Presentation is loading. Please wait.

Presentation is loading. Please wait.

S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.

Similar presentations


Presentation on theme: "S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti."— Presentation transcript:

1 S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti Chaudhary

2 CONTENTS  Problem Definition  Introduction  Related Work  Architecture and Modeling  Algorithms  Future Scope  Conclusion  References

3 P ROBLEM D EFINITION how to handle applications that require a high level of security, such as core banking and internet banking. The major issue in core banking is the authenticity of the customer

4 I NTRODUCTION Image Processing &Visual Cryptography Fundamental idea behind visual cryptography The basic scheme is 2 out of 2 visual cryptography scheme Following figure indicates simple 2 out of 2 visual cryptography scheme Share 1 Share 2 Share 1 + Share 2

5 2 Out 2 scheme for banking application The Correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer. A secret image consists of a collection of black and white pixels Visual Cryptography Scheme (VCS)

6 RELATED WORK A brief survey of the related work in the area of visual cryptography and its application in banking sector is presented in this section.

7 With the help of basic idea behind visual cryptography, many researchers performed the survey based on various cryptographic schemes. In the survey of VC schemes it has been found that the colorful secret also be shared using visual cryptography In 2008 the concept was proposed to use visual cryptography for banking applications In 2010, cheating prevention mechanism was stated using visual cryptography by Bin Yu But, it is observed in all these methodologies, there is no facility of authentication testing. In this paper, the author propose a VC method based on pixel matrices and a method for authentication

8 ARCHITECTURE AND MODELING The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme In all the cases, the shares are printed and handed-over to customer, just like any credit/debit card The post-processing is done on the decrypted image. Finally, the original image and the post processed image are compared to confirm the authenticity of the customer.

9 Four major functions are involved in the proposed technique. A. Pre-Processing The scanned image is initially converted into grey-scale image. The way to extract the objects from the background by the threshold value T

10 Where, T (x, y) is a locally varying threshold function The image f0 (x, y) is the morphological opening of f and the constant T0 is the result of global threshold applied on f0. The images after pre-processing are

11 B. Creation of Shares The basic assumption here is that the image is a collection of black and white pixels The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme C. Stacking It is a procedure of getting original image by stacking the shares The shares are stacked together in a way which properly aligns the sub-pixels,

12

13 Post Processing Morphological closing is applied initially. Closing of an image A by a structuring element B is a dilation followed by erosion, which is given as Then filters are used, The current algorithm uses Median filter.

14 E. A UTHENTICATION T ESTING If the shares of different signatures are stacked Figure - Share1 of Signature1 and Share2 of Signature2 (2 out of 2 Scheme)are stacked There is a possibility of producing a share which will result in some signature format, but not the actual signature. Such an attempt is overruled by comparing the decrypted signature with the original signature

15 Karl Pearsons correlation coefficient reveals the dependency or independency between the variables. If X and Y are two arrays, then the Karl Pearsons correlation coefficient between X and Y is computed using the formula

16 F UTURE SCOPE We can developed the schemes like 3 out of 4, 4 out of 4, 3 out of 5, 4 out of 5 and so on. When there is a joint account with more than two customers, one can go for such extended schemes. ATM machines should allow scanning facility so that the customer may scan his share at ATM. Customer may be authenticated based on password and the output image obtained using the share produced by him. In the future work, we can consider the colour images and try to improve the quality of decrypted image

17 CONCLUSION The aim of this paper is to design an efficient technique for checking authentication in care banking or net banking

18 REFERENCES Secure Authentication using Image Processing and Visual Cryptography for Banking Applications 978-1-4244-2963- 9/13/$26 © 2013 IEEE A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010 An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review ACEEE Int. J. on Network Security, Vol. 02, No. 04, Oct 2011

19 THANK YOU


Download ppt "S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti."

Similar presentations


Ads by Google