Paying with a selfie: A hybrid micro-payment framework based on visual cryptography

Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Joël T. Hounsou, Judicaël Tandjiékpon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

In developing countries, the mobile revolution is happening in these days, and technology is now improving life conditions and providing new opportunities for the developing of the economies. In this paper, we provide a micropayment framework that can be used to conclude everyday financial transactions. The novelty of the approach relies on the usage of techniques of easy understanding and application, even for uncultured people. The security of the system is also ensured by exploiting visual cryptography schemes, whose reconstruction phase requires no particular technical skills and relies only on human activities. The description of usage scenarios and the prototypal architecture of the framework are provided together with the initial plan for the experimental deployment.

Original languageBritish English
Title of host publicatione-Infrastructure and e-Services - 7th International Conference, AFRICOMM 2015, Revised Selected Papers
EditorsRoch Glitho, Fatna Belqasmi, Marco Zennaro, Max Agueh
PublisherSpringer Verlag
Pages136-141
Number of pages6
ISBN (Print)9783319436951
DOIs
StatePublished - 2016
Event7th International Conference on e-Infrastructure and e-Services, AFRICOMM 2015 - Cotonou, Benin
Duration: 15 Dec 201516 Dec 2015

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume171
ISSN (Print)1867-8211

Conference

Conference7th International Conference on e-Infrastructure and e-Services, AFRICOMM 2015
Country/TerritoryBenin
CityCotonou
Period15/12/1516/12/15

Keywords

  • Micro-payment
  • Mobile
  • Visual cryptography

Fingerprint

Dive into the research topics of 'Paying with a selfie: A hybrid micro-payment framework based on visual cryptography'. Together they form a unique fingerprint.

Cite this