Skip to main content

Dynamic Authentication Using Visual Cryptography

  • Conference paper
  • First Online:
Computer Communication, Networking and IoT

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 459))

  • 319 Accesses

Abstract

Nowadays with the increase in cybersecurity threats, it has become very important to upgrade the cybersecurity standards for all web applications. Especially in the area of Internet Banking, user authentication is a major issue. An extra layer of security is necessary for user authentication. Two-factor authentication is providing extra layer security in banking services. Biometric-based authentication, password-based authentication, smart card-based authentication are some of the authentication techniques used in banking systems. But all these techniques rely on the security of the database. Another issue faced by the users is regarding the latency in receiving the SMS OTP during online banking. If the network connection is poor, then the user may face latency in receiving OTP. To overcome these issues, we can use the concept of visual cryptography. This paper aims to use the “visual cryptography technique” for the authentication of a user in Internet Banking systems. Visual cryptography was proposed by Naor and Shamir (Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt) in 1994. VC is one of the most secure techniques which can be used for secret sharing, in which the secret information will be in the form of an image. During encryption, we can divide the image into different shares or transparencies and the decryption process can be done by superimposing the shares. There is no need for complex computations in decryption; even by using a normal human visual system, we can decrypt the image; this is one of the advantages of visual cryptography. This paper presents a technique that uses the concept of (2,2) VC scheme to create shares of a unique key generated during the time of customer account creation. One of these shares is given to the customer, and another share will be kept within the server. During the time of two-factor authentication instead of OTP, OTP positions will be generated, and according to that, the server-side share will undergo changes dynamically. And the server-side share will be displayed to the user. The user can superimpose his/her share with the server share to generate the OTP.

Part of this work was submitted as Masters Project to University of Hyderabad, Hyderabad.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saxena A, Das ML, Gupta A (2005) MMPS: A versatile mobile-to-mobile payment system. In: 2005 4th annual international conference on mobile business, ICMB 2005, pp 400–405 (12)

    Google Scholar 

  2. Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt, pp 1–12. https://doi.org/10.1007/BFb0053419

  3. Nakajima M, Yamaguchi Y, Extended visual cryptography for natural images. J WSCG v10(i2):303–310

    Google Scholar 

  4. Hou YC, Chang CY, Lin F (1999) Visual cryptography for color images based on color decomposition. In: Proceedings of the fifth conference on information management, Taipei, Nov 1999, pp 584–591

    Google Scholar 

  5. Zhou Z, Arce GR, Dicrescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453

    Google Scholar 

  6. Kang I, Arce GR, Lee HK (2009) Color extended visual cryptography using error diffusion

    Google Scholar 

  7. Dhole AB, Janwe NJ (2013) An implementation of algorithms in visual cryptography in images. Int J Sci Res Publ 3(3), March 2013, ISSN 2250-3153

    Google Scholar 

  8. Chandramati S, Ramesh Kumar R, Suresh R, Harish S (2010) An overview of visual cryptography

    Google Scholar 

  9. Parakh A, Kak S, Recursive threshold visual cryptography scheme. https://www.researchgate.net/publication/24009070

  10. Haller Bellcore N, Metz C (1996) A one-time password system. Kaman Sciences Corporation, May 1996

    Google Scholar 

  11. Zhou Y, Hu L, Chu J (2017) An enhanced SMS-based OTP scheme. advances in engineering research. In: 2nd international conference on automation, mechanical control and computational engineering (AMCCE 2017), vol 118

    Google Scholar 

  12. Mulliner C, Borgaonkar R, Stewin P, Seifert J-P, SMS-based one-time passwords: attacks and defense

    Google Scholar 

  13. Ammayappan K, Saxena A, Negi A (2006) Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: 2006 proceedings—2006 14th international conference on advanced computing and communications, ADCOM 2006, pp 183–186

    Google Scholar 

  14. Hamdare S, Nagpurkar V, Mittal J (2014) Securing SMS based one time password technique from man in the middle attack. Int J Eng Trends Technol (IJETT) 11(3), May 2014.

    Google Scholar 

  15. Agoyi M, Seral D, SMS security: an asymmetric encryption approach. In: 2010 sixth international conference on wireless and mobile communications

    Google Scholar 

  16. Ankita, Karia R, Patankar AB, Tawde P (2014) SMS-based one time password vulnerabilities and safeguarding OTP over network. Int J Eng Res Technol (IJERT) 3(5), May 2014. ISSN: 2278-0181

    Google Scholar 

  17. https://www.netiq.com/documentation/advanced-authentication-63/server-administrator-guide/data/smsotp.html

  18. Prachi, Rathod D, Kapse SR, Secure bank transaction using data hiding mechanisms

    Google Scholar 

  19. Jain A, Soni S, Visual cryptography and image processing based approach for secure transactions in banking sector

    Google Scholar 

  20. Pal JK, Mandal JK, Dasgupta K, A (2, N) visual cryptographic techniques for banking applications

    Google Scholar 

  21. Hegde C, Manu S, Deepa Shenoy P, Venugopal KR, Patnaik LM, Secure authentication using image processing and visual cryptography for banking applications

    Google Scholar 

  22. https://github.com/Ferruck/viscrypt.git

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. D. Devika .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Devika, K.D., Saxena, A. (2023). Dynamic Authentication Using Visual Cryptography. In: Satapathy, S.C., Lin, J.CW., Wee, L.K., Bhateja, V., Rajesh, T.M. (eds) Computer Communication, Networking and IoT. Lecture Notes in Networks and Systems, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-19-1976-3_20

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-1976-3_20

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-1975-6

  • Online ISBN: 978-981-19-1976-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics