Advertisement

Visual Cryptography and Image Processing Based Approach for Bank Security Applications

  • Bageshree Pathak
  • Darshana PondkuleEmail author
  • Rasika Shaha
  • Apurva Surve
Conference paper
  • 221 Downloads
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 44)

Abstract

Authentication is a critical step in initializing a bank transaction. Core banking and net banking systems use ID cards, passwords/PIN, OTP, etc. for authentication. However, these methods are still prone to forgery and hacking, due to which unauthorized person could gain access to user’s account. We propose a methodology which uses an image share as authentication key. This has been created using visual cryptography and other image processing techniques to encrypt authentication parameters. It is encrypted such that the share becomes incomprehensible to human eyes and non-decryptable by hacker, thus protecting the data from forgery or hacking. This paper proposes a double authentication system where user is identified by decrypted image and PSNR value. Hence this system provides a very high level of security.

Keywords

Authentication Cryptography Decryption Encryption Extended visual cryptography PSNR Watermark security 

References

  1. 1.
    Bidgar, P., Shahare, N.: Key based visual cryptography scheme using novel secret sharing technique with steganography. IOSR J. E &TCGoogle Scholar
  2. 2.
    Kandar, S., Maiti, A., Chandra Dhara, B.: K–N secret sharing visual cryptography scheme for color image using random number. IJCSI Int. J.Google Scholar
  3. 3.
    Liu, F., Wu, C.K., Lin, X.J.: Colour visual cryptography schemes. IET Inf. Secur. 2(4), 151–165 (2008)Google Scholar
  4. 4.
    Saturwar, J., Chaudhari, D.N.: Secure visual secret sharing scheme for color images using visual cryptography and digital watermarkingGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Bageshree Pathak
    • 1
  • Darshana Pondkule
    • 1
    Email author
  • Rasika Shaha
    • 1
  • Apurva Surve
    • 1
  1. 1.Department of Electronics and TelecommunicationCummins College of Engineering for WomenPuneIndia

Personalised recommendations