scispace - formally typeset
Open Access

Optimal Contrast Grayscale Visual Cryptography with Modified Multi-secret Sharing for Secure Application

Reads0
Chats0
TLDR
This paper proposes a technique of encode the password of a customer by improved Steganography, which is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger.
Abstract
Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hackingof the databases on the internet, it is always quite difficult totrust the information on the internet. To solve this problemof authentication, we are proposing an algorithm based onimage processing, improved steganography and visual cryptography. This paper proposes a technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger.and thendividing it into shares. Total number of shares to be created isdepending on the scheme chosen by the bank. When two sharesare created, one is stored in the Bank database and the otheris kept by the customer. The customer has to present the shareduring all of his transactions. This share is stacked with the firstshare to get the original image. Then decoding method issued to take the hidden password on acceptance or rejection of the output and authenticates the customer.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Security enhancement in image steganography using neural networks and visual cryptography

TL;DR: In order to enhance security mechanism, visual cryptography and image steganography are used together and Neural networks are concerned with identifying the best locations in host image in order to embed the secret data thus improving the image quality.
Journal ArticleDOI

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

TL;DR: In order to achieve higher level of security, both image steganography and visual cryptography are required and Neural networks are used to identify the best locations in cover image to embed the secret data, improving quality of the image.
References
More filters
Journal ArticleDOI

Information hiding-a survey

TL;DR: An overview of the information-hiding techniques field is given, of what the authors know, what works, what does not, and what are the interesting topics for research.
Journal ArticleDOI

Hiding data in images by simple LSB substitution

TL;DR: By applying an optimal pixel adjustment process to the stego-image obtained by the simple LSB substitution method, the image quality of the stega-image can be greatly improved with low extra computational complexity.
Journal ArticleDOI

A steganographic method for images by pixel-value differencing

TL;DR: A new and efficient steganographic method for embedding secret messages into a gray-valued cover image that provides an easy way to produce a more imperceptible result than those yielded by simple least-significant-bit replacement methods.
Journal ArticleDOI

LSB matching revisited

TL;DR: The proposed modification to the least-significant-bit (LSB) matching, a steganographic method for embedding message bits into a still image, shows better performance than traditional LSB matching in terms of distortion and resistance against existing steganalysis.
Journal ArticleDOI

Cyber warfare: steganography vs. steganalysis

TL;DR: For every clever method and tool being developed to hide information in multimedia data, an equal number of clever methods and tools areBeing developed to detect and reveal its secrets.
Related Papers (5)