Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing
Keywords:
Visual Cryptography, Bank Security, Secret image sharingAbstract
With the advent of e-commerce and electronic transactions the need for development of secured systems has grown tremendously. The need for security of information is especially affecting the banking sector. This paper implements an algorithm which proposes an efficient way for decreasing forgery during bank transactions using Visual Cryptography and Image Processing. Visual Cryptography is a generic cryptography technique which takes an image as input for encryption and makes use of human visual system rather than automated computing machines for decryption. Here we use a modified version of Visual Cryptography in which a combination of mechanical process and computation process is used for decryption. Due to the ease of implementation, this technique can be implemented by the people with non-technical background. It encrypts the visual data by dividing it into shares and decrypts the data by stacking some or all shares. Image Processing is used to perform operations on the image. The technique used in this paper works on the signature of the account holder for authentication.
References
M. Naor, A. Shamir, “Visual Cryptography”, Advances in Cryptography-Eurocrypt, Springer, US, pp.1-12,1994.
B. Srikanth, G. Padmaja, S. Khasim, P.V.S. Lakshmi, A. Haritha, “Secured Bank Authentication using Image Processing and Visual Cryptography”, IJCSIT, Vol. 5, Issue.2, pp.1-6, 2014.
W-Q. Yan, D. Jin, M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, ISCAS04, Canada, pp.572-575, 2004.
Bernd Borchert, “Segment-Based Visual Cryptography” WSI Press, Germany, pp.1-320, 2007.
C-C. Lin, W-H. Tsai, “Visual cryptography for graylevel images by dithering techniques”, Science Direct, Vol.24, Issue.3, pp.340-358, 2003.
D. Chaudhary, R. Welekar, “Secure Authentication Using Visual Cryptography”, International Journal Of Computer Science and Applications, Vol. 8, No. 1, pp. 1-4, 2015.
N. Anusha, P. SubbaRao, “Visual Cryptography Schemes for Secret Image”, IJERT Vol. 1 Issue 5, pp. 1-9, 2012.
H. Yan, Z. Gan and K. Chen, ”A Cheater Detectable Visual
Cryptography Scheme”, Journal of Shanghai University, vol. 38, no.1, pp.107-110, 2004.
Md. A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security” , International Journal of Computer Sciences and Engineering, Vol. 2, Issue. 4, pp.76-82, 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
