+234 813 0686 500
+234 809 3423 853
info@grossarchive.com

Design and implementation of Mobile Banking

  • Type:Project
  • Pages:41
  • Format:Microsoft Word
(Computer Science Project Topics & Materials)

1.0 Background to the Study

The internet is an integral part of our daily lives, and the proportion of the people who are expected to be able to manage their bank account anywhere, anytime is constantly growing. As such, internet mobile banking has come of age as a crucial component of any financial institution’s multichannel strategy. Internet mobile banking uses mobile phone with internet facility as the delivery channel to conduct banking activities like transferring funds, paying bills, viewing account statements, paying mortgages and purchasing financial certificates of deposits etc. Many organization or financial institutions are now incorporating internet mobile banking as a key component of their growth strategy, and use of the mobile phone to conduct banking and financial services tasks continues to rise among early adopters. (Barnes, S.J., and Corbitt, B. Mobile Banking:  Concept and Potential, International Journal of Mobile Communications, 1 (3), pp. 273-288, 2003).

Cryptography and steganography are well known and widely used techniques that manipulate information (messages) in order to cipher or hide their existence. These techniques have many applications in computer science and other related fields: they are used to protect e-mail messages, credit card information, corporate data, and other valuable information.

More specifically, steganography is the art and science of communicating in a way which hides the existence of the communication (Johnson and Jajodia, 1998). A steganographic system thus embeds hidden content in unremarkable cover media so as not to arouse an eavesdropper’s suspicion (Provos and Honeyman, 2003). As an example, it is possible to embed a text inside an image or an audio file.

On the other hand, cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication (Menezes, A., Van Oorschot, P., and Vanstone, S. 1996).

Crystography is the combination of Cryptography and Steganography for ensuring security of information whether in store or in transit (Gabriel J.A 2015). Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of Steganography techniques some are more complex than others and all of them have respective strong and weak points. Cryptography was used to assure only secrecy, signatures, and other physical mechanisms were typically used to assure integrity of the media and authenticity of the sender. 

With the advent of electronic funds transfer, the applications of steganography for integrity began to surpass its use for secrecy. In the information age, steganography has become one of the major methods for protection in all applications.


Design and implementation of Mobile Banking

Share This

Details

Type Project
Department Computer Science
Project ID CPU1478
Price ₦3,000 ($9)
No of Pages 41 Pages
Format Microsoft Word

500
Leave a comment...

    Details

    Type Project
    Department Computer Science
    Project ID CPU1478
    Price ₦3,000 ($9)
    No of Pages 41 Pages
    Format Microsoft Word

    Related Works

    Design and Implementation a Mobile Web Career Portal CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY The term ‘Portal’ projected the vision that the web site is an entry point to selected and relevant information in contrast to the general web where all information is equally accessible. The term portal was quickly accepted and today it is... Continue Reading
           DESIGN AND IMPLEMENTATION OF MOBILE APPLICATION RESULT CHECKER                                                 ABSTRACT In this project work, we present a way to bring information to students by leveraging the availability ofphones (with SMS capability). We review the use of mobile phones... Continue Reading
    Design and Implementation a Mobile Web Career System CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF STUDY The term ‘Portal’ projected the vision that the web site is an entry point to selected and relevant information in contrast to the general web where all information is equally accessible. The term portal was quickly accepted and today it is... Continue Reading
    ABSTRACT Based on the analysis of finding, I will come up with a proposed system design called Mobile multi-chat, this will be shown to my supervisor in other to seek approval and then commence the implementation of the proposed system. The system will be implemented with PHP and MYSQL (as the database) as the backend. During the design and the... Continue Reading
    ABSTRACT Steganography is an art of hiding sensitive data or some confidential information in some cover medium file. In this project, video steganography method has been implemented. As name suggest, video steganography means hiding any digital data in video files. The aim of this project is to hide, detect and retrieve the secret message hidden... Continue Reading
    ABSTRACT Save a Soul project objective is to handle donations and connect the donators with the receivers through a mobile application. The application handles different services such as Donating items, seeing list of donations, and details of donations. The application allows users to create an account by registering and logging in thereby... Continue Reading
    (ANDROID PLATFORM)   CHAPTER ONE INTRODUCTION 1.1 BACKGROUND OF THE STUDY A study plan is an organized schedule that students create to outline time for study and learning goals. Just like with work or school schedules, university students should develop a study schedule where they... Continue Reading
    ABSTRACT In this project work, we present a way to bring information to students by leveraging the availability of phones (with SMS capability). We review the use of mobile phones for delivering examination results via Mobile Application Result Checker in a university, where student who have written examinations and anxious to see their results... Continue Reading
    ABSTRACT Mobile computing involves the use of portable handheld devices having network connections to access online resources especially via the internet. With mobile computing, people can collaborate from various distant location, they can be involved in conferences, online forums, symposiums, etc. One of such important services offered by mobile... Continue Reading
    ABSTRACT Mobile computing involves the use of portable handheld devices having network connections to access online resources especially via the internet. With mobile computing, people can collaborate from various distant location, they can be involved in conferences, online forums, symposiums, etc. One of such important services offered by mobile... Continue Reading