Secure authentication using image processing and visual cryptography for banking applications

C Hegde, S Manu, PD Shenoy… - 2008 16th …, 2008 - ieeexplore.ieee.org
Core banking is a set of services provided by a group of networked bank branches. Bank
customers may access their funds and perform other simple transactions from any of the …

A novel anti phishing framework based on visual cryptography

D James, M Philip - … conference on power, signals, controls and …, 2012 - ieeexplore.ieee.org
With the advent of internet, various online attacks has been increased and among them the
most popular attack is phishing. Phishing is an attempt by an individual or a group to get …

Tamperproof transmission of fingerprints using visual cryptography schemes

T Monoth - Procedia Computer Science, 2010 - Elsevier
Visual Cryptography and biometrics have been identified as the two most important aspects
of digital security. In this paper, we propose a method for the preparation and secure …

A new fast and efficient visual cryptography scheme for medical images with forgery detection

S Manimurugan, K Porkumaran - … International Conference on …, 2011 - ieeexplore.ieee.org
In the field of medicine, storing images in a secure way has become a challenge. In order to
face this challenge of security, we propose an algorithm based on visual cryptography for …

Contrast-enhanced visual cryptography schemes based on additional pixel patterns

T Monoth - 2010 International Conference on Cyberworlds, 2010 - ieeexplore.ieee.org
Visual cryptography is a kind of secret image sharing scheme that uses the human visual
system to perform the decryption computations. A visual cryptography scheme allows …

[PDF][PDF] An analysis of region growing image segmentation schemes

A Chaturvedi, R Khanna, V Kumar - International Journal of …, 2016 - researchgate.net
Region growing is a simple region-based image segmentation method. It is also classified
as a pixel-based image segmentation method since it involves the selection of initial seed …

[PDF][PDF] Chaos based cancellable biometric template protection scheme-a proposal

VG Supriya, SR Manjunatha - International Journal of Engineering …, 2014 - academia.edu
Security of Information and ensuring personal privacy are growing concerns in today's
society. Most concerns against the common use of biometrics arise from the storage and …

[PDF][PDF] Visual cryptography for authentication using captcha

A Vinodhini, LJ Ambarasi - International Journal of Computer and …, 2010 - academia.edu
Authenticity of the user is the major issue in today's internet applications such as core
banking. Password has been the most used authentication mechanism which is subjected to …

An image based authentication technique using visual cryptography scheme

VA Daisy, CV Joe, SSS Sugi - 2017 International Conference …, 2017 - ieeexplore.ieee.org
Visual Cryptography is a technique, which is used to conceal the secret image into
transparencies and these transparencies are distributed to the intended recipients. They …

A novel approach for secret data transfer using image steganography and visual cryptography

DRL Prasanna, LJ Anbarasi, MJ Vincent - Proceedings of the 2011 …, 2011 - dl.acm.org
Steganography is the art and science of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the existence of the message. It is a …