A Novel Approach Of Secure Banking Application Using Visual Cryptography Against Fake Website Authenticity Theft

The bank may provide two sets of services namely core banking and net banking. In a core banking system, there is a chance of encountering forged signature for transaction, and in net banking system, the password of the customer may be hacked and misused. With the advent of internet, various online attacks has been increased and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get personal confidential information such as passwords, credit card information from unsuspecting victims for identity theft, financial gain and other fraudulent activities. Today, most applications are only as secure as their underlying system. Since the design and technology of middleware has improved steadily, their detection is a difficult problem. A computer that is connected to the Internet can be considered trustworthy secure or not. The question is how to handle the application that requires a high level of security, such as core banking and net banking. In core banking and net banking the major problem is the authenticity of the customer due to unavoidable hacking of the databases on the internet. To overcome this problem of authentication we are discussing with the two topics based on image processing i.e. steganography and visual cryptography. Key terms – phishing, core banking, net banking, steganography, visual cryptography.

[1]  S. Harish,et al.  An overview of visual cryptography , 2010 .

[2]  K Jithesh,et al.  MULTI LAYER INFORMATION HIDING -A BLEND OF STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY , 2010 .

[3]  Xinpeng Zhang,et al.  Steganography using multiple-base notational system and human vision sensitivity , 2005, IEEE Signal Process. Lett..

[4]  Jan H. P. Eloff,et al.  An overview of image steganography , 2005, ISSA.

[5]  M. Shirali-Shahreza,et al.  Steganography in MMS , 2007, 2007 IEEE International Multitopic Conference.

[6]  Young-Chang Hou,et al.  Visual cryptography for color images , 2003, Pattern Recognit..

[7]  A. E. Narayanan,et al.  Notice of Violation of IEEE Publication PrinciplesNew visual Steganography scheme for secure banking application , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[8]  Huaiqing Wang,et al.  Cyber warfare: steganography vs. steganalysis , 2004, CACM.