SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 510
Review on Implementation Visual Cryptography & Steganography for
Secure Authentication
Prof. Priyanka Bubna#, Anshula Panchabudhe*, Pallavi Choudhari*
#Assistant Professor, Dept. of CSE, Manoharbhai Patel Institute of Technology & Engineering, Sahapur (Bhandara),
India
*B.E Student, Dept. of CSE, Manoharbhai Patel Institute of Technology & Engineering, Sahapur(Bhandara), India
-------------------------------------------------------------------------------***------------------------------------------------------------------------------
ABSTRACT:
Web based Banking is a game plan of organizations gave
by a social event of sorted out bank workplaces. As a result
of unavoidable hacking of the databases on the web, it is
constantly totally difficult to trust the information on the
web. To deal with this issue of confirmation, we are
proposing a computation in light of picture taking care of
and visual cryptography. This paper proposes a survey on
visual Cryptography and Steganography strategies and
arrangement of taking care of the Transaction key of a
customer and after that isolating it into shares. Total
number of shares to be made is depending upon the
arrangement picked by the bank. Exactly when two shares
are made, one is secured in the Bank database and the
other is kept by the customer or sends to picture server.
The customer needs to present the offer in the midst of the
lion's share of his trades. This offer is stacked with the
primary offer to get the main Transaction key.
Keywords: Information security; Steganography; Visual
Cryptography; online shopping
I. INTRODUCTION
Today, most applications are similarly as secure as their
essential structure. Since the arrangement and
development of middleware has improved reliably, their
area is a troublesome issue. In this manner, it is very hard
to make certain whether a PC that is related with the web
can be seen as tried and true and secure or not. The
request is the best approach to deal with applications that
require an anomalous condition of security, for instance,
focus sparing cash and web dealing with a record. In an
inside sparing cash system, there is a fix of encountering
produced stamp for trade. Moreover, in the net sparing
cash structure, the mystery key of customer may be
hacked and mishandled. Along these lines security is still a
test in these applications. Here, we propose survey on a
framework to secure the customer information and to
keep the possible misrepresentation of imprints and
mystery key hacking.
A) History of Attacks:
Date
Attacked
Victim Attack details
2013/11
Target
(stores)
110 million customer and
credit card records
stolen, through a phished
subcontractor
account.[22] CEO and IT
security staff
subsequently fired.[23]
2011/03
RSA
Security
Internal RSA staff
phished
successfully,[24] leading to
the master keys for all
RSA SecureID security
tokens being stolen, then
subsequently used to
break into US defense
suppliers.[25]
2014/09
Home
Depot
Personal and Credit card
data of 100+million
shoppers of all 2200
Home Depot stores
posted for sale on
hacking web sites.[26]
2014/11 ICANN
Notably, administrative
access to the Centralized
Zone Data System was
gained, allowing the
attacker to get zone files,
and data about users in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 511
Date
Attacked
Victim Attack details
the system, such as their
real names, contact
information, and salted
hashes of their
passwords. Access was
also gained to ICANN's
public Governmental
Advisory Committee
wiki, blog, and whois
information portal.
Web Banking has been outstanding among energetic
Internet-shrewd people for quite a while, its reputation is
required to end up rapidly as Internet utilize turns out to
be all around and people locate the various central focuses
that it gives. In any case, it may have its own
inconveniences. In a middle dealing with a record system
there is an injection of encountering fabricated stamp for
trade. In a net dealing with a record system mystery key of
the customer may be hacked and manhandled. Online
trades are nowadays end up being to a great degree typical
and there are diverse ambushes show behind this. In these
sorts of various attacks, phishing is recognized as a critical
security hazard. Phishing traps are in like manner
transforming into an issue for web sparing cash and e-
business customers. The question is the best approach to
deal with applications that require an unusual condition of
security. Phishing is a kind of online information extortion
that expects to take sensitive information, for instance,
electronic keeping cash passwords and Mastercard
information from customers. One significance of phishing
is given as "it is a criminal activity using social outlining
systems. Phishers attempt to erroneously get unstable
information, for instance, passwords and charge card
purposes of enthusiasm, by going up against the presence
of a solid individual or business in an electronic
correspondence". Here we will use a part of the strategies
to secure the customer information and to keep the
possible fake of mystery word hacking. Picture taking care
of a steganography and visual cryptography is used.
Steganography is the workmanship and investigation of
creating covered messages in a way that no one isolated
from arranged recipient knows the nearness of the
message. Extraordinary message is being concealed with a
transporter to such a degree, to the point that the
movements so occurred in the conveyor are not
discernible. In steganography modernized pictures can be
used as a transporter to disguise pictures. Joining riddle
picture with a carrier picture gives the covered picture, the
covered picture is difficult to perceive without
recuperation, and by far most of the steganography
