Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

International Journal of Advanced Science and Technology

Vol. 29, No. 3, (2020), pp. 13610 - 13616

A Survey on implementing multi image based encryption


technique in Banking System

Abstract
Core banking is a set of services provided by a group of networked bank branches. Bank customers may
access their funds and perform other simple transactions from any of the member branch offices. The
major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the
databases on the Internet, it is always quite difficult to trust the information on the Internet. To solve this
problem of authentication, we are proposing an algorithm based on image processing and visual
cryptography. This paper proposes a technique of processing the signature of a customer and then dividing
it into shares. Total number of shares to be created is depending on the scheme chosen by the bank. When
two shares are created, one is stored in the bank database and the other is kept by the customer. The
customer has to present the share during all of his transactions. This share is stacked with the first share to
get the original signature. The correlation method is used to take the decision on acceptance or rejection of
the output and authenticate the customer.
Keywords: Image processing, visual cryptography,authentication.
1.Introduction:
Nowadays, banking system has been more accessible than ever to perform essential duties e.g online
transfer, change account information without having the need to visit nearby bank and perform all of them
through online. While the online access to banking functionality for users has given great flexibility but it
requires sufficient security provided by the banking company to help protect from unauthorized access to
user's accounts and also help the user to perform his activity securely maintaining the privacy. The objective
of this project is to design such banking application securely with multi image encryption technique
according to design guidelines as image based encryption cannot be told or shared with anyother as it is a
visual memory and as well perform security testing to expose the vulnerabilities. In following sections, users
of the system and their functionality is presented. Steganography and Cryptography both techniques are used
for data confidentiality.
2.Literature Survey:
Nabil Ben Slimane, Nahed Aouf,Kais Bouallegue and Mohsen Machhout [1], discussed the Hash
key-based image cryptosystem using chaotic maps and cellular automata.The ciphered image was obtained,
analyzed and compared to the recent encryption schemes using a series of statistical tests.The efficient and
light weight cryptosystem for image encryption is proposed using confusion diffusion architecture. The
Secure Hash Algorithm SHA-256 is used to generate the initial condition of chaotic maps.

Aaditya Jain and Sourabh Soni [2], discussed the Visual Cryptography and Image Processing based
Approach for Secure Transactions in Banking Sector.Two gray images is taken as input and preprocessed and
then concatenated.Further, they are divided into two shares and secret image is constructed from the
generated shares. For secure Banking Transaction in joint account operation this paper proposed a method
that is based on (2, 2)-VCSXOR.

ISSN: 2005-4238 IJAST 13610


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng and Dechang
Chen [3]. Discussed A Secure and Practical Authentication Scheme Using Personal Devices.The proposed
protocol can be used in different domains such as online banking,e-government and e-health. Elliptic
Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Integrated Encryption Scheme (ECIES) is
adopted. The ECDSA-256 algorithm with key size of 256-bit and SHA256 hash function is used to sign the
ticket by the registered device, and ECIES-256 with key size of 256-bit is utilized to encrypt.Finally the
server decrypts and verify the ticket.

Joseph Bonneau, Cormac Herley, Paul C. van Oorschot, Frank Stajano[4], discussed The Quest to
Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. Proxy-
based schemes place a man-in-the-middle between the user’s machine and the server. One reason for
doing so, employed by Impostor and URRSA is to enable secure logins despite malware-infected clients.
URRSA has users authenticate to the end server using one-time codes carried on a sheet of paper. OpenID
reduces most attacks to only the password authentication between a user and his or her identity provider

Afnan Al-Ali, and Turki Abdalla[5],discussed Chaos Based Image Encryption and Decryption.
The basic principle of encryption with chaos is based on the ability of some dynamic systems to produce
sequence of numbers that are random in nature. The chaos-based encryption algorithm is as follows: after
wavelet transformation, an amount of 25% (in case of one-level decomposition) or 6.25% (in case of two-
level decomposition) of the original image, which corresponds to the important part, is transformed into
one-dimensional vector with a dimension equal to the important part size .

