Khalid and allthe staff in the King Saud University especially inApplied Medical Science for their unlimitedsupport. Without their notes and suggestions thisresearch would not have appeared. Finally, I wouldlike to express my sincere gratitude to my family fortheir help and their unconditional support. A veryspecial vote of thanks is due to my beloved mother. 

AUTHOR’S PROFILE 

HAMDAN ALANAZI: He has

obtained his bachelor’s degree

from the King Saud University,

Riyadh, Kingdom of Saudi

Arabia. He worked as a lecturer

at the Health College in the

Ministry of Health in Saudi Arabia, and then

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 6/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 32 worked as a lecturer at the King Saud University.

Currently, he is a Master’s candidate at the Faculty

of Computer Science & Information Technology at

the University of Malaya in Kuala Lumpur,

Malaysia. He has published many articles. He is has

been reviewed in many journals. His research

interests are in Cryptography, Steganography,

Digital Watermarking, Network Security, Artificial

Intelligence, pattern recognitions, signal processing

and image processing and Medical Applications. 

REFERENCES

[1]  Kleijnen, M. and Wetzels, M. and De Ruyter, K.,” Consumeracceptance of wireless finance”, 2004, Journal of FinancialServices Marketing, Vol (8), P: 206-217.

[2]  Luarn, P. and Lin, H.H., “Toward an understanding of thebehavioral intention to use mobile banking”, 2005, Computersin Human Behavior, Vol (23), P: 873-891.

[3]  Mattila, M., “Factors affecting the adoption of mobile bankingservices”, Journal of Internet Banking and Commerce, 2003,Vol (8), P: 3-6.

[4]  McKitterick, D. and Dowling, J., “State of the art review of mobile payment technology”, TCD Computer ScienceTechnical Reports, 2003, P: 1-22.

[5]  A.W.Naji, A.A.Zaidan, B.B.Zaidan, “Challenges of HiddenData in the Unused Area Two within Executable Files”,Journal of Computer Science, ISSN: 1549-3636, 2009, Vol.5,No.11, P.P 890-897, New York, USA, 2010, (SCOPUS CitedPublication / ISI Web of Knowlge).

[6]  B.B.Zaidan, A.A.Zaidan, Ali K. Hmood, Hamid A. Jalab,“On the differences between Hiding Information andCryptography Techniques: An Overview”, Journal of AppliedSciences, Vol.10, Issue.15, ISSN: 1812-5654, 2010, P.P 1650-1655, (SCOPUS Cited Publication / ISI Web of Knowlge / 

Master Journal List).[7]  Ali K.Hmood, B.B.Zaidan, A.A.Zaidan, Hamid A. Jalab, “An

Overview on Hiding Information Technique in Images”,Journal of Applied Sciences, Vol.10, Issue.18, ISSN: 1812-5654, 2010, P.P 2094-2100.

[8]  Ali K. Hmood, Hamid A. Jalab, Z.M Kasirun, A.A.Zaidan,B.B.Zaidan, “Hiding Data in Video File: An Overview”,Journal of Applied Sciences, Vol.10, Issue.15, ISSN: 1812-5654, 2010, P.P 1644-1649.

[9]  Mohamed A. Ahmed, Miss Laiha Mat Kiah, B.B.Zaidan,A.A.Zaidan,"A Novel Embedding Method to IncreaseCapacity of LSB Audio Steganography Using Noise GateSoftware Logic Algorithm", Journal of Applied Sciences,Vol.10, Issue 1, ISSN: 1812-5654, 2010, P.P 59-64.

[10]  A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab,”Investigate the Capability of Applying Hidden Data in Text

File: An Overview”, Journal of Applied Sciences, Vol.10,Issue.17, ISSN: 1812-5654, 2010, P.P 1916-1922.

[11]  A.A.Zaidan, B.B.Zaidan, Ali K. Hmood, Hamid A. Jalab, “AnOverview: Theoretical and Mathematical Perspectives forAdvance Encryption Standared (AES)/Rijndael”, Journal of Applied Sciences, Vol.10, Issue.18, ISSN: 1812-5654, 2010,P.P 2161-2167.

[12]  Mohamed Abomhara, Omar Zakaria, Othman O. Khalifa,A.A.Zaidan, B.B.Zaidan, Hamdan.O.Alanazi, “Overview:Suitability of Using Symmetric Key to Secure Multimedia

Data “, Journal of Applied Sciences. Vol.10, Issue.15, ISSN:1812-5654, 2010, P.P 1656-1661.

[13]  Ali K. Hmood , Hamid A. Jalab, Z.M Kasirun, B.B Zaidan ,A.A Zaidan, “ On the Capacity and Security of SteganographyApproaches: An Overview ”, Journal of Applied Sciences,Vol.10 , Issue.16 , ISSN: 1812-5654, 2010, P.P 1825-1833,(SCOPUS Cited Publication / ISI Web of Knowlge / MasterJournal List).

[14]  A.A.Zaidan, B.B.Zaidan, Fazidah Othman, “New Techniqueof Hidden Data in PE-File with in Unused Area One”,International Journal of Computer and Electrical Engineering(IJCEE), Vol.1, No.5, ISSN: 1793-8163, p.p 642-650. ,December (2009), Singapore.

