You are on page 1of 5

2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)

Visual Cryptography and Image Processing Based


Approach for Secure Transactions in Banking Sector
Aaditya Jain Sourabh Soni
Department of Computer Science & Engg., R. N. Modi Department of Computer Science & Engg., R. N. Modi
Engineering College, Rajasthan Technical University, Engineering College, Rajasthan Technical University,
Kota, Rajasthan, India Kota, Rajasthan, India
Email: aadityajain58@gmail.com Email: sonisourabh219@gmail.com

Abstract—The use of computers and internet has become so Handwritten) encrypts the input image into a set of other
pervasive so it influences all the banking sectors. Security has images called shares in such a way, if shares are printed on
become the most important aspect in today’s banking transaction transparencies and superimposed or staked over one another
system because banks are committed to provide secure core original secret is revealed. Simplest form of visual
banking services to their customers. To achieve this goal
cryptography or visual secret sharing scheme considers binary
authenticity of the users is required i.e. only the authorized users
can take part in the transaction. Regarding this purpose banks image as input and deals with each and every pixel
uses Biometrics based authentication systems but due to independently. To encode a pixel of the secret image, we split
unavoidable malicious activities database of the banking system the secret pixel into n versions in such a way that if all n
is no longer secure. Smart hackers can fetch biometric details of versions are printed on transparencies and superimposed the
customers from the bank’s database and later can use it for fake original secret pixel is revealed. This process has to be applied
transactions. To avoid all this catastrophic things Visual for entire secret image. Consequently n shares of original
cryptographic technique is used. Visual Cryptography is an secret image are ready, to reveal the secret print the shares on
efficient encryption scheme in which information hide inside the transparencies and superimpose them. Proposed authentication
images and decrypted only by human visual system. In this paper
method uses XOR operation based Visual Cryptography and
we propose a secure XOR operation based visual cryptography
and image processing technique to secure banking transaction. image processing techniques to ensure authentication as well
Here we consider the case of joint account operation. as security of the information stored in the bank database.
This paper is organized in the sections as, Section II
Keywords—Visual Cryptography, Image Processing, Secret describes summary of the related work for Visual
Sharing Scheme, XOR. Cryptography and its uses for authentication in banking
system. Section III describes the proposed work. Section IV
I. INTRODUCTION and V present experimental description and conclusion based
Generally, in banking sector Biometrics based on proposed work and experimental results.
authentication is used. Biometrics based authentication system II. RELATED WORK
operates by obtaining raw biometric data (e.g., Face image,
Fingerprints etc) from the subject, extracting feature set from This section presents a brief summary of the Visual
the raw data and comparing the feature set against the Cryptography and its uses in Banking System. For
blueprint stored in the database in order to authenticate the safeguarding the cryptographic systems keys G. Blakely[4]
subject or to verify claimed identity. Security of any and A. Shamir[1] in 1979 independently developed (t, n)-
institute/organization depends on underlying design secret sharing scheme, it mean that if at least t out of n shares
technology middle-ware and most of on the design of the are combined in a particular manner the secret can be
database. Every transaction spatial or temporal has impact on revealed. If less than t shares are available, then secret cannot
the database. Therefore hackers always try to hack the be revealed. G. Blakely secret sharing scheme is based on
database. The banking system while offering web enable core vector space and A. Shamir secret sharing scheme is based on
services major issue is authentication of the user. Many polynomial interpolation.
techniques are used for this purpose i.e. Password based The Visual Cryptography[1][2][3][12][13][14] used for
authentication, Smart card based authentication, Biometric sharing visual secrets developed and pioneered by Moni Noar
based authentication system. All these techniques are required and Adi Shamir in 1994. Fig. 1 and Fig. 2 represent the basic
to maintain database hence vulnerable for hacking. Database concepts of the Visual Cryptography schemes (VCS). Fig.1. is
contains private information therefore there is possibility of for OR operation based two out of two threshold VCS. For
privacy loss.1 example suppose that white pixel of the secret image is to be
Visual Cryptography [1][2][3][12][13][14] is a secret shared between two participants. We can divide white pixel
sharing scheme that takes secret image as input(i.e. Printed, into two shares S1 and S2 as shown in Fig. 1. Share S1 is
represented by two combination of black and white blocks as
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)

