2. ABSTRACT
•Visual cryptography schemes suffer from the drawback
of large pixel expansion of share images and bad visual
quality of the recovered image.
• To provide secrecy, we go for pixel expansion and
increasing number of shares, this causes the bad visual
quality of the recovered image.
•In this project, I construct (n, n)-VCS and OR and
XOR operations are used for share creation and stacking
process, which proves better in contrast and pixel
expansion.
•The proposed method uses additional matrix to
increase the secrecy of the message in XOR operation
3. INTRODUCTION
• BIOMETRICS is the science of
establishing the identity of an individual
based on physical or behavioral traits such
as face, fingerprints, iris, gait, and voice.
• A biometric authentication system
operates by acquiring raw biometric data
from a subject (e.g., face
image), extracting a feature set from the
data (e.g., eigen-coefficients), and
comparing the feature set against the
templates stored in a database
4. EXISTING SYSTEM
•In the Existing system, there is big Security
any other than User Name & the Password.
User Name & the Password or the Account
Number and the PIN Number is well known
Authentication Process, but then nowadays it
is very easy to break all those Authentication
System.
•So Existing System, doesn’t have nay big
Security features.
5. PROPOSED SYSTEM
•In the Proposed Model, the Finger Print image
which is obtained from the User and it is spitted
into two halves namely Share 1 & Share 2.
•Share 1 is kept by the Server. Share 2 is Provided
to the User. Both the Shares are converted into
Hash Codes.
•During User Login User will be giving the S
•hare 2 Image, which would be converted into
Hash Codes. The Main Image which is stored in
the server is also converted into Hash Codes.
• One Time Password is generated to the User’s
Mobile number before user gives the Share 2
Image.
6. Cont..
•User is permitted to give the Share 2 Image
only after authentication.
• Hash Code of Share 2 and Hash Code of
Share 1 are combined to get Original Image
Hash Code.
•This generated Original Image Hash Code is
compared with the Original Image Hash
Code for Authentication.
•The user is allowed to access the bank
Server only after this Authentication. This
Process ensures proper Security Scheme.
9. USER REGISTRATION
•In our project, we have to register the user with
certain details for his future retrieval process.
Without registering, a user can’t access the further
details.
• For registering, the user should give the User
name and password.
•Once a user registered his details he can access
the system further. Each user will be identified by
a unique username and password.
10. Server
•A server is a computer program running to serve
the requests of other programs, the "clients".
•Thus, the "server" performs some computational
task on behalf of "clients".
•The clients either run on the same computer or
connect through the network.
•Here the Server acts as the main resource for the
client. Server is responsible for maintaining all the
client information.
• Further the server is responsible for the security
process provided in the input image. after all
verification, server will finally authenticate the
user.
11. Visual Cryptography
•Visual Cryptography is a methodology
through which the steganographed image is
divided into two shared parts.
•The image is spitted into two parts so that
the security level will be increased.
12. Hashing
•Hashing is a process which includes the
conversion of the Crypto graphed image into the
hash code bytes.
•This conversion is done by using SHA-1
algorithm.
•This process has been done for both the divided
parts and one of the hash code parts is sent to the
user for the further login process and the other
hash code is in the server.
13. De-steganography
•The Server receives the Steganographed
Image, which is then made De-
Steganography to get the Finger Print Image
& the Encrypted PIN Number.
•This Encrypted PIN Number is decrypted
to achieve the Original PIN Number.
•Now the Finger print and Pin number will
be used for authentication process.
14. Authentication
•After receiving the desteganographed
image, the authentication process is
done by means of comparing the
original image with it and thus the
secured level of authentication is done
through Steganography and Visual
cryptography.
15. Obtaining the Thumb Image
•During the creation of new account a user
need to provide all his/her details.
•In addition to this we obtain the thumb
image of the user which is the unique
identification each user that has been stored
in the database.
•The obtained thumb image is used for the
further process.
16. Steganographing the Pin Number
•Steganography is art of hiding information inside
information.
•In our process the pin number of the user is
hidden into the user thumb image which avoids
the weak links of the bio-metric system.
•User registers to the server by providing their
details such as Name, Date of birth, Occupation
Address and Thumb image which will be stored
in the server database.
17. Share Creation Process
•The secret pin number of the user is
Steganographed with the thumb image.
•The generated Steganographed thumb image is
divided into two shares.
•One share is stored in the server database and for
the other share Hash code is generated and stored
in the database.
•After that the share is given to the customer.
18. Hash Code Generation
•Hashing is a process which includes the conversion of
the Crypto graphed image into the hash code bytes.
• Hash code is generated for that share and compared
with the hash code in the database.
•If it matches then further process carried out by
reconstructing the shares to obtain the original
steganographed image and desteganography process is
carried on to reveal the original pin number and thumb
image. It verifies the authentication of the true person.
19. SHA-1 ALGORITHM
•This conversion is done by using SHA-1 algorithm.
•Where SHA stands for Secure Hashing Algorithm.
•SHA-1 is a widely used cryptographic hash function
with a 160-bit hash value. As an Internet standard (RFC
3174). SHA-1 uses output size and internal state size of
160bits.
•The block size is of 512 bits. The maximum message
size for an SHA-1 algorithm is 2^64-1 bits. Word size is
of 32 bits and 80 rounds. The operations are
AND, OR, XOR.
32. CONCLUSION
• In this Biometric system based Visual Cryptography scheme for
secure authentication in online transaction has been proposed.
• Earlier approaches use the signature of the customer for creation
of shares.
•This involves manual intervention and the integrity of the user is
not ensured.
•This approach is efficient by utilizing the Biometric image from the
user and steganographing it with pin number.
•As the amount of data to be stored in the database increases, the
risks associated with database misuse increases.
•As a result, the issue of database security and integrity continues to
cause several challenges and it is necessary that further research be
conducted in this direction.
•
33. REFERENCE
[1] M.Naor and A.Shamir, “Visual cryptography,” in
EUROCRYPT’94, Berlin, 1995, vol. LNCS 950, pp. 1–12, Springer-Verlag.
[2] G.Ateniese, C Blundo, A.De Santis, and D.R.Stinson, “Visual cryptography for
general access structures,” Inf. Computation, vol. 129, pp. 86–106, 1996.
[3] P. Tuyls, H. D. L. Hollmann, J. H. van Lint, and L. Tolhuizen,“Xorbased
visual cryptography schemes,” Designs Codes and Cryptography,vol. 37, pp. 169–
186, 2005.
[4] D.Stinson, Visual cryptography and threshold schemes,Potentials, IEEE, 1999, Vol.
18 Issue: 1, pp. 13 -16.
[5] Feng Liu, Chuankun Wu, Senior Member, IEEE, and Xijun Lin, “Step construction of
visual cryptography schemes” vol. 5, March 2010