technique are either three or four touching pixels around a
goal pixel. While the proposed framework can use at most
importantly else eight bordering neighbors with the
objective that imperceptibility regard gets to be distinctly
more noteworthy and the parceling it into a shares. Mean
number of shares to be made is depending upon the
arrangement picked by the bank. Right when two shares
are made one is secured in the bank database and the
other one is kept by the customer. The customer needs to
display the share in the midst of most of his trade. This
give is stacked to the essential share to get the primary
picture. By then translating strategy is used to take the
covered mystery word on affirmation or rejection of the
yield and approve the customer. The visual cryptography
(VC) is a strategy for encoding a riddle picture into shares
with the true objective that stacking a satisfactory number
of shares reveals the secret picture.
Picture get ready and an improved visual cryptography is
used. Picture get ready is a system of taking care of a data
picture and to get the yield as either improved kind of a
similar picture and additionally characteristics of the
information picture. Visual Cryptography (VC) is the
method for encoding a puzzle enter into shares with the
ultimate objective that, stacking a satisfactory number of
shares reveals the secret key.
Naor and Shamir displayed a direct yet faultlessly secure
way that grants riddle offering to no cryptographic count,
named as Visual Cryptography Scheme (VCS). Basically,
Visual Cryptography Scheme is an encryption methodology
that usages combinatorial techniques to encode puzzle
created materials. The contemplation is to change over the
formed material into a photo and encode this photo into n
shadow pictures. The translating requires simply selecting
some subset of these n pictures, making transparencies of
them, and stacking them on top of each other. The most
clear Visual Cryptography Scheme is given by the going
with setup. A secret picture contains a social affair of
exceedingly differentiating pixels where each pixel is
managed uninhibitedly. To encode the riddle picture, we
split the primary picture into balanced interpretations
(called as shares) with the true objective that each pixel in
an offer now subdivides into n high complexity sub-pixels.
To translate the photo, a subset S of those n shares are
picked and repeated on divided transparencies. In case S is
a qualified subset, then stacking each one of these
transparencies will allow visual recovery of the puzzle.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 512
II. PROBLEM DEFINATION
In a core banking system, there is a shot of experiencing
fashioned mark for exchange. In the net saving money
framework, the secret key of client might be hacked and
abused. In this manner Security is still a test in these
applications. Here, we propose a procedure to secure the
client data and to keep the conceivable fraud of marks and
secret word hacking.
III. LITERATURE REVIEW
In [1], new strategy is proposed, that utilizations content
based steganography and visual cryptography, which
minimizes data sharing amongst shopper and online
shipper however empower effective store exchange from
customer's record to vendor's record subsequently
shielding purchaser data and avoiding abuse of data at
dealer side. The strategy proposed is particularly for E-
Commerce however can without much of a stretch be
reached out for online and also physical managing an
account.
In [3] proposes a novel procedure which endeavors to
fathom all the above issues in steganography. In the
proposed strategy, rather than substitutions we are
utilizing the idea of matches between mystery information
and cover picture. What's more, we additionally utilize the
idea of altered recurrence for every character in English.
The proposed technique is lossless, has limitless payload
limit, has key size which is just around 10 to 20 rate of the
message estimate and has enhanced security.
In [4], an information concealing plan by basic LSB
substitution is proposed. By applying an ideal pixel
alteration procedure to the stego-picture acquired by the
basic LSB substitution strategy, the picture nature of the
stego-picture can be significantly enhanced with low
additional computational unpredictability. The most
pessimistic scenario mean-square-mistake between the
stego-picture and the cover-picture is determined. Trial
comes about demonstrate that the stego-picture is
outwardly vague from the first cover-picture. The acquired
results additionally demonstrate a noteworthy change as
for a past work.
In [5], the sender is concealing the information which is to
send to the beneficiary as pictures. The picture is a blend
of the content which is gotten from the two procedures of
the content steganography which has been inferred before.
The two procedures utilized are Reflection Symmetry and
the Vedic Numeric technique. The sender sends the
information into apportioned shape or we can say the
information which is sent by the sender is parceled into 2
sections and separate-isolate part is sent to the two
procedures. We are doing this as though the entire content
is sent to one procedure or Vedic strategy it will expend
more memory. In this way, the content in the wake of
being prepared by the two procedures is joined to shape
an entire content and after that the content is changed
over into picture by the different techniques or
calculations ex. LSB, network augmentation. In this way,
the content is changed over into picture that is sent to the
recipient.
The model proposed in [6] considers the affectability and
covering conduct of the human visual framework by
method for a nearby isotropic complexity measure and a
concealing model. We look at the addition of this
watermark in luminance pictures and in the blue channel
