International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015 A Secure Authentication Using Visual Cryptography & Steganography Ms. Deepti Chaudhary#1, Mrs. Rashmi Welekar *2 # M.Tech Scholar, CSE Department, SRCOEM, Nagpur, India ,1 # Associate Professor, CSE Department, SRCOEM, Nagpur, India 2 Abstract— In Core Banking or Net Banking, Customer may access their funds and perform simple transaction from any of the member bank branches and here customer can transfer money online from his account to the another customer's account but the major issue in banking is the authenticity of the customer. In today's world, hacking is starting to become a major issue and this is the reason that user cannot easily trust the information on the internet. To solve the problem of authenticity, we are proposing an algorithm based on Visual Cryptography and Steganography and this algorithm is applicable for any authentication system. This paper proposes a technique of hiding the secret code in an image using steganography and then dividing it into 2 shares or sub1. images where one of the shares is stored in the database and the other kept by the customer. During all of his transaction the Customer has to present his share. This share or sub-image is stacked with database share to get the original image. Once again Steganography is used to extract the secret code from the image. Compare extracted secret code with the original secret code, if both are same user authenticity may be granted and if both are not same, one can decide that the share produced by user is fake and can be rejected. Keywords— Authentication, Secret, Overlap, Shares, Sub pixels, Visual Cryptography, Steganography Introduction I. INTRODUCTION Today, most application programs are only as secure as their underlying system. Since the technology and design of middleware has improved steadily, their detection and prevention are a very difficult problem. As a result, it is nearly impossible to be sure whether a computer or laptop that is connected to the internet can be considered secure and trustworthy or not. The main question is how to handle applications or system that require a high level of security, such as net banking and core banking. Visual Cryptography is a one kind of cryptographic scheme where the decryption of the encrypted secret code is done by the human visual system and not by complex mathematical calculations. Generally it deals with any secrets such as text or pictures, etc. These secrets (text or image) are fed into the system in a digital (image) form. The digital form of the secrets is then divided into different parts based on the pixel expansion of the digital secret. These parts or sub-images are called shares. The shares or sub-images are then overlapped correctly to visualize the secret. Here we will use some of the important techniques to secure the customer information and to prevent the possible forgery of password hacking. The concept of visual cryptography and image processing a steganography is used .Where Steganography is the science and art of writing hidden ISSN: 2231-5381 messages or codes in such a way that no one apart from intended recipient knows the existence of the message or code. Original message or code is being hidden with a carrier (generally images) such that the changes so occurred in the carrier are not observable. In steganography digital images can be used as a carrier to hide secret code or image. Combining secret code with a carrier image gives the hidden image or stego image, the hidden image or stego image is difficult to detect without retrieval Level 1 hiding using Visual Cryptography Level 2 Super Imposing Share1 and Share2 to Form the Original Image Original Image This paper is organized as follows: Section1 comprises Introduction, Section 2 comprises Related Work, section 3 comprises Proposed System, section 4 comprises Algorithm, Section 5 comprises Phases of System, Section 6 comprises Implementation, Section 7 comprises Future Work and Conclusion is in section 8.. II. RELATED WORK A survey of the related work in the area of visual cryptography and its application in different sectors are presented in this section. The Visual Cryptography was introduced by Shamir [1] and Blakley [2], in 1994 and their motivation was to safeguard cryptographic keys from loss. These all schemes also have been widely employed in the construction of different types of cryptographic protocols [3] http://www.ijettjournal.org Page 324 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015 and they have many applications in different areas such as access control, launching of missiles, opening a safety deposit box, or even opening a bank vault. A segment-based visual cryptography(VC) suggested by Borchert [4] can be used only to encrypt the messages or code containing numbers like bank account number etc., the Visual Cryptography Scheme(VCS) proposed by Wei-Qi Yan et al., [5] can be applied only for image or printed text. A recursive Visual Cryptography method proposed by Monoth et al., [6] is computationally complex because here the encoded shares are further encoded into number of sub-shares or sub-sub-images recursively. Similarly a technique proposed by Kim et al., [7] also suffers from computational complexity. In these cases all participants or users who hold shares are assumed to be honest, that is, they will not present any fake or false shares during the phase of recovering or stacking the secret image. Thus, the decrypted image shown on the stacking of shares is considered as the real image. But, this may not be true always because user can used fake share also. So, a cheating prevention methodologies are introduced by Yan et al., [8], Horng et al., [9] and Hu et al., [10]. But, it is observed in all these methods, there is no facility of user authentication testing. So, a user authentication technique is introduced by chetana hegde in 2013[10] III. PROPOSED SYSTEM Here Visual Cryptography Technique is applied on colour images. In this authentication system, customer or user has to register himself initially. The information about the user like his First-Name, Last-Name, Contact-Number, Email