Visual Cryptography and Image Processing Based Approach for Secure Transactions in Banking Sector

被引:0
|
作者
Jain, Aaditya [1 ]
Soni, Sourabh [1 ]
机构
[1] Rajasthan Tech Univ, RN Modi Engn Coll, Dept Comp Sci & Engn, Kota, Rajasthan, India
关键词
Visual Cryptography; Image Processing; Secret Sharing Scheme; XOR;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The use of computers and Internet has become so pervasive so it influences all the banking sectors. Security has become the most important aspect in today's banking transaction system because banks are committed to provide secure core banking services to their customers. To achieve this goal authenticity of the users is required i.e. only the authorized users can take part in the transaction. Regarding this purpose banks uses Biometrics based authentication systems but due to unavoidable malicious activities database of the banking system is no longer secure. Smart hackers can fetch biometric details of customers from the bank's database and later can use it for fake transactions. To avoid all this catastrophic things Visual cryptographic technique is used. Visual Cryptography is an efficient encryption scheme in which information hide inside the images and decrypted only by human visual system. In this paper we propose a secure XOR operation based visual cryptography and image processing technique to secure banking transaction. Here we consider the case of joint account operation.
引用
收藏
页码:301 / 305
页数:5
相关论文
共 50 条
  • [1] Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
    Hegde, Chetana
    Manu, S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 65 - +
  • [2] Visual Cryptography and Image Processing Based Approach for Bank Security Applications
    Pathak, Bageshree
    Pondkule, Darshana
    Shaha, Rasika
    Surve, Apurva
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES, ICCNCT 2019, 2020, 44 : 292 - 298
  • [3] Secure display by use of visual cryptography based on polarization processing
    Yamamoto, H.
    Hayasaki, Y.
    [J]. IDW '07: PROCEEDINGS OF THE 14TH INTERNATIONAL DISPLAY WORKSHOPS, VOLS 1-3, 2007, : 1767 - 1770
  • [4] A highly robust and secure image watermarking based on classification and visual cryptography
    Fatahbeygi, Ali
    Tab, Fardin Akhlaghian
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 : 71 - 78
  • [5] A novel smooth texture-based visual cryptography approach for secure communication
    Barik, Ram Chandra
    Sahu, Sitanshu Sekhar
    Changder, Suvamoy
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (02) : 109 - 137
  • [6] Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system
    Yang, Dana
    Doh, Inshil
    Chae, Kijoon
    [J]. 2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 463 - 467
  • [7] Secure QR Code Scheme Based on Visual Cryptography
    Cao, Xiaohe
    Feng, Liuping
    Cao, Peng
    Hu, Jianhua
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 433 - 436
  • [8] SDPBDVC: secure data processing on big data using visual cryptography
    Brindha, K.
    Jeyanthi, N.
    [J]. INTERNATIONAL JOURNAL OF SERVICES TECHNOLOGY AND MANAGEMENT, 2020, 26 (2-3) : 237 - 251
  • [9] An Efficient Secure Data Transmission Based on Visual Cryptography
    Jabi, Rubeena
    Patel, Punyaban
    Dubey, Deepty
    [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [10] Secure visual cryptography for medical image using modified cuckoo search
    A. Alif Siddiqua Begum
    S. Nirmala
    [J]. Multimedia Tools and Applications, 2018, 77 : 27041 - 27060