of shading pictures. We likewise assess the vigor of such a
watermark regarding its installing thickness. Our
outcomes demonstrate that this approach encourages the
addition of a more powerful watermark while
safeguarding the visual nature of the first. Moreover, we
show that the most extreme watermark thickness by and
large does not give the best identification execution.
In [8] paper, a procedure using picture preparing has been
proposed utilizing Steganography and visual cryptography,
and afterward partitioning it into shares. In this venture
the message or the content document is taken as a
contribution from the client who needs to get implanted in
the picture record. The picture document can be of the
expansions .jpg or .png. The message process is computed
utilizing the MD5 calculation and this is affixed with the
message. The annexed message is then encoded utilizing
the AES calculation. The mystery enters utilized as a part
of the AES calculation is scrambled utilizing the RSA
calculation. The affixed scrambled message is inserted in
the picture utilizing the minimum huge piece calculation.
The encoded picture is transmitted. The secret word must
be given before transmitting the picture document. At the
beneficiaries side the watermarked picture record is taken
as the information. The message in the picture record is
removed utilizing the LSB calculation. The removed
message is separated into the process and the message
part. The message process is figured for the message and is
contrasted and the got one. In the event that they are
similar then message is said to be verified.
IV. PROPOSED SYSTEM
Our project proposes a technique of processing a secret
key of a customer and then dividing it into shares. When
two shares are created, one is stored in the Bank database
and the other is kept by the customer. The customer has to
present the share during all of his transactions. This share
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 513
is stacked with the first share get the original secret key.
The Correlation method is used to take the decision on
acceptance or rejection of the output and authenticate the
customer.
V. CONCLUSION
This system uses Colour Image Visual Cryptography for
password protection and it is not able to break this
protection with present technology. This system will be a
boon for the Core Banking Application and the bank
customers are feeling free from the password hacking
problems. Once this system is deployed in web Server, all
the computer in the network can able to access this
application through browser without any software
installation in their computer.
REFRENCES
[1] S. Roy, P. Venkateswaran, “Online Payment System
using Steganography and Visual Cryptography”, IEEE
Conference on Electrical, Electronics and Computer
Science, vol. 6, no. 2, pp. 88-93, 2014
[2] M. Suresh, B. Domathoti, N. Putta, “Online Secure E-Pay
Fraud Detection in E-Commerce System Using Visual
Cryptographic Methods”, International Journal of
Innovative Research in Computer and Communication
Engineering ,vol. 3, no. 8, pp. 7519-7525, August 2015.
[3] Rahna E, V. Govindan, “A Novel Technique For Secure,
Lossless Steganography With Unlimited Payload And
Without Exchange Of Stegoimage”, International Journal of
Advances in Engineering & Technology, vol. 6, no. 3, pp.
1263-1270, July 2013.
[4] C. Chan, L. Cheng, “Hiding data in images by simple LSB
substitution”, Pattern Recognition, pp. 469– 474, August
2004.
[5] N. Shrivastava1, T. Verma, “A Survey on Various
Techniques for Generating Image Steganography with
Improved Efficiency”, International Journal of Advanced
Research in Computer Engineering & Technology , vol. 4,
no. 3, pp. 1005-1009, March 2015
[6] M. Kutter, S. Winkler, “A Vision-Based Masking Model
for Spread-Spectrum Image Watermarking”, In
proceedings International Conference on Computing,
Electronics and Electrical Technologies, pp. 313-336,
2004.
[7] X. Li, B. Yang, D. Cheng, T. Zeng, “A Generalization of
LSB Matching”, IEEE Signal Processing Letters, vol. 16, no.
2, pp. 69-72, February 2009.
[8] P. Vaman, C. Manjunath, Sandeep , “Integration of
Steganography and Visual Cryptography for Authenticity”,
International Journal of Emerging Technology and
Advanced Engineering, vol. 3, no. 6, pp. 80-84, June 2013
[9] C. Hegde , Manu S , P. Shenoy , Venugopal K R , L M
Patnaik, “Secure Authentication using Image Processing
and Visual Cryptography for Banking Applications”, In
proceedings of 16th International Conference on
Advanced Computing and Communications, pp. 65-
72,2013
[10] A. Suklabaidya, G. Sahoo, “Visual Cryptographic
Applications”, International Journal on Computer Science
and Engineering, vol. 5, no. 06, pp 455-464, June 2013
[11] R. C. Gonzalez and R. E. Woods," Digital Image
Processing” Upper Saddle River, NJ: Prentice-Hall, 2006.
[12] S.Premkumar and A.E.Narayanan, “New Visual
Steganography Scheme for Secure Banking Application”.
[13] H. Wang and S. Wang, "Cyber warfare Steganography
vs. Steganalysis," Commun. ACM, vol. 47, no. 10, pp. 76-82,
2004.
[14] X. Zhang and S. Wang, "Steganography using
Multiplebase notational system and human Vision
sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67-
70, Jan. 2005.
[15] M. Shirali-Shahreza, "Steganography in MMS," in Multi
topic Conference, 2007. INMIC 2007. IEEE
International, 2007, pp. 1-4.
[16] Aggelos Kiayias and Yona Raekow, “Efficient
Steganography with Provable Security Guarantees”
[17] T. Morkel, J.H.P. Eloff and M.S. Olivier,”An Overview Of
Image Steganography”
[18] Chandramathi S, Ramesh Kumar R, Suresh R, and
Harish S,”An overview of visual cryptography”
[19] Moni Naor, Adi Shamir,” visual cryptography”
[20] Jithesh K, 2dr. A V Senthil Kumar, “Multi-Layer
Information Hiding -A Blend Of Steganography And Visual
Cryptography,”
[21] Young-Chang Hou, “Visual cryptography for color
images,” 2211