[15]  A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High SecuringCover-File of Hidden Data Using Statistical Technique andAES Encryption Algorithm", World Academy of Science,Engineering and Technology (WASET), International Journalof Science, Engineering and Technology, Vol.54, ISSN: 2070-3724, P.P 468-479, June (2009), Paris, France.

[16]  A.A.Zaidan, B.B.Zaidan, “Novel Approach for High SecureData Hidden in MPEG Video Using Public KeyInfrastructure”, International Journal of Computer andNetwork Security, 2009, Vol.1, No.1, ISSN: 1985-1553, P.P71-76, 30 October, Malaysia.

[17]  A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab,“ A New System forHiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique andAdvance Encryption Standared “, International Journal of Computer Theory and Engineering (IJCTE), 2010, VOL 2,NO 2, P.P 220-227, ISSN:1793-8201, Singapore.

[18]  Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan .T.Madhloom, B.B Zaidan, A.A Zaidan,” Novel Approach forHigh Secure and High Rate Data Hidden in the Image UsingImage Texture Analysis”, International Journal of Engineeringand Technology (IJET) , Published by: Engg JournalsPublications, ISSN:0975-4042, Vol.1,NO.2,P.P 63-69, 2009,India.

[19]  Hamdan. Alanazi, Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan,“New Frame Work of Hidden Data with in Non MultimediaFile”, International Journal of Computer and Network 

Security, 2010, Vol.2, No.1, ISSN: 1985-1553, P.P 46-54, 30January, Malaysia.

[20]  A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O.Khalifa, “ Novel Approach of Hidden Data in the (UnusedArea 2 within EXE File) Using Computation BetweenCryptography and Steganography ”, International Journal of Computer Science and Network Security (IJCSNS) , Vol.9,No.5 , ISSN : 1738-7906, pp. 294-300, 30 May (2009), Seoul,Korea.

[21]  Alaa Taqa, A.A Zaidan, B.B Zaidan ,“New Framework forHigh Secure Data Hidden in the MPEG Using AESEncryption Algorithm”, International Journal of Computer andElectrical Engineering (IJCEE),Vol.1 ,No.5, ISSN: 1793-8163, p.p.566-571 , December (2009). Singapore.

[22]  B.B Zaidan , A.A Zaidan ,Alaa Taqa , Fazidah Othman ,“Stego-Image Vs Stego-Analysis System”, InternationalJournal of Computer and Electrical Engineering(IJCEE),Vol.1 ,No.5 , ISSN: 1793-8163, pp.572-578 ,December (2009), Singapore.

[23]  Anas.Majeed, A.A.Zaidan, B.B.Zaidan, Miss Laiha Mat Kiah.“Towards for Admission Control in WIMAX Relay StationMesh Network For Mobile Stations Out of Coverage UsingAd-Hoc”, World Academy of Science, Engineering andTechnology (WASET), International Journal of Science,Engineering and Technology, Vol.54, ISSN: 2070-3724, P.P463-467, June (2009), Paris, France.

[24]  Ahmed.K.Hasan, A.A.Zaidan, B.B.Zaidan, Anas Majeed,Rosli Salleh, Omar Zakaria and Ali Zuheir, "Enhancement

8/8/2019 Secured Mobile Banking System with an Efficient Bandwidth and Prevent the Delay Time

http://slidepdf.com/reader/full/secured-mobile-banking-system-with-an-efficient-bandwidth-and-prevent-the-delay 7/7

JOURNAL OF COMPUTING, VOLUME 2, ISSUE 10, OCTOBER 2010, ISSN 2151-9617

HTTPS://SITES.GOOGLE.COM/SITE/JOURNALOFCOMPUTING/ 

WWW.JOURNALOFCOMPUTING.ORG 33 Throughput of Unplanned Wireless Mesh NetworksDeployment Using Partitioning Hierarchical Cluster (PHC) ",World Academy of Science, Engineering and Technology(WASET) , International Journal of Science, Engineering andTechnology, Vol.54, ISSN: 2070-3724, P.P 480-484, June(2009), Paris, France.

[25]  Hamid.A.Jalab, A.A Zaidan, B.B Zaidan, “New Design forInformation Hiding with in Steganography Using Distortion

Techniques”, International Journal of Engineering andTechnology (IJET)), Vol 2, No. 1, ISSN: 1793-8236, P.P 72-77,Feb (2010), Singapore.

[26]  Md. Rafiqul Islam, A.W. Naji, A.A.Zaidan, B.B.Zaidan “ NewSystem for Secure Cover File of Hidden Data in the ImagePage within Executable File Using Statistical SteganographyTechniques”, International Journal of Computer Science andInformation Security (IJCSIS), ISSN: 1947-5500, P.P 273-279,Vol.7 , NO.1, January 2010, USA.

[27]  Hamid.A.Jalab, A.A Zaidan and B.B Zaidan,” Frame SelectedApproach for Hiding Data within MPEG Video Using BitPlane Complexity Segmentation”, Journal of Computing(JOC), Vol.1, Issue 1, ISSN: 2151-9617, P.P 108-113,December 2009, New York, USA.