Xingyuan Wang and Dapeng Luan [6], discussed A novel image encryption algorithm using chaos
and reversible cellular automata. Logistic map, which is a simple and classic nonlinear model, is used in
many image encryption algorithms. The proposed algorithm composes of two parts: confusion and
diffusion stage. In the confusion stage, we shuffle image on unit-level which is a much smaller level than
pixels by using chaotic maps. The reversible cellular automata is performed on higher half pixel bits
many rounds in diffusion stage. After confusion and diffusion, we get the cipher image.

Adel Khelifi , Maher Aburrous , Manar Abu Talib , P.V.S. Shastry [7], discussed the Enhancing
Protection Techniques of E-Banking Security Services Using Open Source Cryptographic Algorithms. the
most widely used algorithms appear to be two-key triple DES and RC4 for symmetric ciphers to assure
the confidentiality of the transaction data in Internet banking systems, RSA with a 1024-bit key for an
asymmetric cipher and a digital signature, and SHA-1 for a hash function according to international
standards and guidelines related to the financial transactions. AES-128 makes use of 128 bit of cipher key
and 128 bits of data block. It performs K rounds of encryption before finally gives the cipher text.

Chetana Hegde, Manu S , P Deepa Shenoy, Venugopal K R and L M Patnaik [8], discussed Secure
Authentication using Image Processing and Visual Cryptography for Banking Applications.The images of
format JPEG or GIF is encrypted and two or three shares based on the scheme is opted. Four major
functions are involved in the proposed technique. The first function is to pre-process the given image to
remove the possible noise and to get the clarity. The second function is to encrypt the image based on
white and black pixels and to get two transparencies. The third function is the overlay/stack the available
shares to get the image containing signature.

ISSN: 2005-4238 IJAST 13611


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

Sesha Pallavi Indrakanti and Avadhani [9],discussed Segment based Visual Cryptography for key
distribution. The random seven segment number with parallel segments is subjected to the encryption
process which is based on the visual cryptography and algorithm. The decryption process is a very simple
and easy for a non-technical person to use. The shares are printed and stacked on each other to view the
secret, the segments belonging to the first subset show transparent areas when the two shares are stacked.

Hyoung Joong Kim, Vasiliy Sachnev, Su-Jeong Choi, Shijun Xiang[10], discussed An Innocuous
Visual Cryptography Scheme. The goal of the innocuous visual cryptography is to keep the share Sk as
close as the input image Pk such as Sk ' Pk and recover the hidden image U by manipulating n valid
shares and applying simple mathematical operations. ystem. In order to enhance robustness against
malicious attacks, this scheme should incorporate the robust data hiding schemes

3. Architecture Of The System:

Figure 1. Overall Functional Architecture of the Proposed System

The diagram above is functional architecture for the multi-image-based encryption for banking system. The
image of the user is taken as the input and it is processed.Further,the image is embedded using secret key and
it is divided into several blocks for processing. Finally, the image is stored in the database. When the user
login, the image of the user is captured and it is compared with the pixelated image.If it matches, the user
autentication is validated and transaction is done. Steganography embeds secret data into digital carriers like

ISSN: 2005-4238 IJAST 13612


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

image, audio, video etc such that it cannot be easily detected by the Human Visual System (HVS). There are
five types of steganography on the basis of carrier object that is used for embedding the secret data .The
percentage of images which are accepted as known face images although they are unknown is called as False
Acceptation Rate (FAR). This value represents error rate for Acceptation of unknown images.The percentage
of images which are rejected as unknown face images although they are known and exists in training set or
database is called as False Rejection Rate (FRR). This value represents error rate for Rejection of known
images.