Contenu connexe

Tendances

IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET Journal
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloudrahulmonikasharma
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET Journal
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...IJwest
 
A Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingA Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingIRJET Journal
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and ManagementIRJET Journal
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemEditor IJMTER
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Shakas Technologies
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using BlockchainIRJET Journal
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET Journal
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityLeMeniz Infotech
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...IOSR Journals
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...John Britto
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyIJTET Journal
 

Tendances (20)

IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy GoalsIRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
IRJET- Exchanging Secure Data in Cloud with Confidentiality and Privacy Goals
 
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public CloudA Noval Method for Data Auditing and Integrity Checking in Public Cloud
A Noval Method for Data Auditing and Integrity Checking in Public Cloud
 
IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?IRJET- Crypto-Currencies How Secure are they?
IRJET- Crypto-Currencies How Secure are they?
 
50120130405019
5012013040501950120130405019
50120130405019
 
Implementing High Grade Security in Cloud Application using Multifactor Auth...
Implementing High Grade Security in Cloud  Application using Multifactor Auth...Implementing High Grade Security in Cloud  Application using Multifactor Auth...
Implementing High Grade Security in Cloud Application using Multifactor Auth...
 
A Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud ComputingA Survey on Identity Based Encryption in Cloud Computing
A Survey on Identity Based Encryption in Cloud Computing
 
Honeywords for Password Security and Management
Honeywords for Password Security and ManagementHoneywords for Password Security and Management
Honeywords for Password Security and Management
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 
Privacy Enhanced Online Payment System
Privacy Enhanced Online Payment SystemPrivacy Enhanced Online Payment System
Privacy Enhanced Online Payment System
 
Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...Captcha as graphical passwords a new security primitive based on hard ai prob...
Captcha as graphical passwords a new security primitive based on hard ai prob...
 
IRJET - Securing Aadhaar Details using Blockchain
IRJET -  	  Securing Aadhaar Details using BlockchainIRJET -  	  Securing Aadhaar Details using Blockchain
IRJET - Securing Aadhaar Details using Blockchain
 
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
IRJET- Secure Data Sharing in Cloud Computing using Revocable Storage Identit...
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
Enhancing a Dynamic user Authentication scheme over Brute Force and Dictionar...
 
