Abstract
Technological advances and the pandemic have caused an explosion in demand for remote services. In critical processes such as banking, insurance and notary public, the service to be provided remotely has to be provided as quickly and safely as the service provided in presence. In such sensitive processes, the identity card authenticity detection must be done accurately and securely. One of the techniques used in accuracy detection is the use of mobile devices that support contactless chip technology. However, the number of mobile devices using this method is limited today. This situation hinders the effective and widespread use of remotely provided services and resources. Therefore, a different solution method was needed that would be an alternative to contactless chip technology, remove the obstacles to widespread use and reduce incidents such as counterfeiting. In this study, it was investigated whether the hologram, which is one of the security elements in the identity, can be used in determining the accuracy of Turkey's digital identity cards. For this purpose, a special function and program has been developed on the MATLAB application by using 2-D neighborhood methods to detect the crescent on the hologram. 227 digital ID cards were first evaluated on a mobile device over certain threshold values such as color level and similarity ratio. Then, each card used in the test was examined one by one with the naked eye. Approximately 99.56% similar results were obtained between the test findings made over the application and the findings obtained after the controls made with the naked eye. It has been concluded that the secure hologram image, one of the security elements on the digital ID card with this high success rate, can be used as computer aided in remote services. With this solution method, it has contributed to overcome an important obstacle in front of services that are thought to be provided remotely in many fields such as banks, notaries and education.
Subject
Colloid and Surface Chemistry,Physical and Theoretical Chemistry
Reference38 articles.
1. Sahinaslan O., Sahinaslan E. "Cross-object information security: A study on new generation encryption.", AIP
Conference Proceedings, vol. 2086, 030034. doi: 10.1063/1.5095119, (2019)
2. Sahinaslan O., Sahinaslan E., Gunes E., "Review of the contributions of contactless payment technologies in the COVID-
19 pandemic process.", AIP Conference Proceedings, vol.2334, 070002. doi: 10.1063/5.0042225, (2019)
3. Hacıoğlu A. B., Sağlam M. "Covid-19 Pandemi sürecinde tüketici davranışları E-ticaretteki değişimler.", Medya ve
Kültürel Çalışmalar Dergisi, pp. 16-29(in Turkish with an abstract in English). doi: 10.29228/mekcad.2, (2021)
4. Sneader K., Singhal S., Kendi C., "The next normal arrives: Trends that will define 2021 and beyond." McKinsey &
Company, (2021)
5. Koç E., Özçelik H., "Covid-19 Yönetici ve Kobi Anketleri.", EY-Parthenon Press (in Turkish), (2020)