Secure Authentication using Image Processing and Visual Cryptography for Banking Applications

被引:18
|
作者
Hegde, Chetana [1 ]
Manu, S. [1 ]
Shenoy, P. Deepa [1 ]
Venugopal, K. R. [1 ]
Patnaik, L. M. [2 ]
机构
[1] Bangalore Univ, Univ Visvesvaraya Coll Engn, Dept Comp Sci & Engn, Bangalore 560001, Karnataka, India
[2] Deemed Univ, Def Inst Adv Technol, Pune, Maharashtra, India
关键词
D O I
10.1109/ADCOM.2008.4760429
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difficult to trust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing and visual cryptography. This paper proposes a technique of processing the signature of a customer and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank. When two shares are created, one is stored in the Bank database and the other is kept by the customer. The customer has to present the share during all of his transactions. This share is stacked with the first share to get the original signature. The Correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer.
引用
收藏
页码:65 / +
页数:2
相关论文
共 50 条
  • [1] Visual Cryptography and Image Processing Based Approach for Secure Transactions in Banking Sector
    Jain, Aaditya
    Soni, Sourabh
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 301 - 305
  • [2] Enabling secure authentication using fingerprint and visual cryptography
    Annappanavar, Sneha Manohar
    Chavan, Pallavi Vijay
    [J]. INTERNATIONAL JOURNAL OF BIOMETRICS, 2024, 16 (06)
  • [3] An Image Based Authentication Technique Using Visual Cryptography Scheme
    Dais, Annie, V
    Joe, Vijesh C.
    Sugi, Sidney Swarna S.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 124 - 129
  • [4] Secure grayscale image communication using significant visual cryptography scheme in real time applications
    G. Selva Mary
    S. Manoj Kumar
    [J]. Multimedia Tools and Applications, 2020, 79 : 10363 - 10382
  • [5] Secure grayscale image communication using significant visual cryptography scheme in real time applications
    Selva Mary, G.
    Manoj Kumar, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (15-16) : 10363 - 10382
  • [6] SDPBDVC: secure data processing on big data using visual cryptography
    Brindha, K.
    Jeyanthi, N.
    [J]. INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2020, 26 (2-3) : 237 - 251
  • [7] Secure visual cryptography for medical image using modified cuckoo search
    A. Alif Siddiqua Begum
    S. Nirmala
    [J]. Multimedia Tools and Applications, 2018, 77 : 27041 - 27060
  • [8] User Authentication using Visual Cryptography
    Kumar, Praveen P.
    Sabitha, S.
    [J]. 2015 INTERNATIONAL CONFERENCE ON CONTROL COMMUNICATION & COMPUTING INDIA (ICCC), 2015, : 647 - 652
  • [9] Secure visual cryptography for medical image using modified cuckoo search
    Begum, A. Alif Siddiqua
    Nirmala, S.
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (20) : 27041 - 27060
  • [10] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298