This document summarizes and reviews various techniques for implementing visual cryptography and steganography for secure authentication. It begins with an abstract that outlines using image processing and visual cryptography to divide a customer's transaction key into shares, with one share stored by the bank and one by the customer. The customer must present their share for transactions. The document then reviews the history of cyber attacks on major companies. It proposes a system using color image visual cryptography to encrypt passwords and divide them into shares between the bank and customer to authenticate transactions securely. It concludes that this approach could help solve issues with password hacking for core banking applications.