0% found this document useful (0 votes)
19 views

Secured Bank Authentication Using Image Processing and Visual Cryptography

The document proposes a method for secured bank authentication using image processing and visual cryptography. It involves pre-processing the input image, sharing it into two shares, stacking the shares back together, and post-processing the stacked image to retrieve the original. Visual cryptography allows encrypting visual information like pictures into shares that can be transmitted securely. When the shares are stacked together using an OR operation, authentication is performed by correlating the reconstructed image and original image. The method provides efficient authentication for applications like core banking.

Uploaded by

Lily Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

Secured Bank Authentication Using Image Processing and Visual Cryptography

The document proposes a method for secured bank authentication using image processing and visual cryptography. It involves pre-processing the input image, sharing it into two shares, stacking the shares back together, and post-processing the stacked image to retrieve the original. Visual cryptography allows encrypting visual information like pictures into shares that can be transmitted securely. When the shares are stacked together using an OR operation, authentication is performed by correlating the reconstructed image and original image. The method provides efficient authentication for applications like core banking.

Uploaded by

Lily Sharma
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Secured Bank Authentication Using Image Processing and Visual Cryptography

T. Sridevi ( Assoc Prof , ECE dept ) D. N V Subba Rao ( IV / IV B.Tech ECE dept ) G. Amrutha Kamal ( IV / IV B.Tech ECE dept ) K L University

K L University

K L University

Topics to be covered
Introduction

Visual Cryptography
Methodology Conclusions

Introduction
Data Security and Authentication plays a vital role in any field.

Increase in hacking efficiency is challenging the existing

security algorithms

So many technologies are emerging to provide high data security and authentication

Visual Cryptography

Cryptography is a technique which encrypts a plain text to a cipher text(of unknown format) using a key which

will be transmitted via 3rd party.

Visual Cryptography is cryptographic technique which encrypts an visual information (pictures ,text etc).

Methodology
Pre-Processing
Sharing

Stacking
Post-Processing

Correlation

Methodology
Original Image

Pre Processing
Pre Processed Image

Sharing
Share-1 Share-2

Stacking
Stacked Image

Post Processing
Original Image

Pre-Processing
Input image is converted to Grey scale image is and then global thresholded.

Fig. Original Image

Fig. Pre Processed Image

Sharing
The pre-processed image is divided into 2 different shares based on a pre-defined algorithm

The 2 shares are appended with 2 different


matrices based on the intensity value(0/1) in the

original pixel

1 1 0 0
S0

0 00 01 1 1 1
S1

Input Image

if image(i,j) is 1 set share1=s0 set share2=s0 else set share1=s0 set share2=s1

Share 1

Share 2

Sharing

Fig. Share 1

Fig. Share 1

Stacking

Stacking is a procedure of decoding the original image by overlapping the shares.

Two shares are overlapped by using OR operation on the binary images ( share 1 and share 2)

Stacking

[ 1 0 1 0]

Stacking

Fig . Stacked Image

Post processing
Morphological closing is done on the stacked image and the resultant image is passed through a median filter to get

the original image

Fig. Post Processed Image

Correlation
Stage that provides Authentication Stacked image and original image are correlated for

authentication
Authentication will succeed for a higher correlation coefficient , if not fails.

Conclusions

An efficient way for authentication check in core banking applications.

Can also be used to defense purpose, by encrypting hand


written documents to binary images.

You might also like