SlideShare una empresa de Scribd logo
1 de 34
IMPLEMENTATION OF VISUAL
CRYPTOGRAPHY FOR BIOMETRIC
IMAGE WITH HASHING &
STENOGRAPHY FOR SECURED
AUTHENTICATION
ABSTRACT
•Visual cryptography schemes suffer from the drawback
of large pixel expansion of share images and bad visual
quality of the recovered image.
• To provide secrecy, we go for pixel expansion and
increasing number of shares, this causes the bad visual
quality of the recovered image.
•In this project, I construct (n, n)-VCS and OR and
XOR operations are used for share creation and stacking
process, which proves better in contrast and pixel
expansion.
•The proposed method uses additional matrix to
increase the secrecy of the message in XOR operation
INTRODUCTION
• BIOMETRICS is the science of
establishing the identity of an individual
based on physical or behavioral traits such
as face, fingerprints, iris, gait, and voice.
• A biometric authentication system
operates by acquiring raw biometric data
from a subject (e.g., face
image), extracting a feature set from the
data (e.g., eigen-coefficients), and
comparing the feature set against the
templates stored in a database
EXISTING SYSTEM
•In the Existing system, there is big Security
any other than User Name & the Password.
User Name & the Password or the Account
Number and the PIN Number is well known
Authentication Process, but then nowadays it
is very easy to break all those Authentication
System.
•So Existing System, doesn’t have nay big
Security features.
PROPOSED SYSTEM
•In the Proposed Model, the Finger Print image
which is obtained from the User and it is spitted
into two halves namely Share 1 & Share 2.
•Share 1 is kept by the Server. Share 2 is Provided
to the User. Both the Shares are converted into
Hash Codes.
•During User Login User will be giving the S
•hare 2 Image, which would be converted into
Hash Codes. The Main Image which is stored in
the server is also converted into Hash Codes.
• One Time Password is generated to the User’s
Mobile number before user gives the Share 2
Image.
Cont..
•User is permitted to give the Share 2 Image
only after authentication.
• Hash Code of Share 2 and Hash Code of
Share 1 are combined to get Original Image
Hash Code.
•This generated Original Image Hash Code is
compared with the Original Image Hash
Code for Authentication.
•The user is allowed to access the bank
Server only after this Authentication. This
Process ensures proper Security Scheme.
SYSTEM REQUIREMENTS
Software Requirements
•Java1.5 or More
•MS-SqlServer
Hardware Requirements
Hard disk : 40 GB
• RAM : 128mb
• Processor : Pentium
MODULES
•USER REGISTRATION
•SERVER
•STEGANOGRAPHY
•VISUAL CRYPTOGRAPHY
•HASHING
•COMPARISON OF HASHING
•DESTEGANOGRAPHY
•AUTHENTICATION
USER REGISTRATION
•In our project, we have to register the user with
certain details for his future retrieval process.
Without registering, a user can’t access the further
details.
• For registering, the user should give the User
name and password.
•Once a user registered his details he can access
the system further. Each user will be identified by
a unique username and password.
Server
•A server is a computer program running to serve
the requests of other programs, the "clients".
•Thus, the "server" performs some computational
task on behalf of "clients".
•The clients either run on the same computer or
connect through the network.
•Here the Server acts as the main resource for the
client. Server is responsible for maintaining all the
client information.
• Further the server is responsible for the security
process provided in the input image. after all
verification, server will finally authenticate the
user.
Visual Cryptography
•Visual Cryptography is a methodology
through which the steganographed image is
divided into two shared parts.
•The image is spitted into two parts so that
the security level will be increased.
Hashing
•Hashing is a process which includes the
conversion of the Crypto graphed image into the
hash code bytes.
•This conversion is done by using SHA-1
algorithm.
•This process has been done for both the divided
parts and one of the hash code parts is sent to the
user for the further login process and the other
hash code is in the server.
De-steganography
•The Server receives the Steganographed
Image, which is then made De-
