A Review on Implementation Visual Cryptography and Steganography

Authors

  • Pranay Kalamkar  BE Scholar, Department of Information Technology, Abha Gaikwad Patil College Engineering, Mohagoan, Nagpur, Maharashtra, India
  • Mrunali Gaikwad  BE Scholar, Department of Information Technology, Abha Gaikwad Patil College Engineering, Mohagoan, Nagpur, Maharashtra, India
  • Sumit Gore  BE Scholar, Department of Information Technology, Abha Gaikwad Patil College Engineering, Mohagoan, Nagpur, Maharashtra, India
  • Dhananjay Sonule  BE Scholar, Department of Information Technology, Abha Gaikwad Patil College Engineering, Mohagoan, Nagpur, Maharashtra, India
  • Prof. Vidya Bodhe  Assistant Professor, Department of Information Technology, Abha Gaikwad Patil College Engineering, Mohagoan, Nagpur, Maharashtra, India

Keywords:

Information Security, Steganography, Visual Cryptography, Online Shopping

Abstract

Online Banking is an arrangement of administrations gave by a group of organized bank offices. Bank clients may access their funds from any of the part branch or workplaces via internet. The real issue in Internet Banking is the authenticity of the user. Because of unavoidable hacking of the databases on the web, it is hard to believe on the security of the data on the web. To take care of this issue of verification, we are proposing a mechanism which is hybrid of data hiding and visual cryptography. This paper proposes a review on visual Cryptography and Steganography techniques and presenting a new approach for handling the transaction key of a user where the key will be embedded into an a image and later the image will be divided into two shares. At the point when two shares are made, one is put away in the Bank database and the other is kept by the client or sends to picture server. The client needs to introduce the offer amid the majority of his exchanges. This offer is stacked with the main offer to get the first Transaction key. The Correlation technique is utilized to take the choice on acknowledgment or dismissal of the yield and validate the client.

References

  1. S. Roy, P. Venkateswaran, “Online Payment System using Steganography and Visual Cryptography”, IEEE Conference on Electrical, Electronics and Computer Science, vol. 6, no. 2, pp. 88-93, 2014
  2. M. Suresh, B. Domathoti, N. Putta, “Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods”, International Journal of Innovative Research in Computer and Communication Engineering ,vol. 3, no. 8, pp. 7519-7525, August 2015.
  3. Rahna E, V. Govindan, “A Novel Technique For Secure, Lossless Steganography With Unlimited Payload And Without Exchange Of Stegoimage”, International Journal of Advances in Engineering & Technology, vol. 6, no. 3, pp. 1263-1270, July 2013.
  4. S. Chan, L. Cheng, “Hiding data in images by simple LSB substitution”, Pattern Recognition, pp. 469– 474, August 2004.
  5. C. Shrivastava1, T. Verma, “A Survey on Various Techniques for Generating Image Steganography with Improved Efficiency”, International Journal of Advanced Research in Computer Engineering & Technology , vol. 4, no. 3, pp. 1005-1009, March 2015 
  6. M. Kutter, S. Winkler, “A Vision-Based Masking Model for Spread-Spectrum Image Watermarking”, In proceedings International Conference on Computing, Electronics and Electrical Technologies, pp. 313-336, 2004. 
  7. Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011.
  8. P. Vaman, C. Manjunath, Sandeep , “Integration of Steganography and Visual Cryptography for Authenticity”, International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 6, pp. 80-84, June 2013
  9. C. Hegde , Manu S , P. Shenoy , Venugopal K R , L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications”, In proceedings of 16th International Conference on Advanced Computing and Communications, pp. 65-72,2013
  10. A. Suklabaidya, G. Sahoo, “Visual Cryptographic Applications”, International Journal on Computer Science and Engineering, vol. 5, no. 06, pp 455-464, June 2013
  11. R. C. Gonzalez and R. E. Woods," Digital Image Processing” Upper Saddle River, NJ: Prentice-Hall, 2006.
  12. S.Premkumar and A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking Application”.
  13. H. Wang and S. Wang, "Cyber warfare Steganography vs. Steganolysis," Commun. ACM, vol. 47, no. 10, pp. 76-82, 2004.
  14. X. Zhang and S. Wang, "Steganography using multiple base notational system and human Vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-70, Jan. 2005.
  15. M. Shirali-Shahreza, "Steganography in MMS," in Multi topic Conference, 2007. INMIC 2007. IEEE International, 2007, pp. 1-4.
  16. Aggelos Kiayias and Yona Raekow, “Efficient Steganography with Provable Security Guarantees”
  17. T. Morkel, J.H.P. Eloff and M.S. Olivier, “An Overview of Image Steganography”
  18. Chandramathi S, Ramesh Kumar R, Suresh R, and Harish S,”An overview of visual cryptography”
  19. Moni Naor, Adi Shamir,” visual cryptography”
  20. Jithesh K, 2dr. A V Senthil Kumar, “Multi-Layer Information Hiding -A Blend Of Steganography And Visual Cryptography,”
  21. Young-Chang Hou, “Visual cryptography for color images,”
  22. https://en.wikipedia.org/wiki/Online_banking#Attacks

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Pranay Kalamkar, Mrunali Gaikwad, Sumit Gore, Dhananjay Sonule, Prof. Vidya Bodhe, " A Review on Implementation Visual Cryptography and Steganography, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 6, Issue 2, pp.420-428, March-April-2019.