Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing

Authors

  • B Mehta Computer Engineering Dept, NMIMS University,India
  • T Varshney Computer Engineering Dept, NMIMS University,India
  • Y Mandloi Computer Engineering Dept, NMIMS University,India
  • J Belel Computer Engineering Dept, NMIMS University,India
  • V Deshmukh Computer Engineering Dept, NMIMS University,India

Keywords:

Visual Cryptography, Bank Security, Secret image sharing

Abstract

With the advent of e-commerce and electronic transactions the need for development of secured systems has grown tremendously. The need for security of information is especially affecting the banking sector. This paper implements an algorithm which proposes an efficient way for decreasing forgery during bank transactions using Visual Cryptography and Image Processing. Visual Cryptography is a generic cryptography technique which takes an image as input for encryption and makes use of human visual system rather than automated computing machines for decryption. Here we use a modified version of Visual Cryptography in which a combination of mechanical process and computation process is used for decryption. Due to the ease of implementation, this technique can be implemented by the people with non-technical background. It encrypts the visual data by dividing it into shares and decrypts the data by stacking some or all shares. Image Processing is used to perform operations on the image. The technique used in this paper works on the signature of the account holder for authentication.

References

M. Naor, A. Shamir, “Visual Cryptography”, Advances in Cryptography-Eurocrypt, Springer, US, pp.1-12,1994.

B. Srikanth, G. Padmaja, S. Khasim, P.V.S. Lakshmi, A. Haritha, “Secured Bank Authentication using Image Processing and Visual Cryptography”, IJCSIT, Vol. 5, Issue.2, pp.1-6, 2014.

W-Q. Yan, D. Jin, M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, ISCAS04, Canada, pp.572-575, 2004.

Bernd Borchert, “Segment-Based Visual Cryptography” WSI Press, Germany, pp.1-320, 2007.

C-C. Lin, W-H. Tsai, “Visual cryptography for graylevel images by dithering techniques”, Science Direct, Vol.24, Issue.3, pp.340-358, 2003.

D. Chaudhary, R. Welekar, “Secure Authentication Using Visual Cryptography”, International Journal Of Computer Science and Applications, Vol. 8, No. 1, pp. 1-4, 2015.

N. Anusha, P. SubbaRao, “Visual Cryptography Schemes for Secret Image”, IJERT Vol. 1 Issue 5, pp. 1-9, 2012.

H. Yan, Z. Gan and K. Chen, ”A Cheater Detectable Visual

Cryptography Scheme”, Journal of Shanghai University, vol. 38, no.1, pp.107-110, 2004.

Md. A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security” , International Journal of Computer Sciences and Engineering, Vol. 2, Issue. 4, pp.76-82, 2014.

Downloads

Published

2025-11-11

How to Cite

[1]
B. Mehta, T. Varshney, Y. Mandloi, J. Belel, and V. Deshmukh, “Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing”, Int. J. Comp. Sci. Eng., vol. 5, no. 4, pp. 62–67, Nov. 2025.

Issue

Section

Research Article