Multi-Image Cryptographic based Two Factor Authentication in Banking Systems and Services

Main Article Content

Article Sidebar

Published Oct 9, 2021
Mayakannan Selvaraju S.Bhuvaneswari Deepak kumar M Keshav N Hariharan A

Abstract

Purpose: The objective of this paper is to examine the credibility of the client in core banking and proposes a method of processing the signature of a client and so dividing it into shares. The total variety of shares to be created relies on the theme chosen by the bank.

Methodology: This paper uses Multi-Image cryptography Two Factor Authentication in Bankings. Banking Applications securely with multi-image encryption technique according to design guidelines as image-based encryption cannot be told or shared with another as it is a visual memory and as well perform security testing to expose the vulnerabilities. It proposes associate algorithmic rules supported by image processing and visual cryptography.

Findings: Core banking could be a set of services provided by a bunch of networked bank branches. Bank customers could access their funds and perform different easy transactions from any of the member branch offices. The most important issue in core banking is the credibility of the client. Because of the inevitable hacking of the databases on the net, it’s forever quite tough to trust the data on the net. The Banking system has been more accessible than ever to perform essential duties e.g online transfer, change account information without needing to visit nearby banks, and perform all of them online. While the online access to banking functionality for users has given great flexibility but it requires sufficient security provided by the banking company to help protect from unauthorized access to user's accounts and also help the user to perform his activity securely maintaining privacy. This paper proposes a method of processing the signature of a client and so dividing it into shares. The total variety of shares to be created relies on the theme chosen by the bank. Once 2 shares are created, one is held on within the bank information and therefore the difference is unbroken by the client. The client has to show the share throughout all of his transactions. This share is stacked with the primary share to induce the first signature.

Originality: The correlation methodology is employed to lay hold of the decision on acceptance or rejection of the output and demonstrate the client and a framework has been developed for performance.

How to Cite

Selvaraju, M., S.Bhuvaneswari, Deepak kumar M, Keshav N, & Hariharan A. (2021). Multi-Image Cryptographic based Two Factor Authentication in Banking Systems and Services. SPAST Abstracts, 1(01). Retrieved from https://spast.org/techrep/article/view/1754
Abstract 134 |

Article Details

Keywords

Image processing, visual cryptography, authentication

References
[1] Hash key-based image cryptosystem using chaotic maps and cellular automata, revealed in International Multi-Conference on Systems, Signals & Devices, 2018
[2] Visual Cryptography and Image Processing primarily based approach for Secure Transactions in Banking Sector, published in International Conference on Telecommunication and Networks, 2017
[3] Kiruthika, U., Somasundaram, T.S. & Raja, S.K.S. Lifecycle Model of a Negotiation Agent: A Survey of Automated Negotiation Techniques. Group Decis Negot 29, 1239–1262 (2020). https://doi.org/10.1007/s10726-020-09704-z.
[4] The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes, published in IEEE Symposium on Security and Privacy, 2012
[5] Chaos Based Image Encryption and Decryption, published in International Journal of Advanced Research in Computer and Communications Engineering, 2016
[6] A novel image encoded algorithm using chaos and reversible cellular automata, published in Communication in Nonlinear Science and numerical simulation, Volume .8, Issue,11,2013.
[7] Enhancing Protection Techniques of E-Banking Security Services Using Open-Source Cryptographic Algorithms, published in International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing,2013
[8] S. Kanaga SubaRaja, S. Usha Kiruthika, ‘An Energy Efficient Method for Secure and Reliable Data Transmission in Wireless Body Area Networks Using RelAODV’, International Journal of Wireless Personal Communications, ISSN 0929-6212, Volume 83, N0. 4, 2015.
Section
GE3- Computers & Information Technology

Most read articles by the same author(s)

1 2 3 4 5 6 7 > >>