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
IEEE PROJECT TITLES FOR BE, B.TECH, (CSE, IT) ME, M.TECH, MSC, MCA PROJECT TI...
 
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual CryptographyEnhanced Secure E-Gateway using Hierarchical Visual Cryptography
Enhanced Secure E-Gateway using Hierarchical Visual Cryptography
 

Similaire à Review on Implementation Visual Cryptography & Steganography for Secure Authentication

IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking SecurityIRJET Journal
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET Journal
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastIRJET Journal
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET Journal
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET Journal
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET Journal
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...IRJET Journal
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET Journal
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyIRJET Journal
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure AuthenticationIRJET Journal
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...IRJET Journal
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET Journal
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET Journal
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...IRJET Journal
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYIRJET Journal
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodIRJET Journal
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 

Similaire à Review on Implementation Visual Cryptography & Steganography for Secure Authentication (20)

IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
IRJET- Graphical Secret Code in Internet Banking for Improved Security Transa...
 
Break Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation BlastBreak Loose Acting To Forestall Emulation Blast
Break Loose Acting To Forestall Emulation Blast
 
R04405103106
R04405103106R04405103106
R04405103106
 
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share ImagesIRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
 
IRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking SystemIRJET - Graphical Password Authentication for Banking System
IRJET - Graphical Password Authentication for Banking System
 
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC AlgorithmIRJET- A Shoulder Surfing Resistance using HMAC Algorithm
IRJET- A Shoulder Surfing Resistance using HMAC Algorithm
 
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...IRJET-  	  A Probabilistic  Model of Visual Cryptography Scheme for Anti-Phis...
IRJET- A Probabilistic Model of Visual Cryptography Scheme for Anti-Phis...
 
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...IRJET- 	  Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
IRJET- Design and Analytical Study of Id Based Pixel Secured Cloud Enablem...
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...
 
An Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual CryptographyAn Anti-Phishing Framework Based on Visual Cryptography
An Anti-Phishing Framework Based on Visual Cryptography
 
IRJET- Password Management Kit for Secure Authentication
IRJET-  	  Password Management Kit for Secure AuthenticationIRJET-  	  Password Management Kit for Secure Authentication
IRJET- Password Management Kit for Secure Authentication
 
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
 
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming MachineIRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
IRJET-Design and Fabrication of Automatic Plastic Cup Thermoforming Machine
 
IRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication MethodsIRJET- A Study on Image Authentication Methods
IRJET- A Study on Image Authentication Methods
 
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...IRJET-  	  Privacy Preserving and Proficient Identity Search Techniques for C...
IRJET- Privacy Preserving and Proficient Identity Search Techniques for C...
 
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHYSECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
SECURE E-BANKING APPLICATION BASED ON VISUAL CRYPTOGRAPHY
 
Dynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based MethodDynamic Based face authentication using Video-Based Method
Dynamic Based face authentication using Video-Based Method
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 

Plus de IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Plus de IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Dernier

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spaintimesproduction05
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 

Dernier (20)

UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 

Review on Implementation Visual Cryptography & Steganography for Secure Authentication