Figure 2. Overall System Architecture of the Proposed System

4.Implementation:
1. Image GUI input module
2. Image encryption and decryption module
3. User validation module

4.1. Image GUI input module:

The GUI is used to enable the user to interact with the application.Here,the end-to-end encrypted
image of the user is given as the input and the validation of user login is the output. The software used is

ISSN: 2005-4238 IJAST 13613


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

Anaconda and the programming language used is Python.The encrypted image after steganography is stored
in the database and the compared with the image of the user during login and allows transaction if the image
matches.

4.2. Image encryption and decryption module

Encryption - Here we take the images by using an external interface, then we will divide the images into
two parts. Each part of the image will be treated as a single image; we can say 1, 2, 3 & 4. At this stage we
use hashing technique to enhance security The separate confidential images that have to be transmitted from
one end to another are combined to form a single overlapped image. Then the overlapped image is encrypted
using an algorithm so that the intruder cannot gain access to the original images forwarded.
Decryption - At the receiver end the receiver should have complete authorization to access the forwarded
image. The access is given only if the image encrypted is same as the image stored in the dataset after
Steganography.

4.3. User validation module

ISSN: 2005-4238 IJAST 13614


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

Validation Rules should be controlled by the application, so that end-users are unable to enter invalid
data. Sometimes, you may need to change the rules according to your requirements. If you implemented your
rules with custom code, you will need to change your code and re-build the application. At the same time, this
approach does not let administrators change Validation Rules. To avoid these problems, we provide a special
Validation module. This module allows for the easy and effective control of user input. There are certain
validation rules for user validation and based on that rules the data to be validated is treated.The user input is
checked with the stored data and validated if it matches and the access is granted for transaction.

5.Results and Discussions:


This algorithm was designed and implemented for checking authenticity of the customer in core-
banking and internet backing application . Secure authentication using image processing and visual
cryptography for Banking applications involves perfect security, decryption (secret restoration) without the
aid of a computing device and robustness against lossy compression and distortion due to its binary attribute
makes this approach as a way for defining a secure channel for validation and making transactions.
6. Conclusion:
Hence the proposed system involves a multi-image based encryption system using steganography
that cannot be shared by any means since it is a visual memory and transaction can also be done in a more
effective way. This secured system gives no way to the fraudulent callers for stealing the data.This algorithm
solved the current issues in banking system that uses PIN number and OTP which can be easily hacked even
by amateur hackers.

7. References:

[1] “Hash key-based image cryptosystem using chaotic maps and cellular automata”, published in
International Multi-Conference on Systems, Signals & Devices, 2018

ISSN: 2005-4238 IJAST 13615


Copyright ⓒ 2020 SERSC
International Journal of Advanced Science and Technology
Vol. 29, No. 3, (2020), pp. 13610 - 13616

[2] “Visual Cryptography and Image Processing Based Approach for Secure Transactions in Banking Sector”,
published in International Conference on Telecommunication and Networks, 2017

[3] “A Secure and Practical Authentication Scheme Using Personal Devices”, published in IEEE Access,
volume 5, 2017

[4] “The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication
Schemes”, published in IEEE Symposium on Security and Privacy, 2012

[5] “Chaos Based Image Encryption and Decryption”, published in International Journal of Advanced
Research in Computer and Communication Engineering, 2016

[6] “A novel image encryption algorithm using chaos and reversible cellular automata”, published in
Communication in Nonlinear science and numerical simulation ,Vol .8 , Issue ,11,2013.

[7] “Enhancing Protection Techniques of E-Banking Security Services Using Open Source Cryptographic
Algorithms ”, published in International Conference on Software Engineering, Artificial Intelligence,
Networking and Parallel/Distributed Computing,2013

[8] “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications”,
published in International Conference on Advanced Computing and Communications, 2008

[9] “Segment based Visual Cryptography for key distribution”, published in International Journal of
Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012

[10] “An Innocuous Visual Cryptography Scheme”, published in International Workshop on Image Analysis
for Multimedia Interactive Services, 2007

ISSN: 2005-4238 IJAST 13616


Copyright ⓒ 2020 SERSC

You might also like