AUTHENTICATION FOR ONLINE TRANSACTION USING TWO FACTOR VERIFICATION

S Mohanram, K Vidya

Abstract


Authenticity of the user is the major issue in today’s internet applications such as online transaction. Password has been the most used authentication mechanism which is subjected to online attacks. Due to unavoidable hacking on the internet, it is difficult to trust the User Identity on the internet. To solve this problem this paper proposes a BIOMETRIC based Visual Cryptography scheme to address the authentication issues. This methodology proposes the finger print image which is obtained from the user is Steganographed with PIN NUMBER of the user and the Steganographed image which in turn is divided into two shares. One share is stored in the bank database and the other share is provided to the customer. Hash code is generated for the customer share and it is stored in the bank database. One Time Password(OTP) is used every time to ensure the trusted submission of shares. The system not only ensures the secured transaction of process but also verifies the true identity of the person through one time password. The customer has to present the share during all of his/her transactions after entering the OTP. When the customer presents his share the hash code is generated and compared with the database value. If it matches, the shares are stacked to get the original Steganographed image. Again, the Desteganography process is carried on to obtain the original finger print image and the PIN NUMBER. The user is allowed to proceed further only after this authentication. This process ensures proper security scheme.


Keywords


Visual Cryptography, authentication issues, finger print image, steganographed image.

References


M. Naor and A. Shamir, .Visual Cryptography,. Advances in Cryptography-EUROCRYPT'94, Lecture Notes in Computer Science 950,1995, pp. 1-12.

A.Shamir,.Howto Share a Secret,. Communication ACM, vol. 22,1979, pp. 612-613.

G. R. Blakley, .Safeguarding Cryptographic Keys,. Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.

Feng Liu and ChuanKunWu, Optimal XOR based (2,n)-Visual Cryptography Schemes.

Jithesh, Dr. A. V. Senthil Kumar Multilayer information hiding – A blend of steganography and Visual Cryptography.

W-Q Yan, D. Jin and M. S. Kanakanahalli, .Visual Cryptography for Print and Scan Applications,. IEEE Transactions, ISCAS-2004, pp.572-575.

T. Monoth and A. P. Babu, .Recursive Visual Cryptography Using Random Basis Column Pixel Expansion,. in Proceedings of IEEEInternational Conference on Information Technology, 2007, pp.4143.

G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106

L. A. MacPherson, “Grey level visual cryptography for general access structures,” M.S. thesis, University of Waterloo, Ontario, Canada, 2002.

N. K. Ratha, J. H. Connell, R. M. Bolle Enhancing security and privacy in biometrics – based authentication systems.


Full Text: PDF

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

.......................................................................................................................................................................................................................

ISSN  2279 – 0381 |  IST HOMEJOURNAL HOME | Copyright IST 2012-13

.......................................................................................................................................................................................................................