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 510 Review on Implementation Visual Cryptography & Steganography for Secure Authentication Prof. Priyanka Bubna#, Anshula Panchabudhe*, Pallavi Choudhari* #Assistant Professor, Dept. of CSE, Manoharbhai Patel Institute of Technology & Engineering, Sahapur (Bhandara), India *B.E Student, Dept. of CSE, Manoharbhai Patel Institute of Technology & Engineering, Sahapur(Bhandara), India -------------------------------------------------------------------------------***------------------------------------------------------------------------------ ABSTRACT: Web based Banking is a game plan of organizations gave by a social event of sorted out bank workplaces. As a result of unavoidable hacking of the databases on the web, it is constantly totally difficult to trust the information on the web. To deal with this issue of confirmation, we are proposing a computation in light of picture taking care of and visual cryptography. This paper proposes a survey on visual Cryptography and Steganography strategies and arrangement of taking care of the Transaction key of a customer and after that isolating it into shares. Total number of shares to be made is depending upon the arrangement picked by the bank. Exactly when two shares are made, one is secured in the Bank database and the other is kept by the customer or sends to picture server. The customer needs to present the offer in the midst of the lion's share of his trades. This offer is stacked with the primary offer to get the main Transaction key. Keywords: Information security; Steganography; Visual Cryptography; online shopping I. INTRODUCTION Today, most applications are similarly as secure as their essential structure. Since the arrangement and development of middleware has improved reliably, their area is a troublesome issue. In this manner, it is very hard to make certain whether a PC that is related with the web can be seen as tried and true and secure or not. The request is the best approach to deal with applications that require an anomalous condition of security, for instance, focus sparing cash and web dealing with a record. In an inside sparing cash system, there is a fix of encountering produced stamp for trade. Moreover, in the net sparing cash structure, the mystery key of customer may be hacked and mishandled. Along these lines security is still a test in these applications. Here, we propose survey on a framework to secure the customer information and to keep the possible misrepresentation of imprints and mystery key hacking. A) History of Attacks: Date Attacked Victim Attack details 2013/11 Target (stores) 110 million customer and credit card records stolen, through a phished subcontractor account.[22] CEO and IT security staff subsequently fired.[23] 2011/03 RSA Security Internal RSA staff phished successfully,[24] leading to the master keys for all RSA SecureID security tokens being stolen, then subsequently used to break into US defense suppliers.[25] 2014/09 Home Depot Personal and Credit card data of 100+million shoppers of all 2200 Home Depot stores posted for sale on hacking web sites.[26] 2014/11 ICANN Notably, administrative access to the Centralized Zone Data System was gained, allowing the attacker to get zone files, and data about users in
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 511 Date Attacked Victim Attack details the system, such as their real names, contact information, and salted hashes of their passwords. Access was also gained to ICANN's public Governmental Advisory Committee wiki, blog, and whois information portal. Web Banking has been outstanding among energetic Internet-shrewd people for quite a while, its reputation is required to end up rapidly as Internet utilize turns out to be all around and people locate the various central focuses that it gives. In any case, it may have its own inconveniences. In a middle dealing with a record system there is an injection of encountering fabricated stamp for trade. In a net dealing with a record system mystery key of the customer may be hacked and manhandled. Online trades are nowadays end up being to a great degree typical and there are diverse ambushes show behind this. In these sorts of various attacks, phishing is recognized as a critical security hazard. Phishing traps are in like manner transforming into an issue for web sparing cash and e- business customers. The question is the best approach to deal with applications that require an unusual condition of security. Phishing is a kind of online information extortion that expects to take sensitive information, for instance, electronic keeping cash passwords and Mastercard information from customers. One significance of phishing is given as "it is a criminal activity using social outlining systems. Phishers attempt to erroneously get unstable information, for instance, passwords and charge card purposes of enthusiasm, by going up against the presence of a solid individual or business in an electronic correspondence". Here we will use a part of the strategies to secure the customer information and to keep the possible fake of mystery word hacking. Picture taking care of a steganography and visual cryptography is used. Steganography is the workmanship and investigation of creating covered messages in a way that no one isolated from arranged recipient knows the nearness of the message. Extraordinary message is being concealed with a transporter to such a degree, to the point that the movements so occurred in the conveyor are not discernible. In steganography modernized pictures can be used as a transporter to disguise pictures. Joining riddle picture with a carrier picture gives the covered picture, the covered picture is difficult to perceive without recuperation, and by far most of the steganography