S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti.

Slides:



Advertisements
Similar presentations
Patient information extraction in digitized X-ray imagery Hsien-Huang P. Wu Department of Electrical Engineering, National Yunlin University of Science.
Advertisements

Critical Reading Strategies: Overview of Research Process
Visual Cryptography Moni Naor Adi Shamir Presented By:
Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
RESEARCH PROPOSAL DR.URJA MANKAD.
A New Cheating Prevention Scheme For Visual Cryptography 第十六屆全國資訊安全會議 Jun Du-Shiau Tsai ab,Tzung-her Chen c and Gwoboa Horng a a Department of Computer.
Cheating prevention in visual cryptography Author: C.M. Hu and W.G. Tzeng Source: IEEE-TIP 2007 Presenter: Yu-Chi Chen Date: /4/13 1.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
國立暨南國際大學 National Chi Nan University A Study of (k, n)-threshold Secret Image Sharing Schemes in Visual Cryptography without Expansion Presenter : Ying-Yu.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
IEEE TRANSACTIONS ON IMAGE PROCESSING,2007 指導老師:李南逸 報告者:黃資真 Cheating Prevention in Visual Cryptography 1.
Biometrics based Cryptosystem Design. Cryptosystem A mechanism using which one can encode an information content to an incomprehensible form and also.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
BC DEF Insert an image to visualize what is being quantified in the graph to the left Insert a Diagram or image to help explain your methods Use a letter.
‘ Glaucoma Detection In Retinal Images Using Automated Method ’
HCI Final Project Robust Real Time Face Detection Paul Viola, Michael Jones, Robust Real-Time Face Detetion, International Journal of Computer Vision,
Digital Image Processing: Revision
Efficient Moving Object Segmentation Algorithm Using Background Registration Technique Shao-Yi Chien, Shyh-Yih Ma, and Liang-Gee Chen, Fellow, IEEE Hsin-Hua.
Internet Resources Discovery (IRD) IBM DB2 Digital Library Thanks to Zvika Michnik and Avital Greenberg.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
Presented by: Kamakhaya Argulewar Guided by: Prof. Shweta V. Jain
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
CS 736 A methodology for Analyzing the Performance of Authentication Protocol by Laseinde Olaoluwa Peter Department of Computer Science West Virginia.
Computer Graphics Communication “Digital Documentation using 3D- CAD data and Web-3D” Tatsuya Mochizuki Shizuoka University of Art and Culture, Hamamatsu,
GESTURE ANALYSIS SHESHADRI M. (07MCMC02) JAGADEESHWAR CH. (07MCMC07) Under the guidance of Prof. Bapi Raju.
A generic tool to assess impact of changing edit rules in a business survey – SNOWDON-X Pedro Luis do Nascimento Silva Robert Bucknall Ping Zong Alaa Al-Hamad.
TRIGON BASED AUTHENTICATION, AUTHORIZATION AND DISTRIBUTION OF ENCRYPTED KEYS WITH GLOBUS MIDDLEWARE Anitha Kumari K 08MW01 II ME – Software Engineering.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
An efficient method of license plate location Pattern Recognition Letters 26 (2005) Journal of Electronic Imaging 11(4), (October 2002)
Assessing Quality for Integration Based Data M. Denk, W. Grossmann Institute for Scientific Computing.
European Conference on Quality in Official Statistics Session 26: Quality Issues in Census « Rome, 10 July 2008 « Quality Assurance and Control Programme.
How to read a scientific paper
EDGE DETECTION USING MINMAX MEASURES SOUNDARARAJAN EZEKIEL Matthew Lang Department of Computer Science Indiana University of Pennsylvania Indiana, PA.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
BARCODE IDENTIFICATION BY USING WAVELET BASED ENERGY Soundararajan Ezekiel, Gary Greenwood, David Pazzaglia Computer Science Department Indiana University.
Visual Cryptography Advanced Information Security March 11, 2010 Presenter: Semin Kim.
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT Project Members Sanyam Sharma Sunil Mohan Ranta Group No FINGERPRINT.
E-Comics Protection E-Comics Protection Avnish Kumar Bachelor of Technology Electrical Engineering, IInd Year Indian Institute of Technology Roorkee, India.
Nordic Process Control Workshop, Porsgrunn, Norway Application of the Enhanced Dynamic Causal Digraph Method on a Three-layer Board Machine Cheng.
SIGNATURE RECOGNITION SYSTEM Group Number:10 Group Members: Richa Goyal(y08uc103) Rashmi Singhal(y08uc102)
VCPSS : A two-in-one two-decoding-options image sharing method combining visual cryptography (VC) and polynomial-style sharing (PSS) approaches Sian-Jheng.
What is Digital Image processing?. An image can be defined as a two-dimensional function, f(x,y) # x and y are spatial (plane) coordinates # The function.
A New Approach for Visual Cryptography Wen-Guey Tzeng and Chi-Ming Hu Designs, codes and cryptography, 27, ,2002 Reporter: 李惠龍.
 劉庭瑋 Electronic Medical Report Security Using Visual Secret Sharing Scheme.
Efficient Montgomery Modular Multiplication Algorithm Using Complement and Partition Techniques Speaker: Te-Jen Chang.
License Plate Recognition of A Vehicle using MATLAB
Shital ghule..  INTRODUCTION: This paper proposes an ATM security model that would combine a physical access card,a pin and electronic facial recognition.
UEF // University of Eastern Finland How to publish scientific journal articles? 10 STEPS TO SUCCESS lllllllllllllllllllllllllllllllll lllllllllllllllllllllllllllllllll.
Hybrid Cryptography using symmetric key Encryption Sean Laurel Rex Bashyam, Karthik Shankar, Sai Theja kadiyala and Abdelshakour Abuzneid Department of.
Visual Cryptography Given By: Moni Naor Adi Shamir Presented By: Anil Vishnoi (2005H103017)
Signature Recognition Using Neural Networks and Rule Based Decision Systems CSC 8810 Computational Intelligence Instructor Dr. Yanqing Zhang Presented.
Content Based Coding of Face Images
Digital Image Processing - (monsoon 2003) FINAL PROJECT REPORT
Crypto in information security
Computer Communication & Networks
ATM using fingerprint
Source:Journal of Real-Time Image Processing, vol.14, pp.41-50, 2016
A Secret Enriched Visual Cryptography
Hiding Multiple Watermarks in Transparencies of Visual Cryptography
Protection Mechanisms in Security Management
Author :Ji-Hwei Horng (洪集輝) Professor National Quemoy University
Title First name, last name, university, city, country
Rich QR Codes With Three-Layer Information Using Hamming Code
Presentation transcript:

