You are on page 1of 16

Secured Bank Authentication Using Image Processing and Visual Cryptography

T. Sridevi ( Assoc Prof , ECE dept ) D. N V Subba Rao ( IV / IV B.Tech ECE dept ) G. Amrutha Kamal ( IV / IV B.Tech ECE dept ) K L University

K L University

K L University

Topics to be covered
Introduction

Visual Cryptography
Methodology Conclusions

Introduction
Data Security and Authentication plays a vital role in any field.

Increase in hacking efficiency is challenging the existing

security algorithms

So many technologies are emerging to provide high data security and authentication

Visual Cryptography

Cryptography is a technique which encrypts a plain text to a cipher text(of unknown format) using a key which

will be transmitted via 3rd party.

Visual Cryptography is cryptographic technique which encrypts an visual information (pictures ,text etc).

Methodology
Pre-Processing
Sharing

Stacking
Post-Processing

Correlation

Methodology
Original Image

Pre Processing
Pre Processed Image

Sharing
Share-1 Share-2

Stacking
Stacked Image

Post Processing
Original Image

Pre-Processing
Input image is converted to Grey scale image is and then global thresholded.

Fig. Original Image

Fig. Pre Processed Image

Sharing
The pre-processed image is divided into 2 different shares based on a pre-defined algorithm

The 2 shares are appended with 2 different


matrices based on the intensity value(0/1) in the

original pixel

1 1 0 0
S0

0 00 01 1 1 1
S1

Input Image

if image(i,j) is 1 set share1=s0 set share2=s0 else set share1=s0 set share2=s1

Share 1

Share 2

Sharing

Fig. Share 1

Fig. Share 1

Stacking

Stacking is a procedure of decoding the original image by overlapping the shares.

Two shares are overlapped by using OR operation on the binary images ( share 1 and share 2)

Stacking

[ 1 0 1 0]

Stacking

Fig . Stacked Image

Post processing
Morphological closing is done on the stacked image and the resultant image is passed through a median filter to get

the original image

Fig. Post Processed Image

Correlation
Stage that provides Authentication Stacked image and original image are correlated for

authentication
Authentication will succeed for a higher correlation coefficient , if not fails.

Conclusions

An efficient way for authentication check in core banking applications.

Can also be used to defense purpose, by encrypting hand


written documents to binary images.

You might also like