technique are either three or four touching pixels around a goal pixel. While the proposed framework can use at most importantly else eight bordering neighbors with the objective that imperceptibility regard gets to be distinctly more noteworthy and the parceling it into a shares. Mean number of shares to be made is depending upon the arrangement picked by the bank. Right when two shares are made one is secured in the bank database and the other one is kept by the customer. The customer needs to display the share in the midst of most of his trade. This give is stacked to the essential share to get the primary picture. By then translating strategy is used to take the covered mystery word on affirmation or rejection of the yield and approve the customer. The visual cryptography (VC) is a strategy for encoding a riddle picture into shares with the true objective that stacking a satisfactory number of shares reveals the secret picture. Picture get ready and an improved visual cryptography is used. Picture get ready is a system of taking care of a data picture and to get the yield as either improved kind of a similar picture and additionally characteristics of the information picture. Visual Cryptography (VC) is the method for encoding a puzzle enter into shares with the ultimate objective that, stacking a satisfactory number of shares reveals the secret key. Naor and Shamir displayed a direct yet faultlessly secure way that grants riddle offering to no cryptographic count, named as Visual Cryptography Scheme (VCS). Basically, Visual Cryptography Scheme is an encryption methodology that usages combinatorial techniques to encode puzzle created materials. The contemplation is to change over the formed material into a photo and encode this photo into n shadow pictures. The translating requires simply selecting some subset of these n pictures, making transparencies of them, and stacking them on top of each other. The most clear Visual Cryptography Scheme is given by the going with setup. A secret picture contains a social affair of exceedingly differentiating pixels where each pixel is managed uninhibitedly. To encode the riddle picture, we split the primary picture into balanced interpretations (called as shares) with the true objective that each pixel in an offer now subdivides into n high complexity sub-pixels. To translate the photo, a subset S of those n shares are picked and repeated on divided transparencies. In case S is a qualified subset, then stacking each one of these transparencies will allow visual recovery of the puzzle.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 512 II. PROBLEM DEFINATION In a core banking system, there is a shot of experiencing fashioned mark for exchange. In the net saving money framework, the secret key of client might be hacked and abused. In this manner Security is still a test in these applications. Here, we propose a procedure to secure the client data and to keep the conceivable fraud of marks and secret word hacking. III. LITERATURE REVIEW In [1], new strategy is proposed, that utilizations content based steganography and visual cryptography, which minimizes data sharing amongst shopper and online shipper however empower effective store exchange from customer's record to vendor's record subsequently shielding purchaser data and avoiding abuse of data at dealer side. The strategy proposed is particularly for E- Commerce however can without much of a stretch be reached out for online and also physical managing an account. In [3] proposes a novel procedure which endeavors to fathom all the above issues in steganography. In the proposed strategy, rather than substitutions we are utilizing the idea of matches between mystery information and cover picture. What's more, we additionally utilize the idea of altered recurrence for every character in English. The proposed technique is lossless, has limitless payload limit, has key size which is just around 10 to 20 rate of the message estimate and has enhanced security. In [4], an information concealing plan by basic LSB substitution is proposed. By applying an ideal pixel alteration procedure to the stego-picture acquired by the basic LSB substitution strategy, the picture nature of the stego-picture can be significantly enhanced with low additional computational unpredictability. The most pessimistic scenario mean-square-mistake between the stego-picture and the cover-picture is determined. Trial comes about demonstrate that the stego-picture is outwardly vague from the first cover-picture. The acquired results additionally demonstrate a noteworthy change as for a past work. In [5], the sender is concealing the information which is to send to the beneficiary as pictures. The picture is a blend of the content which is gotten from the two procedures of the content steganography which has been inferred before. The two procedures utilized are Reflection Symmetry and the Vedic Numeric technique. The sender sends the information into apportioned shape or we can say the information which is sent by the sender is parceled into 2 sections and separate-isolate part is sent to the two procedures. We are doing this as though the entire content is sent to one procedure or Vedic strategy it will expend more memory. In this way, the content in the wake of being prepared by the two procedures is joined to shape an entire content and after that the content is changed over into picture by the different techniques or calculations ex. LSB, network augmentation. In this way, the content is changed over into picture that is sent to the recipient. The model proposed in [6] considers the affectability and covering conduct of the human visual framework by method for a nearby isotropic complexity measure and a concealing model. We look at the addition of this watermark in luminance