row 1 and row 2 of Fig.1. Black block represents 1 and white problem of contrast and pixel expansion in comparison to the
block represents 0. Therefore S1 in row 1 is represented by original secret image. Ateniese et al [5] developed the general
binary string 10 and in row 2 by 01. In the same way S2 in access structure scheme of the Visual Cryptography. This
row 1 and row 2 is represented by binary string 10 and 01. scheme is flexible to number of shares while reconstruct the
Here white pixel 0 is divided into two binary strings secret. Chetana Hedge et al [6], B. Srikanth et al [7] and
corresponding to S1 and S2. When OR Operation is performed Sridevi Thota et al [8] developed a Signature based
between S1 and S2 white pixel is revealed with 50 percent authentication method. Iris authentication system using Visual
accuracy. But reconstructed white pixel is two times of cryptography scheme developed by P.S. Revenker et al [9].
original one due to pixel expansion. In the same way Black All the methods [7][8][9][10] are based on OR operation
pixel is divided into two shares S1 and S2 as row 3 and row 4 based Visual Cryptography Schemes. Therefore generated
of Fig. 1. When OR Operation is performed between S1 and shares have problems of contrast loss and pixel expansion.
S2 Black pixel is revealed with 100 percent accuracy but Hence requires large amount of storage space and bandwidth
reconstructed Black pixel is two times of the original Black during transmission.
pixel.
III. PROPOSED WORK

A. Problem Definition
Two user have to open joint account and want to operate in
such a way that if both are present then only bank can perform
the transaction otherwise not because of trust on each other.
Given two images, using these images we obtain secret image
in binary form then divide it into shares [11] using (2,2)-
VCSXOR while underlying operation is XOR. In the next step
assume one of the shares generated previously as secret image
and further divided using the same scheme to generate two
shares. Reconstruct the secret image from the shares. Now
check for validity of the reconstructed image.
B. Proposed Method
Banking system provides the facility of having joint
account and operates jointly or individually. In case of
individual operation it does not mean to have joint account but
Fig. 1 (2, 2)-VCSOR scheme it provides flexibility to the members of joint account to
operate individually. In some cases socially it is not secure.
Suppose A and B have joint account and at later time A gets
adverse to B and wish to withdraw all the money from the
account. In this case B is cheated by A. In the proposed
method it is ensure that transaction is only possible when both
the users are available. It also ensure that nobody can misuse
the information stored in the database because Shares are
random noise like images and nobody can get any clue from a
single share even he apply enormous amount of computing
power and time. In the proposed method gray images of both
the user are taken as input and processed for further use.
Overall process is divided into two phases: Encryption phase
and Decryption phase.

1) Encryption Phase: Encryption phase is further divided


into Preprocessing and Share Generation. It is shown in
Fig. 3.
Fig. 2 (2, 2)-VCSXOR Scheme Preprocessing: At the time of registration for joint
account user A and user B have to present the face image
This process is applied to all Black and White pixels of the to the bank. Respective authority preprocesses and
binary image, consequently two shares are generated. When generates joint identity of the users A and B. This joint
shares are printed on transparencies and superimposed on each identity of the users A and B is called secret image.
other secret image is revealed. The recovered image has the
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)

Share Generation: Secret image is fed as input to the


share generation process. Two share are generated for the
secret image using (2,2)-VCSXOR Scheme as shown in
Fig. 2 One share is called as Bank which is kept in bank
database, and other is called Users share and further
divided using the same scheme into two share share1 and
share 2, share1 is given to user A and share2 to the user
B.

Fig. 4 Decryption phase

C. Algorithmic Procedure
Pipelining of the overall process is given here.
1. Take two gray images as input.
2. Preprocess to make the images in binary form with
size.
3. Concatenate the images.
4. Divide the concatenated image into two shares using
(2,2)-VCSXOR.
5. Further divide one of the shares generated in step 4 by
using same scheme.
6. Construct the secret image from the shares generated
in steps 4 and 5.
7. Compare with secret image to check the acceptability
of the reconstructed image.
IV. EXPERIMENT AND RESULTS
The experiment is carried out using MATLAB. Various
activities viz. preprocessing, conversion of images from gray
image to black and white, creation of shares, reconstruction of
the secret is also performed using the functions defined in the
image processing tool box. Initially users image are
considered gray and resize to make the size of both the user
images same. Figure 5 (a) and Fig. 5 (b) are gray images taken
Fig. 3 Encryption phase
as input while Fig. 5(c) and Fig. 5 (d) are preprocessed binary
2) Decryption Phase: When users have to perform the images obtained from gray images Fig. 5(a) and Fig. 5(b)
transaction they have to provide their shares to the bank. respectively. Secret image as shown in Fig. 8 (a) is obtained
Bank performs the XOR operation between the user’s from the Fig. 5(c) and Fig. 5 (d). After that Secret image Fig.
shares and generates the Users share. To reconstruct the 8 (a) is divided into shares Fig. 6 (a) and Fig. 6 (b). We keep
secret image XOR operation is performed between Users Fig. 6 (a) in the database and Fig. 6 (b) is further divided into
share and Banks share. This process reconstructed the the shares Fig. 7 (a) for A and Fig. 7 (b) for B. Reconstructed
secret image, which is as same as secret image because of secret image as shown in Fig. 8 (b) is obtained by using the
associative nature of XOR operation. It is shown in Fig. 4. shares Fig. 6 (a), 7(a) and Fig. 7 (b).
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)

