Open Access   Article Go Back

Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing

B Mehta1 , T Varshney2 , YMandloi 3 , J Belel4 , V Deshmukh5 , 6

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-4 , Page no. 62-67, Apr-2017

Online published on Apr 30, 2017

Copyright © B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, , “Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.62-67, 2017.

MLA Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, "Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing." International Journal of Computer Sciences and Engineering 5.4 (2017): 62-67.

APA Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, , (2017). Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing. International Journal of Computer Sciences and Engineering, 5(4), 62-67.

BibTex Style Citation:
@article{Mehta_2017,
author = {B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, },
title = {Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {62-67},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1242},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1242
TI - Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing
T2 - International Journal of Computer Sciences and Engineering
AU - B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh,
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 62-67
IS - 4
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
630 461 downloads 421 downloads
  
  
           

Abstract

With the advent of e-commerce and electronic transactions the need for development of secured systems has grown tremendously. The need for security of information is especially affecting the banking sector. This paper implements an algorithm which proposes an efficient way for decreasing forgery during bank transactions using Visual Cryptography and Image Processing. Visual Cryptography is a generic cryptography technique which takes an image as input for encryption and makes use of human visual system rather than automated computing machines for decryption. Here we use a modified version of Visual Cryptography in which a combination of mechanical process and computation process is used for decryption. Due to the ease of implementation, this technique can be implemented by the people with non-technical background. It encrypts the visual data by dividing it into shares and decrypts the data by stacking some or all shares. Image Processing is used to perform operations on the image. The technique used in this paper works on the signature of the account holder for authentication.

Key-Words / Index Term

Visual Cryptography, Bank Security, Secret image sharing

References

[1] M. Naor, A. Shamir, “Visual Cryptography”, Advances in Cryptography-Eurocrypt, Springer, US, pp.1-12,1994.
[2] B. Srikanth, G. Padmaja, S. Khasim, P.V.S. Lakshmi, A. Haritha, “Secured Bank Authentication using Image Processing and Visual Cryptography”, IJCSIT, Vol. 5, Issue.2, pp.1-6, 2014.
[3] W-Q. Yan, D. Jin, M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, ISCAS04, Canada, pp.572-575, 2004.
[4] Bernd Borchert, “Segment-Based Visual Cryptography” WSI Press, Germany, pp.1-320, 2007.
[5] C-C. Lin, W-H. Tsai, “Visual cryptography for graylevel images by dithering techniques”, Science Direct, Vol.24, Issue.3, pp.340-358, 2003.
[6] D. Chaudhary, R. Welekar, “Secure Authentication Using Visual Cryptography”, International Journal Of Computer Science and Applications, Vol. 8, No. 1, pp. 1-4, 2015.
[7] N. Anusha, P. SubbaRao, “Visual Cryptography Schemes for Secret Image”, IJERT Vol. 1 Issue 5, pp. 1-9, 2012.
[8] H. Yan, Z. Gan and K. Chen, ”A Cheater Detectable Visual
Cryptography Scheme”, Journal of Shanghai University, vol. 38, no.1, pp.107-110, 2004.
[9] Md. A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security” , International Journal of Computer Sciences and Engineering, Vol. 2, Issue. 4, pp.76-82, 2014.