pictures and in the blue channel of shading pictures. We likewise assess the vigor of such a watermark regarding its installing thickness. Our outcomes demonstrate that this approach encourages the addition of a more powerful watermark while safeguarding the visual nature of the first. Moreover, we show that the most extreme watermark thickness by and large does not give the best identification execution. In [8] paper, a procedure using picture preparing has been proposed utilizing Steganography and visual cryptography, and afterward partitioning it into shares. In this venture the message or the content document is taken as a contribution from the client who needs to get implanted in the picture record. The picture document can be of the expansions .jpg or .png. The message process is computed utilizing the MD5 calculation and this is affixed with the message. The annexed message is then encoded utilizing the AES calculation. The mystery enters utilized as a part of the AES calculation is scrambled utilizing the RSA calculation. The affixed scrambled message is inserted in the picture utilizing the minimum huge piece calculation. The encoded picture is transmitted. The secret word must be given before transmitting the picture document. At the beneficiaries side the watermarked picture record is taken as the information. The message in the picture record is removed utilizing the LSB calculation. The removed message is separated into the process and the message part. The message process is figured for the message and is contrasted and the got one. In the event that they are similar then message is said to be verified. IV. PROPOSED SYSTEM Our project proposes a technique of processing a secret key of a customer and then dividing it into shares. When two shares are created, one is stored in the Bank database and the other is kept by the customer. The customer has to present the share during all of his transactions. This share
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 02 | Feb -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 513 is stacked with the first share get the original secret key. The Correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer. V. CONCLUSION This system uses Colour Image Visual Cryptography for password protection and it is not able to break this protection with present technology. This system will be a boon for the Core Banking Application and the bank customers are feeling free from the password hacking problems. Once this system is deployed in web Server, all the computer in the network can able to access this application through browser without any software installation in their computer. REFRENCES [1] S. Roy, P. Venkateswaran, “Online Payment System using Steganography and Visual Cryptography”, IEEE Conference on Electrical, Electronics and Computer Science, vol. 6, no. 2, pp. 88-93, 2014 [2] M. Suresh, B. Domathoti, N. Putta, “Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods”, International Journal of Innovative Research in Computer and Communication Engineering ,vol. 3, no. 8, pp. 7519-7525, August 2015. [3] Rahna E, V. Govindan, “A Novel Technique For Secure, Lossless Steganography With Unlimited Payload And Without Exchange Of Stegoimage”, International Journal of Advances in Engineering & Technology, vol. 6, no. 3, pp. 1263-1270, July 2013. [4] C. Chan, L. Cheng, “Hiding data in images by simple LSB substitution”, Pattern Recognition, pp. 469– 474, August 2004. [5] N. Shrivastava1, T. Verma, “A Survey on Various Techniques for Generating Image Steganography with Improved Efficiency”, International Journal of Advanced Research in Computer Engineering & Technology , vol. 4, no. 3, pp. 1005-1009, March 2015 [6] M. Kutter, S. Winkler, “A Vision-Based Masking Model for Spread-Spectrum Image Watermarking”, In proceedings International Conference on Computing, Electronics and Electrical Technologies, pp. 313-336, 2004. [7] X. Li, B. Yang, D. Cheng, T. Zeng, “A Generalization of LSB Matching”, IEEE Signal Processing Letters, vol. 16, no. 2, pp. 69-72, February 2009. [8] P. Vaman, C. Manjunath, Sandeep , “Integration of Steganography and Visual Cryptography for Authenticity”, International Journal of Emerging Technology and Advanced Engineering, vol. 3, no. 6, pp. 80-84, June 2013 [9] C. Hegde , Manu S , P. Shenoy , Venugopal K R , L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications”, In proceedings of 16th International Conference on Advanced Computing and Communications, pp. 65- 72,2013 [10] A. Suklabaidya, G. Sahoo, “Visual Cryptographic Applications”, International Journal on Computer Science and Engineering, vol. 5, no. 06, pp 455-464, June 2013 [11] R. C. Gonzalez and R. E. Woods," Digital Image Processing” Upper Saddle River, NJ: Prentice-Hall, 2006. [12] S.Premkumar and A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking Application”. [13] H. Wang and S. Wang, "Cyber warfare Steganography vs. Steganalysis," Commun. ACM, vol. 47, no. 10, pp. 76-82, 2004. [14] X. Zhang and S. Wang, "Steganography using Multiplebase notational system and human Vision sensitivity," IEEE Signal Processing Letters, vol. 12, pp. 67- 70, Jan. 2005. [15] M. Shirali-Shahreza, "Steganography in MMS," in Multi topic Conference, 2007. INMIC 2007. IEEE International, 2007, pp. 1-4. [16] Aggelos Kiayias and Yona Raekow, “Efficient Steganography with Provable Security Guarantees” [17] T. Morkel, J.H.P. Eloff and M.S. Olivier,”An Overview Of Image Steganography” [18] Chandramathi S, Ramesh Kumar R, Suresh R, and Harish S,”An overview of visual cryptography” [19] Moni Naor, Adi Shamir,” visual cryptography” [20] Jithesh K, 2dr. A V Senthil Kumar, “Multi-Layer Information Hiding -A Blend Of Steganography And Visual Cryptography,” [21] Young-Chang Hou, “Visual cryptography for color images,” 2211