Professional Documents
Culture Documents
Secured Bank Authentication Using Image Processing and Visual Cryptography
Secured Bank Authentication Using Image Processing and Visual Cryptography
T. Sridevi ( Assoc Prof , ECE dept ) D. N V Subba Rao ( IV / IV B.Tech ECE dept ) G. Amrutha Kamal ( IV / IV B.Tech ECE dept ) K L University
K L University
K L University
Topics to be covered
Introduction
Visual Cryptography
Methodology Conclusions
Introduction
Data Security and Authentication plays a vital role in any field.
security algorithms
So many technologies are emerging to provide high data security and authentication
Visual Cryptography
Cryptography is a technique which encrypts a plain text to a cipher text(of unknown format) using a key which
Visual Cryptography is cryptographic technique which encrypts an visual information (pictures ,text etc).
Methodology
Pre-Processing
Sharing
Stacking
Post-Processing
Correlation
Methodology
Original Image
Pre Processing
Pre Processed Image
Sharing
Share-1 Share-2
Stacking
Stacked Image
Post Processing
Original Image
Pre-Processing
Input image is converted to Grey scale image is and then global thresholded.
Sharing
The pre-processed image is divided into 2 different shares based on a pre-defined algorithm
original pixel
1 1 0 0
S0
0 00 01 1 1 1
S1
Input Image
if image(i,j) is 1 set share1=s0 set share2=s0 else set share1=s0 set share2=s1
Share 1
Share 2
Sharing
Fig. Share 1
Fig. Share 1
Stacking
Two shares are overlapped by using OR operation on the binary images ( share 1 and share 2)
Stacking
[ 1 0 1 0]
Stacking
Post processing
Morphological closing is done on the stacked image and the resultant image is passed through a median filter to get
Correlation
Stage that provides Authentication Stacked image and original image are correlated for
authentication
Authentication will succeed for a higher correlation coefficient , if not fails.
Conclusions