Abstract — Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difficult totrust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing, improved steganography and visual cryptography. This paper proposes technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel w...
The method in which the visual information is encrypted by the process of encryption and those encry...
Abstract: Now a day’s Steganography plays an important role in defence, public sectors works and int...
Sensitive secret data transmission through internet has been of great security concern which can be ...
Core banking is a set of services provided by a group of networked bank branches. Bank customers may...
Today’s internet world is highly prone to various online attacks, of which the most harmful attack i...
The Current banking system is very popular with the feature of offering customers a high-quality ser...
ABSTRACT: In net banking system it is not guaranteed that every transaction will be carried out very...
With the rise in internet users, the need for security has increased as well. The first step in secu...
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in ba...
Abstract — Graphical password using cued click points is one of the alternative and better solutions...
E-Commerce payment systems have become increasingly popular due to the widespread use of the interne...
Abstract-Visual Cryptographic Scheme is a special technique used to send the data securely over the ...
The Current banking system is very popular with the feature of offering customers a high-quality ser...
This paper presents a new security system by combining cryptographic and steganographic Technique. T...
Image steganography algorithms can be combined with encryption techniques to provide enhanced data s...
The method in which the visual information is encrypted by the process of encryption and those encry...
Abstract: Now a day’s Steganography plays an important role in defence, public sectors works and int...
Sensitive secret data transmission through internet has been of great security concern which can be ...
Core banking is a set of services provided by a group of networked bank branches. Bank customers may...
Today’s internet world is highly prone to various online attacks, of which the most harmful attack i...
The Current banking system is very popular with the feature of offering customers a high-quality ser...
ABSTRACT: In net banking system it is not guaranteed that every transaction will be carried out very...
With the rise in internet users, the need for security has increased as well. The first step in secu...
In this paper a novel (2, n) visual cryptographic scheme has been proposed which may be useful in ba...
Abstract — Graphical password using cued click points is one of the alternative and better solutions...
E-Commerce payment systems have become increasingly popular due to the widespread use of the interne...
Abstract-Visual Cryptographic Scheme is a special technique used to send the data securely over the ...
The Current banking system is very popular with the feature of offering customers a high-quality ser...
This paper presents a new security system by combining cryptographic and steganographic Technique. T...
Image steganography algorithms can be combined with encryption techniques to provide enhanced data s...
The method in which the visual information is encrypted by the process of encryption and those encry...
Abstract: Now a day’s Steganography plays an important role in defence, public sectors works and int...
Sensitive secret data transmission through internet has been of great security concern which can be ...