Resisting Cyber-attacks in Digital Banking using Visual Cryptography
DOI:
https://doi.org/10.26438/ijcse/v5i10.355359Keywords:
Information Security, Virtual cryptography, authentication, online banking, encryptionAbstract
With increasing demand of security, user authentication occupies prior in information security and plays a prominent role in protecting user's privacy, which has become a critical issue nowadays. In this digital world the usage of online transactions became very common and at the same time various attacks are performed behind this. The most common method used for authentication in online banking is by providing text password, which is the combination of letters, sequence of characters and special symbols. Authentication system, based on text passwords is widely used but they can easily compromise with attacks. Users normally select simple passwords because they can easily memorize at the time of login. So providing more security than existing assists in protecting resources against unauthorized access. Image-based-authentication is a good alternative to traditional password system. Apart from many conventional cryptographic methods, visual cryptographic techniques have also been used for providing security to data. In this proposed work, Visual cryptographic scheme is used that encrypts a secret image by breaking into image shares. Along with text based password login, image based authentication using visual cryptography is included. This authentication system is useful for various sectors like industries, online banking and shopping.
References
B.V.Prasanthi ,”Cyber Forensics Tools : A Review” International Journal of Engineering Trends and Technology (IJETT),vol 41 no 5,pp.266-271,2016.
Prasanthi, B. V., Prathyusha Kanakam, and S. Mahaboob Hussain. "Cyber Forensic Science to Diagnose Digital Crimes-A study."International Journal of Scientific Research in Network Security and communication (IJSRNSC), vol 50 no 2,pp.107-113,2017.
Prasanthi, B. V., et al. "Security Enhancement of ATM System with Fingerprint and DNA Data." International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 12, pp. 477–479, Dec. 2014.
Prasanthi, B. V., et al. "Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications ,vol 112 no 9,2015.
P. S. Revenkar, Anisa Anjum and W. Z. Gandhare. ”Survey of Visual Cryptographic Schemes”. International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010.
Feng Liu, Chuankun Wu, Xijun Lin. ”Step Construction of Visual Cryptography Schemes”. IEEE transactions on information forensics and security, vol. 5, no. 1, march 2010.
A. Parakh and S.kak .”A Recursive Threshold Visual Cryptography Scheme ”. Department of Computer Science, Oklahoma State University Stillwater, OK 74078.
N. Askari, H.M. Heys, and C.R. Moloney. ”An extended visual cryptography scheme without pixel expansion for halftone images”. 26th annual ieee canadian conference on electrical and computer engineering year 2013.
Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo. ”Halftone Visual Cryptography”. IEEE transactions on image processing, vol. 15, no. 8, august 2006.
D. Jena and S. Jena . ”A Novel Visual Cryptography Scheme”. 978-07695-3516-6/08 2008IEE DOI 10.1109/ICACC.2009.109
Kulvinder Kaur and Vineeta Khemchandani. ”Securing Visual Cryptographic Shares using Public Key Encryption”.3rd IEEE International Advance Computing Conference (IACC),pp.1108-1113,2013.
Bhuyan, Sangeeta.” Image Security using Visual Cryptography”. Diss. 2015.
Bonthu, Sridevi, B. V. Prasanthi, and K. Himabindu. "Automation Of Pre-Processing Of Students Data",vol 8 no 3,pp.241-245,2016.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