Steganography to get the Finger Print Image
& the Encrypted PIN Number.
•This Encrypted PIN Number is decrypted
to achieve the Original PIN Number.
•Now the Finger print and Pin number will
be used for authentication process.
Authentication
•After receiving the desteganographed
image, the authentication process is
done by means of comparing the
original image with it and thus the
secured level of authentication is done
through Steganography and Visual
cryptography.
Obtaining the Thumb Image
•During the creation of new account a user
need to provide all his/her details.
•In addition to this we obtain the thumb
image of the user which is the unique
identification each user that has been stored
in the database.
•The obtained thumb image is used for the
further process.
Steganographing the Pin Number
•Steganography is art of hiding information inside
information.
•In our process the pin number of the user is
hidden into the user thumb image which avoids
the weak links of the bio-metric system.
•User registers to the server by providing their
details such as Name, Date of birth, Occupation
Address and Thumb image which will be stored
in the server database.
Share Creation Process
•The secret pin number of the user is
Steganographed with the thumb image.
•The generated Steganographed thumb image is
divided into two shares.
•One share is stored in the server database and for
the other share Hash code is generated and stored
in the database.
•After that the share is given to the customer.
Hash Code Generation
•Hashing is a process which includes the conversion of
the Crypto graphed image into the hash code bytes.
• Hash code is generated for that share and compared
with the hash code in the database.
•If it matches then further process carried out by
reconstructing the shares to obtain the original
steganographed image and desteganography process is
carried on to reveal the original pin number and thumb
image. It verifies the authentication of the true person.
SHA-1 ALGORITHM
•This conversion is done by using SHA-1 algorithm.
•Where SHA stands for Secure Hashing Algorithm.
•SHA-1 is a widely used cryptographic hash function
with a 160-bit hash value. As an Internet standard (RFC
3174). SHA-1 uses output size and internal state size of
160bits.
•The block size is of 512 bits. The maximum message
size for an SHA-1 algorithm is 2^64-1 bits. Word size is
of 32 bits and 80 rounds. The operations are
AND, OR, XOR.
DATAFLOW DIAGRAM
LEVEL-1
LEVEL 2
Images
Visual
cryptogr
aphy
Finding
Private Image 2
Finding
Private Image 1
Finding
Private Image 2
Images
Visual
cryptogra
phy
Finding
Private Image 2
Finding
Private
Image 1
Finding
Private
Image 2
Hashing
ARCHITECTURE DIAGRAM
SCREEN SHOTS
USERREGISTRATION:
USER REGISTRATION
IMAGE PART 1
IMAGE PART 2
USER LOGIN
VIEW MENU
VEIW ACCOUNT DETAILS
VIEW ACCOUNT BALANCE
COLLECT CASH
VIEW MINI STATEMENT
CONCLUSION
• In this Biometric system based Visual Cryptography scheme for
secure authentication in online transaction has been proposed.
• Earlier approaches use the signature of the customer for creation
of shares.
•This involves manual intervention and the integrity of the user is
not ensured.
•This approach is efficient by utilizing the Biometric image from the
user and steganographing it with pin number.
•As the amount of data to be stored in the database increases, the
risks associated with database misuse increases.
•As a result, the issue of database security and integrity continues to
cause several challenges and it is necessary that further research be
conducted in this direction.
•
REFERENCE
[1] M.Naor and A.Shamir, “Visual cryptography,” in
EUROCRYPT’94, Berlin, 1995, vol. LNCS 950, pp. 1–12, Springer-Verlag.
[2] G.Ateniese, C Blundo, A.De Santis, and D.R.Stinson, “Visual cryptography for
general access structures,” Inf. Computation, vol. 129, pp. 86–106, 1996.
[3] P. Tuyls, H. D. L. Hollmann, J. H. van Lint, and L. Tolhuizen,“Xorbased
visual cryptography schemes,” Designs Codes and Cryptography,vol. 37, pp. 169–
186, 2005.
[4] D.Stinson, Visual cryptography and threshold schemes,Potentials, IEEE, 1999, Vol.
18 Issue: 1, pp. 13 -16.
[5] Feng Liu, Chuankun Wu, Senior Member, IEEE, and Xijun Lin, “Step construction of
visual cryptography schemes” vol. 5, March 2010
THANK
YOU..!

