Resisting Cyber-attacks in Digital Banking using Visual Cryptography
B.V.Prasanthi 1 , Sridevi Bonthu2
- Department of Computer Science and Engineering, Vishnu Institute of Technology, Bhimavaram, India.
- Department of Computer Science and Engineering, Vishnu Institute of Technology, Bhimavaram, India.
Correspondence should be addressed to: prasanthibeera@gmail.com.
Section:Research Paper, Product Type: Journal Paper
Volume-5 ,
Issue-10 , Page no. 355-359, Oct-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i10.355359
Online published on Oct 30, 2017
Copyright © B.V.Prasanthi, Sridevi Bonthu . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Citation
IEEE Style Citation: B.V.Prasanthi, Sridevi Bonthu, “Resisting Cyber-attacks in Digital Banking using Visual Cryptography,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.355-359, 2017.
MLA Citation
MLA Style Citation: B.V.Prasanthi, Sridevi Bonthu "Resisting Cyber-attacks in Digital Banking using Visual Cryptography." International Journal of Computer Sciences and Engineering 5.10 (2017): 355-359.
APA Citation
APA Style Citation: B.V.Prasanthi, Sridevi Bonthu, (2017). Resisting Cyber-attacks in Digital Banking using Visual Cryptography. International Journal of Computer Sciences and Engineering, 5(10), 355-359.
BibTex Citation
BibTex Style Citation:
@article{Bonthu_2017,
author = {B.V.Prasanthi, Sridevi Bonthu},
title = {Resisting Cyber-attacks in Digital Banking using Visual Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {10 2017},
volume = {5},
Issue = {10},
month = {10},
year = {2017},
issn = {2347-2693},
pages = {355-359},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1528},
doi = {https://doi.org/10.26438/ijcse/v5i10.355359}
publisher = {IJCSE, Indore, INDIA},
}
RIS Citation
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i10.355359}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1528
TI - Resisting Cyber-attacks in Digital Banking using Visual Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - B.V.Prasanthi, Sridevi Bonthu
PY - 2017
DA - 2017/10/30
PB - IJCSE, Indore, INDIA
SP - 355-359
IS - 10
VL - 5
SN - 2347-2693
ER -
![]() |
![]() |
![]() |
686 | 472 downloads | 336 downloads |




Abstract
With increasing demand of security, user authentication occupies prior in information security and plays a prominent role in protecting user`s privacy, which has become a critical issue nowadays. In this digital world the usage of online transactions became very common and at the same time various attacks are performed behind this. The most common method used for authentication in online banking is by providing text password, which is the combination of letters, sequence of characters and special symbols. Authentication system, based on text passwords is widely used but they can easily compromise with attacks. Users normally select simple passwords because they can easily memorize at the time of login. So providing more security than existing assists in protecting resources against unauthorized access. Image-based-authentication is a good alternative to traditional password system. Apart from many conventional cryptographic methods, visual cryptographic techniques have also been used for providing security to data. In this proposed work, Visual cryptographic scheme is used that encrypts a secret image by breaking into image shares. Along with text based password login, image based authentication using visual cryptography is included. This authentication system is useful for various sectors like industries, online banking and shopping.
Key-Words / Index Term
Information Security, Virtual cryptography, authentication, online banking, encryption
References
[1] B.V.Prasanthi ,”Cyber Forensics Tools : A Review” International Journal of Engineering Trends and Technology (IJETT),vol 41 no 5,pp.266-271,2016.
[2] Prasanthi, B. V., Prathyusha Kanakam, and S. Mahaboob Hussain. "Cyber Forensic Science to Diagnose Digital Crimes-A study."International Journal of Scientific Research in Network Security and communication (IJSRNSC), vol 50 no 2,pp.107-113,2017.
[3] Prasanthi, B. V., et al. "Security Enhancement of ATM System with Fingerprint and DNA Data." International Journal of Advanced Research in Computer Science and Software Engineering, vol. 4, no. 12, pp. 477–479, Dec. 2014.
[4] Prasanthi, B. V., et al. "Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions." International Journal of Computer Applications ,vol 112 no 9,2015.
[5] P. S. Revenkar, Anisa Anjum and W. Z. Gandhare. ”Survey of Visual Cryptographic Schemes”. International Journal of Security and Its Applications Vol. 4, No. 2, April, 2010.
[6] Feng Liu, Chuankun Wu, Xijun Lin. ”Step Construction of Visual Cryptography Schemes”. IEEE transactions on information forensics and security, vol. 5, no. 1, march 2010.
[7] A. Parakh and S.kak .”A Recursive Threshold Visual Cryptography Scheme ”. Department of Computer Science, Oklahoma State University Stillwater, OK 74078.
[8] N. Askari, H.M. Heys, and C.R. Moloney. ”An extended visual cryptography scheme without pixel expansion for halftone images”. 26th annual ieee canadian conference on electrical and computer engineering year 2013.
[9] Zhi Zhou, Gonzalo R. Arce and Giovanni Di Crescenzo. ”Halftone Visual Cryptography”. IEEE transactions on image processing, vol. 15, no. 8, august 2006.
[10] D. Jena and S. Jena . ”A Novel Visual Cryptography Scheme”. 978-07695-3516-6/08 2008IEE DOI 10.1109/ICACC.2009.109
[11] Kulvinder Kaur and Vineeta Khemchandani. ”Securing Visual Cryptographic Shares using Public Key Encryption”.3rd IEEE International Advance Computing Conference (IACC),pp.1108-1113,2013.
[12] Bhuyan, Sangeeta.” Image Security using Visual Cryptography”. Diss. 2015.
[13] Bonthu, Sridevi, B. V. Prasanthi, and K. Himabindu. "Automation Of Pre-Processing Of Students Data",vol 8 no 3,pp.241-245,2016.