19
SECURE AUTHENTICATION USING IMAGE PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti Chaudhary

S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

Embed Size (px)

Citation preview

Page 1: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

SECURE AUTHENTICATION USING IMAGE PROCESSING ANDVISUAL CRYPTOGRAPHY FOR BANKING APPLICATIONS

Guided By

Prof. Rashmi Welekar

Submitted By

Deepti Chaudhary

Page 2: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

CONTENTS

Problem Definition Introduction Related Work Architecture and Modeling Algorithms Future Scope Conclusion References

Page 3: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

PROBLEM DEFINITION

how to handle applications that require a high level of security, such as core banking and internet banking.

The major issue in core banking is the authenticity of the customer

Page 4: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

INTRODUCTION

Image Processing &Visual Cryptography Fundamental idea behind visual cryptography The basic scheme is 2 out of 2 visual cryptography

scheme Following figure indicates simple 2 out of 2 visual

cryptography scheme

Share 1

Share 2

Share 1+

Share 2

Page 5: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

2 Out 2 scheme for banking application

The Correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer.

A secret image consists of a collection of black and white pixels

Visual Cryptography Scheme (VCS)

Page 6: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

RELATED WORK

A brief survey of the related work in the area of visual cryptography and its application in banking sector is presented in this section.

Page 7: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

With the help of basic idea behind visual cryptography, many researchers performed the survey based on various cryptographic schemes. In the survey of VC schemes it has been found that the colorful secret also be shared using visual cryptography

In 2008 the concept was proposed to use visual cryptography for banking applications

In 2010, cheating prevention mechanism was stated using visual cryptography by Bin Yu

But, it is observed in all these methodologies, there is no facility of authentication testing.

In this paper, the author propose a VC method based on pixel matrices and a method for authentication

Page 8: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

ARCHITECTURE AND MODELING

The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme

In all the cases, the shares are printed and handed-over to customer, just like any credit/debit card

The post-processing is done on the decrypted image. Finally, the original image and the post processed image are compared to confirm the authenticity of the customer.

Page 9: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

Four major functions are involved in the proposed technique.

A. Pre-Processing

The scanned image is initially converted into grey-scale image.

The way to extract the objects from the background by the threshold value T

Page 10: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

Where, T (x , y) is a locally varying threshold function The image f0 (x , y) is the morphological opening of f

and the constant T0 is the result of global threshold applied on f0.

The images after pre-processing are

Page 11: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

B. Creation of Shares The basic assumption here is that the image is a

collection of black and white pixels

The following schemes are developed :- 2 out of 2 Scheme 2 out of 3 Scheme 3 out of 3 Scheme

C. Stacking It is a procedure of getting original image by stacking

the shares The shares are stacked together in a way which

properly aligns the sub-pixels,

Page 12: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti
Page 13: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

Post Processing Morphological closing is applied initially. Closing of an

image A by a structuring element B is a dilation followed by erosion, which is given as

Then filters are used, The current algorithm uses Median filter.

Page 14: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

E. AUTHENTICATION TESTING If the shares of different signatures are stacked

Figure - Share1 of Signature1 and Share2 of Signature2 (2 out of 2

Scheme)are stacked

There is a possibility of producing a share which will result in some signature format, but not the actual signature. Such an attempt is overruled by comparing the decrypted signature with the original signature

Page 15: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

Karl Pearsons correlation coefficient reveals the dependency or independency between the variables. If X and Y are two arrays, then the Karl Pearsons correlation coefficient between X and Y is computed using the formula

Page 16: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

FUTURE SCOPE We can developed the schemes like 3 out of 4, 4 out

of 4, 3 out of 5, 4 out of 5 and so on. When there is a joint account with more than two customers, one can go for such extended schemes.

ATM machines should allow scanning facility so that the customer may scan his share at ATM. Customer may be authenticated based on password and the output image obtained using the share produced by him.

In the future work, we can consider the colour images and try to improve the quality of decrypted image

Page 17: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

CONCLUSION

The aim of this paper is to design an efficient technique for checking authentication in care banking or net banking

Page 18: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

REFERENCES

Secure Authentication using Image Processing and Visual Cryptography for Banking Applications 978-1-4244-2963-9/13/$26 © 2013 IEEE

A (2, N) VISUAL CRYPTOGRAPHIC TECHNIQUE FOR

BANKING APPLICATIONS International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.4, October 2010

An Intelligent System for Secured Authentication using Hierarchical Visual Cryptography-Review ACEEE Int. J. on Network Security , Vol. 02, No. 04, Oct 2011

Page 19: S ECURE A UTHENTICATION USING I MAGE P ROCESSING AND V ISUAL C RYPTOGRAPHY FOR B ANKING A PPLICATIONS Guided By Prof. Rashmi Welekar Submitted By Deepti

THANK YOU