Más contenido relacionado

La actualidad más candente

Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingShivam Singh
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESIJTET Journal
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesDebarko De
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”iosrjce
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Reviewiosrjce
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression Sayantan Sur
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visualcsandit
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Journals
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1patisa
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESijiert bestjournal
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 

La actualidad más candente (19)

Extended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using WatermarkingExtended Visual Cryptography Using Watermarking
Extended Visual Cryptography Using Watermarking
 
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGESA NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
A NEW VISUAL CRYPTOGRAPHY TECHNIQUE FOR COLOR IMAGES
 
Visual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful SharesVisual Cryptography in Meaningful Shares
Visual Cryptography in Meaningful Shares
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”"Randomized Visual Cryptography scheme for color images”
"Randomized Visual Cryptography scheme for color images”
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Copyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A ReviewCopyright protection scheme based on visual Cryptography: A Review
Copyright protection scheme based on visual Cryptography: A Review
 
Image Encryption and Compression
Image Encryption and Compression Image Encryption and Compression
Image Encryption and Compression
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Variable length key based visual
Variable length key based visualVariable length key based visual
Variable length key based visual
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
F42022628
F42022628F42022628
F42022628
 
T01022103108
T01022103108T01022103108
T01022103108
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Visual cryptography1
Visual cryptography1Visual cryptography1
Visual cryptography1
 
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMESMEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
MEANINGFUL AND UNEXPANDED SHARES FOR VISUAL SECRET SHARING SCHEMES
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 

Destacado

Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyNagarjuna mahanti
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateIDES Editor
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1Omkar Salunke
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAboul Ella Hassanien
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...ranjit banshpal
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsSomanchi Aditya
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolHasiniG
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first reviewThomas George C
 
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...Jurgen Riedel
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyShahrukh Ali
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewRasheed Karuvally
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportMohit Kumar
 

Destacado (20)

Online paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&VisualcryptographyOnline paymentusingsteganographt&Visualcryptography
Online paymentusingsteganographt&Visualcryptography
 
A Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric TemplateA Secured Approach to Visual Cryptographic Biometric Template
A Secured Approach to Visual Cryptographic Biometric Template
 
Fp12_Efficient_SCM
Fp12_Efficient_SCMFp12_Efficient_SCM
Fp12_Efficient_SCM
 
Socket programing
Socket programingSocket programing
Socket programing
 
Remote authentication via biometrics1
Remote authentication via biometrics1Remote authentication via biometrics1
Remote authentication via biometrics1
 
Age verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solutionAge verification in real time keeping children safe online biometric solution
Age verification in real time keeping children safe online biometric solution
 
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
Designing Hybrid Cryptosystem for Secure Transmission of Image Data using Bio...
 
Gsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cardsGsm based smart card information for lost atm cards
Gsm based smart card information for lost atm cards
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication ProtocolPrivacy Preserving Biometrics-Based and User Centric Authentication Protocol
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
 
DNA secret writing project first review
DNA secret writing project first reviewDNA secret writing project first review
DNA secret writing project first review
 
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
Block Emulation and Computation in One-dimensional Cellular Automata: Breakin...
 
Automata Invasion
Automata InvasionAutomata Invasion
Automata Invasion
 
Ppt1
Ppt1Ppt1
Ppt1
 
online payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptographyonline payment system using Steganography and Visual cryptography
online payment system using Steganography and Visual cryptography
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Big Data (security Issue)
Big Data (security Issue)Big Data (security Issue)
Big Data (security Issue)
 
Visual Cryptography Industrial Training Report
Visual Cryptography Industrial Training ReportVisual Cryptography Industrial Training Report
Visual Cryptography Industrial Training Report
 
Finite automata
Finite automataFinite automata
Finite automata
 

Similar a Vc pred

A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...IRJET Journal
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptxArunRangrej1
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image SegmentationIRJET Journal
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptxBhavanaKs10
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionIJTET Journal
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET Journal
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoKavya P K
 
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET Journal
 
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008ClubHack
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssVinay Sirivara
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationeSAT Publishing House
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protectionMigrant Systems
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyinventionjournals
 

Similar a Vc pred (20)

Graphical password
Graphical passwordGraphical password
Graphical password
 
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
A Novel Mutual Authentication Algorithm using Visual Cryptography with Novel ...
 
