A Secure Authentication Using Visual Cryptography & Steganography

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015
A Secure Authentication Using Visual Cryptography
& Steganography
Ms. Deepti Chaudhary#1, Mrs. Rashmi Welekar *2
#
M.Tech Scholar, CSE Department, SRCOEM, Nagpur, India ,1
#
Associate Professor, CSE Department, SRCOEM, Nagpur, India 2
Abstract— In Core Banking or Net Banking, Customer may access
their funds and perform simple transaction from any of the
member bank branches and here customer can transfer money
online from his account to the another customer's account but the
major issue in banking is the authenticity of the customer. In
today's world, hacking is starting to become a major issue and this
is the reason that user cannot easily trust the information on the
internet. To solve the problem of authenticity, we are proposing an
algorithm based on Visual Cryptography and Steganography and
this algorithm is applicable for any authentication system. This
paper proposes a technique of hiding the secret code in an image
using steganography and then dividing it into 2 shares or sub1.
images where one of the shares is stored in the database and the
other kept by the customer. During all of his transaction the
Customer has to present his share. This share or sub-image is
stacked with database share to get the original image. Once again
Steganography is used to extract the secret code from the image.
Compare extracted secret code with the original secret code, if both
are same user authenticity may be granted and if both are not same,
one can decide that the share produced by user is fake and can be
rejected.
Keywords— Authentication, Secret, Overlap, Shares, Sub pixels,
Visual Cryptography, Steganography Introduction
I.
INTRODUCTION
Today, most application programs are only as secure as
their underlying system. Since the technology and design of
middleware has improved steadily, their detection and
prevention are a very difficult problem. As a result, it is nearly
impossible to be sure whether a computer or laptop that is
connected to the internet can be considered secure and
trustworthy or not. The main question is how to handle
applications or system that require a high level of security,
such as net banking and core banking.
Visual Cryptography is a one kind of cryptographic scheme
where the decryption of the encrypted secret code is done by
the human visual system and not by complex mathematical
calculations. Generally it deals with any secrets such as text or
pictures, etc. These secrets (text or image) are fed into the
system in a digital (image) form. The digital form of the
secrets is then divided into different parts based on the pixel
expansion of the digital secret. These parts or sub-images are
called shares. The shares or sub-images are then overlapped
correctly to visualize the secret.
Here we will use some of the important techniques to secure
the customer information and to prevent the possible forgery
of password hacking. The concept of visual cryptography and
image processing a steganography is used .Where
Steganography is the science and art of writing hidden
ISSN: 2231-5381
messages or codes in such a way that no one apart from
intended recipient knows the existence of the message or code.
Original message or code is being hidden with a carrier
(generally images) such that the changes so occurred in the
carrier are not observable. In steganography digital images
can be used as a carrier to hide secret code or image.
Combining secret code with a carrier image gives the hidden
image or stego image, the hidden image or stego image is
difficult to detect without retrieval
Level 1 hiding using Visual Cryptography
Level 2 Super Imposing Share1 and Share2 to Form the
Original Image
Original Image
This paper is organized as follows: Section1 comprises
Introduction, Section 2 comprises Related Work, section 3
comprises Proposed System, section 4 comprises Algorithm,
Section 5 comprises Phases of System, Section 6 comprises
Implementation, Section 7 comprises Future Work and
Conclusion is in section 8..
II. RELATED WORK
A survey of the related work in the area of visual
cryptography and its application in different sectors are
presented in this section. The Visual Cryptography was
introduced by Shamir [1] and Blakley [2], in 1994 and their
motivation was to safeguard cryptographic keys from loss.
These all schemes also have been widely employed in the
construction of different types of cryptographic protocols [3]
http://www.ijettjournal.org
Page 324
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015
and they have many applications in different areas such as
access control, launching of missiles, opening a safety deposit
box, or even opening a bank vault. A segment-based visual
cryptography(VC) suggested by Borchert [4] can be used only
to encrypt the messages or code containing numbers like bank
account number etc., the Visual Cryptography Scheme(VCS)
proposed by Wei-Qi Yan et al., [5] can be applied only for
image or printed text. A recursive Visual Cryptography method
proposed by Monoth et al., [6] is computationally complex
because here the encoded shares are further encoded into
number of sub-shares or sub-sub-images recursively. Similarly
a technique proposed by Kim et al., [7] also suffers from
computational complexity.
In these cases all participants or users who hold shares are
assumed to be honest, that is, they will not present any fake or
false shares during the phase of recovering or stacking the
secret image. Thus, the decrypted image shown on the stacking
of shares is considered as the real image. But, this may not be
true always because user can used fake share also. So, a
cheating prevention methodologies are introduced by Yan et
al., [8], Horng et al., [9] and Hu et al., [10]. But, it is observed
in all these methods, there is no facility of user authentication
testing. So, a user authentication technique is introduced by
chetana hegde in 2013[10]
III. PROPOSED SYSTEM
Here Visual Cryptography Technique is applied on
colour images. In this authentication system, customer or user
has to register himself initially. The information about the user
like his First-Name, Last-Name, Contact-Number, Email ID
and Password etc,.will be stored in database for future use.
This is a first step in our project.2nd Step is Email Verification,
here user will verify his identity by email or contact number. In
3rd step user will select an image (colored or black-white) and
apply steganography and visual cryptography in it. Image is
encrypted into two shares and both shares are necessary for
decrypting the image.