ID and Password etc,.will be stored in database for future use. This is a first step in our project.2nd Step is Email Verification, here user will verify his identity by email or contact number. In 3rd step user will select an image (colored or black-white) and apply steganography and visual cryptography in it. Image is encrypted into two shares and both shares are necessary for decrypting the image. The proposed model is an extension of the previous model. The proposed makes use of the Steganography combined with visual cryptography algorithm. The proposed visual cryptography algorithm is used to modify the pixel locations of the stego image thus enhancing the security level to new heights. Initially the stego key1 is encoded to the LSB of the image by using LSB bit insertion algorithm and then visual cryptography algorithm is applied to the stego image. This image is divided into two shares. The original stego key can only be retrieved if both the shares are obtained. At the other side means receiver side, both the shares are stacked together, that is, the two shares are overlaid to get the stego image. The stego key2 is decoded from the image by using an appropriate inverse LSB algorithmText Font of Entire Document ISSN: 2231-5381 Fig 1: Architecture of Authentication If both the keys (stego key 1 and stego key 2) are same, user authenticity may be granted and if both are not same, admin can decide that the share produced by user is fake and can be rejected IV. PHASES OF SYSTEM A. Registration Phase In the Registration Phase, User enter personnel information (First Name, Last Name, EmailID, Contact Number and Password). Next step is Email Verification here user will verify his identity by email or contact number. 3rd is share creation, here user choose an image and enter minimum 6 digit stego key (secret key), Visual Cryptography Share Creation and LSB insertion Algorithm are applied to the image. The image distinct into two share where one share kept with customer and other share kept with server. http://www.ijettjournal.org Page 325 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015 image by using LSB algorithm. The second function is to encrypt the image based on pixels and to get two transparencies. The third function is the overlay/stack the available shares to get the image. The fourth function is to apply inverse LSB algorithm for extract the stego key from the image and the last function is to compare the original stego key with the resulting stego key. The main aim of the algorithm is to design an efficient technique for checking authenticity of the customer in banking applications Algorithm : Creation of Shares Fig 2: Registration Phase B. Login Phase The Second phase is login phase, here user entered Email ID or Contact Number and Password which is chosen by him during the registration phase then user entered his share. User share send to the server the user share and server share are combined together. The image is seen to the user. Here Stego key(secret key) extracted from the image. Here admin can test extracted stego key with original stego key. If both are same, consider user as a valid user. If both are not same, admin can that the share produced by user is fake and can be rejected. VI. IMPLEMENTATION In the Registration Phase the weightiest portion is the make of the share from the image. Where one share is kept with customer and other is kept with database. For Login Phase, user needs to enter a correct EmailID and Password in the given text field. Then he has to browse his share and process. At the server side the user’s share is joined with the share in the server and an image is generated. The entire is depicted in figure 4. Figure illustrates the creation and stacking of shares. Fig 3: Login phase V. ALGORITHM Five major concepts are involved in the proposed technique. The first function is to add Stego key in the given ISSN: 2231-5381 http://www.ijettjournal.org Page 326 International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015 1. 2. VII. FUTURE WORK This Technique is not only use in banking sector but also use in military sector for detecting phishing websites. We will add the concept of Image Server where user shares will be stored. It provides more Security VIII. CONCLUSION In the above sections we presented and discussed various algorithms that have been made to enhance the security and that handle applications which require high level of security such as net banking and core banking. It can be used in different fields and different area to enhance security. The individual share is unable to reflect secrecy of the data. The permutations and combinations schemes are failure against the shares. The visual cryptography scheme is also known as secret sharing scheme. REFERENCES [1] A. Shamir, .How to Share a Secret,. Communication ACM, vol. 22, 1979, pp. 612-613. [2] G. R. Blakley, .Safeguarding Cryptographic Keys,. Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317. [3] A. Menezes, P. Van Oorschot and S. Vanstone, .Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997. [4] B. BorchertD. Jena, and S. K .Jena,(2009) “A Novel Visual Cryptography Scheme”, The 2009 International Conference on Advanced Computer Control, pp- 207-211. [5] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan Applications,. IEEE Transactions, ISCAS2004, pp. 572-575. [6] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,.in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43. [7] H. J. Kim, V. Sachnev, S. J. Choi and S. Xiang, .An Innocuous Visual Cryptography Scheme,. in Proceedings of IEEE-8th International Workshop on Image Analysis for Multimedia Interactive Services, 2007 [8] H. Yan, Z. Gan and K. Chen, .A Cheater Detectable Visual Cryptography Scheme,. Journal of Shanghai Jiaotong University, vol. 38, no. 1, 2004. [9] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual Vryptography,. Designs, Codes, Cryptography, vol. 38, no. 2, 2006, pp. 219-236. [10] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual Cryptography, . IEEE Transaction on Image Processing, vol. 16, no. 1, Jan-2007, pp. 36-45. ISSN: 2231-5381 http://www.ijettjournal.org Page 327