Sql_DG_presentation.pptx
Sql_DG_presentation.pptxSql_DG_presentation.pptx
Sql_DG_presentation.pptx
 
C045016020
C045016020C045016020
C045016020
 
Graphical Password by Image Segmentation
Graphical Password by Image SegmentationGraphical Password by Image Segmentation
Graphical Password by Image Segmentation
 
project ppt.pptx
project ppt.pptxproject ppt.pptx
project ppt.pptx
 
Cheque truncation system
Cheque truncation systemCheque truncation system
Cheque truncation system
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level FusionEnhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
Enhanced Hashing Approach For Image Forgery Detection With Feature Level Fusion
 
IRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure TransmissionIRJET- Mosaic Image Creation in Video for Secure Transmission
IRJET- Mosaic Image Creation in Video for Secure Transmission
 
Authentication technique using visual crypto and stegano
Authentication technique using visual crypto and steganoAuthentication technique using visual crypto and stegano
Authentication technique using visual crypto and stegano
 
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...Artificial Neural Network Based Offline Signature Recognition System Using Lo...
Artificial Neural Network Based Offline Signature Recognition System Using Lo...
 
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
IRJET- Implementation of Privacy Preserving Content based Image Retrieval in ...
 
G1803063741
G1803063741G1803063741
G1803063741
 
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008
Karmendra - Hashing, CAPTCHA's and Caching - ClubHack2008
 
Cloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayssCloud computing for agent based urban transportation system vinayss
Cloud computing for agent based urban transportation system vinayss
 
Multiple grid based graphical text password authentication
Multiple grid based graphical text password authenticationMultiple grid based graphical text password authentication
Multiple grid based graphical text password authentication
 
Fingerprint combination for privacy protection
Fingerprint combination for privacy protectionFingerprint combination for privacy protection
Fingerprint combination for privacy protection
 
Digital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptographyDigital image copyright protection based on visual cryptography
Digital image copyright protection based on visual cryptography
 

