Abstract
Nowadays with the increase in cybersecurity threats, it has become very important to upgrade the cybersecurity standards for all web applications. Especially in the area of Internet Banking, user authentication is a major issue. An extra layer of security is necessary for user authentication. Two-factor authentication is providing extra layer security in banking services. Biometric-based authentication, password-based authentication, smart card-based authentication are some of the authentication techniques used in banking systems. But all these techniques rely on the security of the database. Another issue faced by the users is regarding the latency in receiving the SMS OTP during online banking. If the network connection is poor, then the user may face latency in receiving OTP. To overcome these issues, we can use the concept of visual cryptography. This paper aims to use the “visual cryptography technique” for the authentication of a user in Internet Banking systems. Visual cryptography was proposed by Naor and Shamir (Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt) in 1994. VC is one of the most secure techniques which can be used for secret sharing, in which the secret information will be in the form of an image. During encryption, we can divide the image into different shares or transparencies and the decryption process can be done by superimposing the shares. There is no need for complex computations in decryption; even by using a normal human visual system, we can decrypt the image; this is one of the advantages of visual cryptography. This paper presents a technique that uses the concept of (2,2) VC scheme to create shares of a unique key generated during the time of customer account creation. One of these shares is given to the customer, and another share will be kept within the server. During the time of two-factor authentication instead of OTP, OTP positions will be generated, and according to that, the server-side share will undergo changes dynamically. And the server-side share will be displayed to the user. The user can superimpose his/her share with the server share to generate the OTP.
Part of this work was submitted as Masters Project to University of Hyderabad, Hyderabad.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saxena A, Das ML, Gupta A (2005) MMPS: A versatile mobile-to-mobile payment system. In: 2005 4th annual international conference on mobile business, ICMB 2005, pp 400–405 (12)
Naor M, Shamir A (1995) Visual cryptography. In: Proceedings of the advances in cryptology—Eurocrypt, pp 1–12. https://doi.org/10.1007/BFb0053419
Nakajima M, Yamaguchi Y, Extended visual cryptography for natural images. J WSCG v10(i2):303–310
Hou YC, Chang CY, Lin F (1999) Visual cryptography for color images based on color decomposition. In: Proceedings of the fifth conference on information management, Taipei, Nov 1999, pp 584–591
Zhou Z, Arce GR, Dicrescenzo G (2006) Halftone visual cryptography. IEEE Trans Image Process 15(8):2441–2453
Kang I, Arce GR, Lee HK (2009) Color extended visual cryptography using error diffusion
Dhole AB, Janwe NJ (2013) An implementation of algorithms in visual cryptography in images. Int J Sci Res Publ 3(3), March 2013, ISSN 2250-3153
Chandramati S, Ramesh Kumar R, Suresh R, Harish S (2010) An overview of visual cryptography
Parakh A, Kak S, Recursive threshold visual cryptography scheme. https://www.researchgate.net/publication/24009070
Haller Bellcore N, Metz C (1996) A one-time password system. Kaman Sciences Corporation, May 1996
Zhou Y, Hu L, Chu J (2017) An enhanced SMS-based OTP scheme. advances in engineering research. In: 2nd international conference on automation, mechanical control and computational engineering (AMCCE 2017), vol 118
Mulliner C, Borgaonkar R, Stewin P, Seifert J-P, SMS-based one-time passwords: attacks and defense
Ammayappan K, Saxena A, Negi A (2006) Mutual authentication and key agreement based on elliptic curve cryptography for GSM. In: 2006 proceedings—2006 14th international conference on advanced computing and communications, ADCOM 2006, pp 183–186
Hamdare S, Nagpurkar V, Mittal J (2014) Securing SMS based one time password technique from man in the middle attack. Int J Eng Trends Technol (IJETT) 11(3), May 2014.
Agoyi M, Seral D, SMS security: an asymmetric encryption approach. In: 2010 sixth international conference on wireless and mobile communications
Ankita, Karia R, Patankar AB, Tawde P (2014) SMS-based one time password vulnerabilities and safeguarding OTP over network. Int J Eng Res Technol (IJERT) 3(5), May 2014. ISSN: 2278-0181
Prachi, Rathod D, Kapse SR, Secure bank transaction using data hiding mechanisms
Jain A, Soni S, Visual cryptography and image processing based approach for secure transactions in banking sector
Pal JK, Mandal JK, Dasgupta K, A (2, N) visual cryptographic techniques for banking applications
Hegde C, Manu S, Deepa Shenoy P, Venugopal KR, Patnaik LM, Secure authentication using image processing and visual cryptography for banking applications
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Devika, K.D., Saxena, A. (2023). Dynamic Authentication Using Visual Cryptography. In: Satapathy, S.C., Lin, J.CW., Wee, L.K., Bhateja, V., Rajesh, T.M. (eds) Computer Communication, Networking and IoT. Lecture Notes in Networks and Systems, vol 459. Springer, Singapore. https://doi.org/10.1007/978-981-19-1976-3_20
Download citation
DOI: https://doi.org/10.1007/978-981-19-1976-3_20
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1975-6
Online ISBN: 978-981-19-1976-3
eBook Packages: EngineeringEngineering (R0)