Open Access   Article Go Back

Resisting Cyber-attacks in Digital Banking using Visual Cryptography

B.V.Prasanthi 1 , Sridevi Bonthu2

  1. Department of Computer Science and Engineering, Vishnu Institute of Technology, Bhimavaram, India.
  2. Department of Computer Science and Engineering, Vishnu Institute of Technology, Bhimavaram, India.

Correspondence should be addressed to: prasanthibeera@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-10 , Page no. 355-359, Oct-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i10.355359

Online published on Oct 30, 2017

Copyright © B.V.Prasanthi, Sridevi Bonthu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

IEEE Style Citation: B.V.Prasanthi, Sridevi Bonthu, “Resisting Cyber-attacks in Digital Banking using Visual Cryptography,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.355-359, 2017.

MLA Style Citation: B.V.Prasanthi, Sridevi Bonthu "Resisting Cyber-attacks in Digital Banking using Visual Cryptography." International Journal of Computer Sciences and Engineering 5.10 (2017): 355-359.

APA Style Citation: B.V.Prasanthi, Sridevi Bonthu, (2017). Resisting Cyber-attacks in Digital Banking using Visual Cryptography. International Journal of Computer Sciences and Engineering, 5(10), 355-359.

BibTex Style Citation:
@article{Bonthu_2017,
author = {B.V.Prasanthi, Sridevi Bonthu},
title = {Resisting Cyber-attacks in Digital Banking using Visual Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {355-359},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1528},
doi = {https://doi.org/10.26438/ijcse/v5i10.355359}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.355359}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1528
TI - Resisting Cyber-attacks in Digital Banking using Visual Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - B.V.Prasanthi, Sridevi Bonthu
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 355-359
IS - 10
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
686 472 downloads 336 downloads
  
  
           

Abstract

With increasing demand of security, user authentication occupies prior in information security and plays a prominent role in protecting user`s privacy, which has become a critical issue nowadays. In this digital world the usage of online transactions became very common and at the same time various attacks are performed behind this. The most common method used for authentication in online banking is by providing text password, which is the combination of letters, sequence of characters and special symbols. Authentication system, based on text passwords is widely used but they can easily compromise with attacks. Users normally select simple passwords because they can easily memorize at the time of login. So providing more security than existing assists in protecting resources against unauthorized access. Image-based-authentication is a good alternative to traditional password system. Apart from many conventional cryptographic methods, visual cryptographic techniques have also been used for providing security to data. In this proposed work, Visual cryptographic scheme is used that encrypts a secret image by breaking into image shares. Along with text based password login, image based authentication using visual cryptography is included. This authentication system is useful for various sectors like industries, online banking and shopping.

Key-Words / Index Term

Information Security, Virtual cryptography, authentication, online banking, encryption

References

[1] B.V.Prasanthi ,”Cyber Forensics Tools : A Review” International Journal of Engineering Trends and Technology (IJETT),vol 41 no 5,pp.266-271,2016.
[2] Prasanthi, B. V., Prathyusha Kanakam, and S. Mahaboob Hussain. "Cyber Forensic Science to Diagnose Digital Crimes-A study."International Journal of Scientific Research in Network Security and communication (IJSRNSC), vol 50 no 2,pp.107-113,2017.
[3] Prasanthi, B. V., et al. "Security Enhancement of ATM System with Fingerprint and DNA Data." International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 12, pp. 477–479, Dec. 2014.
[4] Prasanthi, B. V., et al. "Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications ,vol 112 no 9,2015.
[5] P. S. Revenkar, Anisa Anjum and W. Z. Gandhare. ”Survey of Visual Cryptographic Schemes”. International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010.
[6] Feng Liu, Chuankun Wu, Xijun Lin. ”Step Construction of Visual Cryptography Schemes”. IEEE transactions on information forensics and security, vol. 5, no. 1, march 2010.
[7] A. Parakh and S.kak .”A Recursive Threshold Visual Cryptography Scheme ”. Department of Computer Science, Oklahoma State University Stillwater, OK 74078.
[8] N. Askari, H.M. Heys, and C.R. Moloney. ”An extended visual cryptography scheme without pixel expansion for halftone images”. 26th annual ieee canadian conference on electrical and computer engineering year 2013.
[9] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo. ”Halftone Visual Cryptography”. IEEE transactions on image processing, vol. 15, no. 8, august 2006.
[10] D. Jena and S. Jena . ”A Novel Visual Cryptography Scheme”. 978-07695-3516-6/08 2008IEE DOI 10.1109/ICACC.2009.109
[11] Kulvinder Kaur and Vineeta Khemchandani. ”Securing Visual Cryptographic Shares using Public Key Encryption”.3rd IEEE International Advance Computing Conference (IACC),pp.1108-1113,2013.
[12] Bhuyan, Sangeeta.” Image Security using Visual Cryptography”. Diss. 2015.
[13] Bonthu, Sridevi, B. V. Prasanthi, and K. Himabindu. "Automation Of Pre-Processing Of Students Data",vol 8 no 3,pp.241-245,2016.