Último

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Vc pred

  • 1. IMPLEMENTATION OF VISUAL CRYPTOGRAPHY FOR BIOMETRIC IMAGE WITH HASHING & STENOGRAPHY FOR SECURED AUTHENTICATION
  • 2. ABSTRACT •Visual cryptography schemes suffer from the drawback of large pixel expansion of share images and bad visual quality of the recovered image. • To provide secrecy, we go for pixel expansion and increasing number of shares, this causes the bad visual quality of the recovered image. •In this project, I construct (n, n)-VCS and OR and XOR operations are used for share creation and stacking process, which proves better in contrast and pixel expansion. •The proposed method uses additional matrix to increase the secrecy of the message in XOR operation
  • 3. INTRODUCTION • BIOMETRICS is the science of establishing the identity of an individual based on physical or behavioral traits such as face, fingerprints, iris, gait, and voice. • A biometric authentication system operates by acquiring raw biometric data from a subject (e.g., face image), extracting a feature set from the data (e.g., eigen-coefficients), and comparing the feature set against the templates stored in a database
  • 4. EXISTING SYSTEM •In the Existing system, there is big Security any other than User Name & the Password. User Name & the Password or the Account Number and the PIN Number is well known Authentication Process, but then nowadays it is very easy to break all those Authentication System. •So Existing System, doesn’t have nay big Security features.
  • 5. PROPOSED SYSTEM •In the Proposed Model, the Finger Print image which is obtained from the User and it is spitted into two halves namely Share 1 & Share 2. •Share 1 is kept by the Server. Share 2 is Provided to the User. Both the Shares are converted into Hash Codes. •During User Login User will be giving the S •hare 2 Image, which would be converted into Hash Codes. The Main Image which is stored in the server is also converted into Hash Codes. • One Time Password is generated to the User’s Mobile number before user gives the Share 2 Image.
  • 6. Cont.. •User is permitted to give the Share 2 Image only after authentication. • Hash Code of Share 2 and Hash Code of Share 1 are combined to get Original Image Hash Code. •This generated Original Image Hash Code is compared with the Original Image Hash Code for Authentication. •The user is allowed to access the bank Server only after this Authentication. This Process ensures proper Security Scheme.
  • 7. SYSTEM REQUIREMENTS Software Requirements •Java1.5 or More •MS-SqlServer Hardware Requirements Hard disk : 40 GB • RAM : 128mb • Processor : Pentium
  • 9. USER REGISTRATION •In our project, we have to register the user with certain details for his future retrieval process. Without registering, a user can’t access the further details. • For registering, the user should give the User name and password. •Once a user registered his details he can access the system further. Each user will be identified by a unique username and password.
  • 10. Server •A server is a computer program running to serve the requests of other programs, the "clients". •Thus, the "server" performs some computational task on behalf of "clients". •The clients either run on the same computer or connect through the network. •Here the Server acts as the main resource for the client. Server is responsible for maintaining all the client information. • Further the server is responsible for the security process provided in the input image. after all verification, server will finally authenticate the user.
  • 11. Visual Cryptography •Visual Cryptography is a methodology through which the steganographed image is divided into two shared parts. •The image is spitted into two parts so that the security level will be increased.
  • 12. Hashing •Hashing is a process which includes the conversion of the Crypto graphed image into the hash code bytes. •This conversion is done by using SHA-1 algorithm. •This process has been done for both the divided parts and one of the hash code parts is sent to the user for the further login process and the other hash code is in the server.
  • 13. De-steganography •The Server receives the Steganographed Image, which is then made De- Steganography to get the Finger Print Image & the Encrypted PIN Number. •This Encrypted PIN Number is decrypted to achieve the Original PIN Number. •Now the Finger print and Pin number will be used for authentication process.
  • 14. Authentication •After receiving the desteganographed image, the authentication process is done by means of comparing the original image with it and thus the secured level of authentication is done through Steganography and Visual cryptography.
  • 15. Obtaining the Thumb Image •During the creation of new account a user need to provide all his/her details. •In addition to this we obtain the thumb image of the user which is the unique identification each user that has been stored in the database. •The obtained thumb image is used for the further process.
  • 16. Steganographing the Pin Number •Steganography is art of hiding information inside information. •In our process the pin number of the user is hidden into the user thumb image which avoids the weak links of the bio-metric system. •User registers to the server by providing their details such as Name, Date of birth, Occupation Address and Thumb image which will be stored in the server database.
  • 17. Share Creation Process •The secret pin number of the user is Steganographed with the thumb image. •The generated Steganographed thumb image is divided into two shares. •One share is stored in the server database and for the other share Hash code is generated and stored in the database. •After that the share is given to the customer.
  • 18. Hash Code Generation •Hashing is a process which includes the conversion of the Crypto graphed image into the hash code bytes. • Hash code is generated for that share and compared with the hash code in the database. •If it matches then further process carried out by reconstructing the shares to obtain the original steganographed image and desteganography process is carried on to reveal the original pin number and thumb image. It verifies the authentication of the true person.
  • 19. SHA-1 ALGORITHM •This conversion is done by using SHA-1 algorithm. •Where SHA stands for Secure Hashing Algorithm. •SHA-1 is a widely used cryptographic hash function with a 160-bit hash value. As an Internet standard (RFC 3174). SHA-1 uses output size and internal state size of 160bits. •The block size is of 512 bits. The maximum message size for an SHA-1 algorithm is 2^64-1 bits. Word size is of 32 bits and 80 rounds. The operations are AND, OR, XOR.
  • 20. DATAFLOW DIAGRAM LEVEL-1 LEVEL 2 Images Visual cryptogr aphy Finding Private Image 2 Finding Private Image 1 Finding Private Image 2 Images Visual cryptogra phy Finding Private Image 2 Finding Private Image 1 Finding Private Image 2 Hashing
  • 32. CONCLUSION • In this Biometric system based Visual Cryptography scheme for secure authentication in online transaction has been proposed. • Earlier approaches use the signature of the customer for creation of shares. •This involves manual intervention and the integrity of the user is not ensured. •This approach is efficient by utilizing the Biometric image from the user and steganographing it with pin number. •As the amount of data to be stored in the database increases, the risks associated with database misuse increases. •As a result, the issue of database security and integrity continues to cause several challenges and it is necessary that further research be conducted in this direction. •
  • 33. REFERENCE [1] M.Naor and A.Shamir, “Visual cryptography,” in EUROCRYPT’94, Berlin, 1995, vol. LNCS 950, pp. 1–12, Springer-Verlag. [2] G.Ateniese, C Blundo, A.De Santis, and D.R.Stinson, “Visual cryptography for general access structures,” Inf. Computation, vol. 129, pp. 86–106, 1996. [3] P. Tuyls, H. D. L. Hollmann, J. H. van Lint, and L. Tolhuizen,“Xorbased visual cryptography schemes,” Designs Codes and Cryptography,vol. 37, pp. 169– 186, 2005. [4] D.Stinson, Visual cryptography and threshold schemes,Potentials, IEEE, 1999, Vol. 18 Issue: 1, pp. 13 -16. [5] Feng Liu, Chuankun Wu, Senior Member, IEEE, and Xijun Lin, “Step construction of visual cryptography schemes” vol. 5, March 2010