S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti Chaudhary

CONTENTS  Problem Definition  Introduction  Related Work  Architecture and Modeling  Algorithms  Future Scope  Conclusion  References

P ROBLEM D EFINITION how to handle applications that require a high level of security, such as core banking and internet banking. The major issue in core banking is the authenticity of the customer

I NTRODUCTION Image Processing &Visual Cryptography Fundamental idea behind visual cryptography The basic scheme is 2 out of 2 visual cryptography scheme Following figure indicates simple 2 out of 2 visual cryptography scheme Share 1 Share 2 Share 1 + Share 2

2 Out 2 scheme for banking application The Correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer. A secret image consists of a collection of black and white pixels Visual Cryptography Scheme (VCS)

RELATED WORK A brief survey of the related work in the area of visual cryptography and its application in banking sector is presented in this section.

With the help of basic idea behind visual cryptography, many researchers performed the survey based on various cryptographic schemes. In the survey of VC schemes it has been found that the colorful secret also be shared using visual cryptography In 2008 the concept was proposed to use visual cryptography for banking applications In 2010, cheating prevention mechanism was stated using visual cryptography by Bin Yu But, it is observed in all these methodologies, there is no facility of authentication testing. In this paper, the author propose a VC method based on pixel matrices and a method for authentication

ARCHITECTURE AND MODELING The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme In all the cases, the shares are printed and handed-over to customer, just like any credit/debit card The post-processing is done on the decrypted image. Finally, the original image and the post processed image are compared to confirm the authenticity of the customer.

Four major functions are involved in the proposed technique. A. Pre-Processing The scanned image is initially converted into grey-scale image. The way to extract the objects from the background by the threshold value T

Where, T (x, y) is a locally varying threshold function The image f0 (x, y) is the morphological opening of f and the constant T0 is the result of global threshold applied on f0. The images after pre-processing are

B. Creation of Shares The basic assumption here is that the image is a collection of black and white pixels The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme C. Stacking It is a procedure of getting original image by stacking the shares The shares are stacked together in a way which properly aligns the sub-pixels,

Post Processing Morphological closing is applied initially. Closing of an image A by a structuring element B is a dilation followed by erosion, which is given as Then filters are used, The current algorithm uses Median filter.

E. A UTHENTICATION T ESTING If the shares of different signatures are stacked Figure - Share1 of Signature1 and Share2 of Signature2 (2 out of 2 Scheme)are stacked There is a possibility of producing a share which will result in some signature format, but not the actual signature. Such an attempt is overruled by comparing the decrypted signature with the original signature

Karl Pearsons correlation coefficient reveals the dependency or independency between the variables. If X and Y are two arrays, then the Karl Pearsons correlation coefficient between X and Y is computed using the formula

F UTURE SCOPE We can developed the schemes like 3 out of 4, 4 out of 4, 3 out of 5, 4 out of 5 and so on. When there is a joint account with more than two customers, one can go for such extended schemes. ATM machines should allow scanning facility so that the customer may scan his share at ATM. Customer may be authenticated based on password and the output image obtained using the share produced by him. In the future work, we can consider the colour images and try to improve the quality of decrypted image

CONCLUSION The aim of this paper is to design an efficient technique for checking authentication in care banking or net banking

REFERENCES Secure Authentication using Image Processing and Visual Cryptography for Banking Applications /13/$26 © 2013 IEEE A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR BANKING APPLICATIONS International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010 An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review ACEEE Int. J. on Network Security, Vol. 02, No. 04, Oct 2011

THANK YOU