Skip to Main Content
Notice of Violation of IEEE Publication Principles
"New Visual Steganography Scheme for Secure Banking Application"
by S. Premkumar and A.E. Narayanan
in the Proceedings of the International Conference on Computing, Electronics and Electrical Technologies (ICCEET), 2012, pp. 1013-1016
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.
This paper duplicates text from the two papers listed below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:
"Secure Authentication using Image Processing and Visual Cryptography for Banking Applications"
by Chetana Hedge, Manu S., P. Deepa Shenoy, Venugopol K.R., and L.M. Patnaik
in the Proceedings of the 16th International Conference on Advanced Computing and Communications (ADCOM), December 2008, pp. 65-72
"Adaptive Steganography Scheme Using More Surrounding Pixels"
by Masoud Afrakhteh and Subariah Ibrahim
in the Proceedings of the International Conference on Computing Design and Applications (ICCDA), 2010, pp. 225-229
Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difficult to trust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing, improved steganograph- and visual cryptography. This paper proposes a technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbors so that imperceptibility value grows bigger and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank. When two shares are created, one is stored in the Bank database and the other is kept by the customer. The customer has to present the share during all of his transactions. This share is stacked with the first share to get the original image. Then decoding method is used to take the hidden password on acceptance or rejection of the output and authenticate the customer.