Fig. 7 Users’ share


a.Image1 b.Image2

c. Preprocessed Image1 d. Preprocessed Image2


Fig. 5 Input and preprocessed images

Fig. 8 (a) Secret image (b) reconstructed image

V. CONCLUSION
The visual cryptography scheme is also known as secret
sharing scheme. In this method original image is secured by
decomposing it into n shares. This paper mainly focuses on
issues related to the identity theft and customers data security
in the joint account transaction. For secure Banking
Transaction in joint account operation this paper proposed a
method that is based on (2, 2)-VCSXOR. Experimental results
show that reconstructed secret image is same in size and
quality of the original secret image.
Fig. 6 (a) Bank share (b) user share

ACKNOWLEDGMENT
We would like to express our deep sense of respect and
gratitude towards all the faculty members, Department of
Computer Science & Engineering in our college, and all who
have been the guiding force behind this work. Without their
unconditional support it wouldn't have been possible.

REFERENCES
[1] M. Naor and A. Shamir, “Visual cryptography, in
Workshop on the Theory and Application of
Cryptographic Techniques, pp: 1–12, Springer, 1994.
2017 2nd International Conference on Telecommunication and Networks (TEL-NET 2017)

[2] R. Shaikh, S. Siddh, T. Ravekar, S. Sugaonkar, “Visual [10] S. Wan, Y. Lu, X. Yan, L. Liu, “Visual Secret Sharing
Cryptography Survey”, International Journal of Computer Scheme with (k, n) Threshold Based on QR Codes”, 12th
Applications , vol. 134, no.2, 2016. International Conference on Mobile Ad-Hoc and Sensor
[3] V. Purushothaman, S. Sreedhar, “An improved secret Networks (MSN), pp: 374 - 379, 2016.
sharing using XOR-based Visual Cryptography”, IEEE [11] Shyong Jian Shyu, “XOR-based Visual Cryptographic
Online International Conference on Green Engineering Schemes with Monotonously Increasing and Flawless
and Technologies (IC-GET), pp: 1 – 4, 2016.. Reconstruction Properties”, IEEE Transactions on
[4] G.R. Blakley, “Safeguarding cryptographic keys,” Proc. Circuits and Systems for Video Technology, Issue 99,
of the National Computer Conference1979, vol. 48, pp: 2017,
313–317, 1979. [12] F. Liu, C. Wu, and X. Lin, “Step construction of visual
[5] G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, cryptography schemes,” IEEE Transactions on
“Visual cryptography for general access structures”, Information Forensics and Security, vol. 5, no. 1, pp: 27
Information and Computation, vol. 129, no. 2, pp: 86– 38, 2010.
106, 2002. [13] S. Roy, P.Venkateswaran, “Online Payment System using
[6] C. Hegde, S. Manu, P. D. Shenoy, K. Venugopal, and L. Steganography and Visual Cryptography,” Proceedings of
Patnaik, “Secure authentication using image processing IEEE Students’ Conference on Electrical, Electronics and
and visual cryptography for banking applications,” in Computer Science, 2014.
Advanced Computing and Communications, 2008. [14] V. Suruthikeerthana1 , Dr. S.Uma , “An Extended Visual
[7] B. Srikanth, G. Padmaja, S. Khasim, P. Lakshmi, and A. Cryptography With Dynamically Authenticated Error
Haritha, “Secured bank authentication using image Avoidance Scheme For Bank Applications”, International
processing and visual cryptography,” IJCSIT, vol. 5, no. Journal Of Research In Computer Applications And
2, 2014. Robotics, vol 4, no. 4, pp: 15-23, 2016.
[8] S. Thota, N. V. Dupaguntla, and A. K. Gummadi,
“Secured bank authentication using image processing and
visual cryptography,” IJST, vol 6, no.2, pp: 32-40, 2013.
[9] P. Revenkar, A. Anjum, and W. Gandhare, “Secure iris
authentication using visual cryptography,” arXiv preprint
arXiv: 1004.1748, 2010.

You might also like