The proposed model is an extension of the previous
model. The proposed makes use of the Steganography
combined with visual cryptography algorithm. The proposed
visual cryptography algorithm is used to modify the pixel
locations of the stego image thus enhancing the security level
to new heights.
Initially the stego key1 is encoded to the LSB of the
image by using LSB bit insertion algorithm and then visual
cryptography algorithm is applied to the stego image. This
image is divided into two shares. The original stego key can
only be retrieved if both the shares are obtained. At the other
side means receiver side, both the shares are stacked together,
that is, the two shares are overlaid to get the stego image. The
stego key2 is decoded from the image by using an appropriate
inverse LSB algorithmText Font of Entire Document
ISSN: 2231-5381
Fig 1: Architecture of Authentication
If both the keys (stego key 1 and stego key 2) are same,
user authenticity may be granted and if both are not same,
admin can decide that the share produced by user is fake and
can be rejected
IV.
PHASES OF SYSTEM
A. Registration Phase
In the Registration Phase, User enter personnel
information (First Name, Last Name, EmailID, Contact
Number and Password). Next step is Email Verification
here user will verify his identity by email or contact
number. 3rd is share creation, here user choose an image
and enter minimum 6 digit stego key (secret key), Visual
Cryptography Share Creation and LSB insertion
Algorithm are applied to the image. The image distinct
into two share where one share kept with customer and
other share kept with server.
http://www.ijettjournal.org
Page 325
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015
image by using LSB algorithm. The second function is to
encrypt the image based on pixels and to get two
transparencies. The third function is the overlay/stack the
available shares to get the image. The fourth function is to
apply inverse LSB algorithm for extract the stego key from
the image and the last function is to compare the original
stego key with the resulting stego key. The main aim of the
algorithm is to design an efficient technique for checking
authenticity of the customer in banking applications
Algorithm : Creation of Shares
Fig 2: Registration Phase
B. Login Phase
The Second phase is login phase, here user entered
Email ID or Contact Number and Password which is
chosen by him during the registration phase then user
entered his share. User share send to the server the user
share and server share are combined together. The image
is seen to the user. Here Stego key(secret key) extracted
from the image. Here admin can test extracted stego key
with original stego key. If both are same, consider user as
a valid user. If both are not same, admin can that the
share produced by user is fake and can be rejected.
VI. IMPLEMENTATION
In the Registration Phase the weightiest portion is the
make of the share from the image. Where one share is kept
with customer and other is kept with database. For Login
Phase, user needs to enter a correct EmailID and Password in
the given text field. Then he has to browse his share and
process. At the server side the user’s share is joined with the
share in the server and an image is generated. The entire is
depicted in figure 4. Figure illustrates the creation and
stacking of shares.
Fig 3: Login phase
V. ALGORITHM
Five major concepts are involved in the proposed
technique. The first function is to add Stego key in the given
ISSN: 2231-5381
http://www.ijettjournal.org
Page 326
International Journal of Engineering Trends and Technology (IJETT) – Volume 21 Number 6 – March 2015
1.
2.
VII. FUTURE WORK
This Technique is not only use in banking sector but
also use in military sector for detecting phishing
websites.
We will add the concept of Image Server where user
shares will be stored. It provides more Security
VIII. CONCLUSION
In the above sections we presented and discussed various
algorithms that have been made to enhance the security and
that handle applications which require high level of security
such as net banking and core banking. It can be used in
different fields and different area to enhance security. The
individual share is unable to reflect secrecy of the data. The
permutations and combinations schemes are failure against the
shares. The visual cryptography scheme is also known as
secret sharing scheme.
REFERENCES
[1]
A. Shamir, .How to Share a Secret,. Communication ACM, vol. 22,
1979, pp. 612-613.
[2] G. R. Blakley, .Safeguarding Cryptographic Keys,. Proceedings of
AFIPS Conference, vol. 48, 1970, pp. 313-317.
[3] A. Menezes, P. Van Oorschot and S. Vanstone, .Handbook of
Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
[4] B. BorchertD. Jena, and S. K .Jena,(2009) “A Novel Visual
Cryptography Scheme”, The 2009 International Conference on
Advanced Computer Control, pp- 207-211.
[5] W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography
for Print and Scan Applications,. IEEE Transactions, ISCAS2004, pp. 572-575.
[6] T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using
Random Basis Column Pixel Expansion,.in Proceedings of
IEEEInternational Conference on Information Technology, 2007,
pp. 41-43.
[7] H. J. Kim, V. Sachnev, S. J. Choi and S. Xiang, .An Innocuous
Visual Cryptography Scheme,. in Proceedings of IEEE-8th
International Workshop on Image Analysis for Multimedia
Interactive Services, 2007
[8] H. Yan, Z. Gan and K. Chen, .A Cheater Detectable Visual
Cryptography Scheme,. Journal of Shanghai Jiaotong University,
vol. 38, no. 1, 2004.
[9] G. B. Horng, T. G. Chen and D. S. Tsai, .Cheating in Visual
Vryptography,. Designs, Codes, Cryptography, vol. 38, no. 2,
2006, pp. 219-236.
[10] C. M. Hu and W. G. Tzeng, .Cheating Prevention in Visual
Cryptography, . IEEE Transaction on Image Processing, vol. 16,
no. 1, Jan-2007, pp. 36-45.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 327
Download