Visual Cryptography and Image Processing Based Approach for Bank Security Applications

被引:2
|
作者
Pathak, Bageshree [1 ]
Pondkule, Darshana [1 ]
Shaha, Rasika [1 ]
Surve, Apurva [1 ]
机构
[1] Cummins Coll Engn Women, Dept Elect & Telecommun, Pune, Maharashtra, India
关键词
Authentication; Cryptography; Decryption; Encryption; Extended visual cryptography; PSNR; Watermark security;
D O I
10.1007/978-3-030-37051-0_34
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Authentication is a critical step in initializing a bank transaction. Core banking and net banking systems use ID cards, passwords/PIN, OTP, etc. for authentication. However, these methods are still prone to forgery and hacking, due to which unauthorized person could gain access to user's account. We propose a methodology which uses an image share as authentication key. This has been created using visual cryptography and other image processing techniques to encrypt authentication parameters. It is encrypted such that the share becomes incomprehensible to human eyes and non-decryptable by hacker, thus protecting the data from forgery or hacking. This paper proposes a double authentication system where user is identified by decrypted image and PSNR value. Hence this system provides a very high level of security.
引用
收藏
页码:292 / 298
页数:7
相关论文
共 50 条
  • [1] Visual Cryptography and Image Processing Based Approach for Secure Transactions in Banking Sector
    Jain, Aaditya
    Soni, Sourabh
    [J]. 2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 301 - 305
  • [2] Secure Authentication using Image Processing and Visual Cryptography for Banking Applications
    Hegde, Chetana
    Manu, S.
    Shenoy, P. Deepa
    Venugopal, K. R.
    Patnaik, L. M.
    [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 65 - +
  • [3] Enhanced Security Architecture for Visual Cryptography Based on Image Secret Sharing
    Gundapuneni, Manas Abhilash
    Bano, Anzum
    Singh, Navjot
    [J]. 2020 11TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2020, : 749 - 755
  • [4] Color Image Visual Cryptography Scheme with Enhanced Security
    Khokhar, Prachi
    Jena, Debasish
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 267 - 279
  • [5] Digital Image Security Using Hybrid Visual Cryptography
    Bhatia, Shradha
    Khatri, Sunil Kumar
    Singh, Ajay Vikram
    [J]. 2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 570 - 576
  • [6] Enhanced Visual Cryptography: An Augmented Model for Image Security
    Tripathi, Jyoti
    Saini, Anu
    Kishan
    Nikhil
    Shazad
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 323 - 333
  • [7] A Comparative Study on Visual Cryptography Method for Handwriting Image Security
    Suharjito
    Sugianto
    Surantha, Nico
    [J]. 2017 17TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2017,
  • [8] Medical image security using modified chaos-based cryptography approach
    Gatta, Methaq Talib
    Abd Al-latief, Shahad Thamear
    [J]. IBN AL-HAITHAM FIRST INTERNATIONAL SCIENTIFIC CONFERENCE, 2018, 1003
  • [9] A Visual Cryptography-Based Watermarking Approach for the Detection and Localization of Image Forgery
    Salim, Moataz Z.
    Abboud, Ali J.
    Yildirim, Remzi
    [J]. ELECTRONICS, 2022, 11 (01)
  • [10] A Double Security Approach for Visual Cryptography using Transform Domain
    Ravikumar, Arya
    Mredhula, L.
    [J]. 2015 Fifth International Conference on Advances in Computing and Communications (ICACC), 2015, : 141 - 144