Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing
B Mehta1 , T Varshney2 , YMandloi 3 , J Belel4 , V Deshmukh5 , 6
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-4 , Page no. 62-67, Apr-2017
Online published on Apr 30, 2017
Copyright © B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, , “Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.62-67, 2017.
MLA Citation
MLA Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, "Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing." International Journal of Computer Sciences and Engineering 5.4 (2017): 62-67.
APA Citation
APA Style Citation: B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, , (2017). Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing. International Journal of Computer Sciences and Engineering, 5(4), 62-67.
BibTex Citation
BibTex Style Citation:
@article{Mehta_2017,
author = {B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh, },
title = {Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {62-67},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1242},
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1242
TI - Implementation of Secure Bank Authentication using Visual Cryptography and Image Processing
T2 - International Journal of Computer Sciences and Engineering
AU - B Mehta, T Varshney, YMandloi, J Belel, V Deshmukh,
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 62-67
IS - 4
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
780 | 631 downloads | 612 downloads |




Abstract
With the advent of e-commerce and electronic transactions the need for development of secured systems has grown tremendously. The need for security of information is especially affecting the banking sector. This paper implements an algorithm which proposes an efficient way for decreasing forgery during bank transactions using Visual Cryptography and Image Processing. Visual Cryptography is a generic cryptography technique which takes an image as input for encryption and makes use of human visual system rather than automated computing machines for decryption. Here we use a modified version of Visual Cryptography in which a combination of mechanical process and computation process is used for decryption. Due to the ease of implementation, this technique can be implemented by the people with non-technical background. It encrypts the visual data by dividing it into shares and decrypts the data by stacking some or all shares. Image Processing is used to perform operations on the image. The technique used in this paper works on the signature of the account holder for authentication.
Key-Words / Index Term
Visual Cryptography, Bank Security, Secret image sharing
References
[1] M. Naor, A. Shamir, “Visual Cryptography”, Advances in Cryptography-Eurocrypt, Springer, US, pp.1-12,1994.
[2] B. Srikanth, G. Padmaja, S. Khasim, P.V.S. Lakshmi, A. Haritha, “Secured Bank Authentication using Image Processing and Visual Cryptography”, IJCSIT, Vol. 5, Issue.2, pp.1-6, 2014.
[3] W-Q. Yan, D. Jin, M. S. Kanakanahalli, “Visual Cryptography for Print and Scan Applications”, ISCAS04, Canada, pp.572-575, 2004.
[4] Bernd Borchert, “Segment-Based Visual Cryptography” WSI Press, Germany, pp.1-320, 2007.
[5] C-C. Lin, W-H. Tsai, “Visual cryptography for graylevel images by dithering techniques”, Science Direct, Vol.24, Issue.3, pp.340-358, 2003.
[6] D. Chaudhary, R. Welekar, “Secure Authentication Using Visual Cryptography”, International Journal Of Computer Science and Applications, Vol. 8, No. 1, pp. 1-4, 2015.
[7] N. Anusha, P. SubbaRao, “Visual Cryptography Schemes for Secret Image”, IJERT Vol. 1 Issue 5, pp. 1-9, 2012.
[8] H. Yan, Z. Gan and K. Chen, ”A Cheater Detectable Visual
Cryptography Scheme”, Journal of Shanghai University, vol. 38, no.1, pp.107-110, 2004.
[9] Md. A. Mushtaque, “Comparative Analysis on Different parameters of Encryption Algorithms for Information Security” , International Journal of Computer Sciences and Engineering, Vol. 2, Issue. 4, pp.76-82, 2014.