0% found this document useful (0 votes)
152 views

Secure Live ATM Transaction Using Steganography and Image Processing

The Current banking system is very popular with the feature of offering customers a high-quality service 24 hours a day, but the major issue in banking is the authenticity of the customer and most systems today rely on static passwords to verify a user’s identity. The user always tries to use, easy and guessable passwords, try to use the same password for one or more accounts, or some will write down their password, etc. So, there are many ways to steal these passwords by a hacker, they will be
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
152 views

Secure Live ATM Transaction Using Steganography and Image Processing

The Current banking system is very popular with the feature of offering customers a high-quality service 24 hours a day, but the major issue in banking is the authenticity of the customer and most systems today rely on static passwords to verify a user’s identity. The user always tries to use, easy and guessable passwords, try to use the same password for one or more accounts, or some will write down their password, etc. So, there are many ways to steal these passwords by a hacker, they will be
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165

Secure Live ATM Transaction using Steganography


and Image Processing
1 3
Krishnanand Ritesh Singh
Computer Science and Engineering Computer Science and Engineering
SRM Institute of Science & Technology SRM Institute of Science & Technology
Chennai, India Chennai, India
2 4
E. Saraswathi Shubham Nandi
Computer Science and Engineering Computer Science and Engineering
SRM Institute of Science & Technology SRM Institute of Science & Technology
Chennai, India Chennai, India

Abstract:- The Current banking system is very popular telecommunications tool that enables customers to make
with the feature of offering customers a high-quality financial transactions, especially withdrawals, without the
service 24 hours a day, but the major issue in banking is need for a cashier, clerk, or bank accountant. Along with
the authenticity of the customer and most systems today the easy and feasible use of ATMs, there has also been an
rely on static passwords to verify a user’s identity. The increase in the number of ATM thefts and frauds, which are
user always tries to use, easy and guessable passwords, growing at an appalling rate. ATM card verification
try to use the same password for one or more accounts, methods have changed little since they were first
or some will write down their password, etc. So, there introduced in the 1960s. ATM safety standards are largely
are many ways to steal these passwords by a hacker, found in the safety traps of magnetic resources. The data on
they will be using many techniques, such as peeping i.e., the magnetic stripe are usually coded using two or three
shoulder surfing, snooping, sniffing, etc. Also, the PIN tracks, because, it is not difficult or expensive to have the
validation is done at later stages of ATM transactions. equipment to encode magnetic stripes. The standard
However, such passwords, come with major security covering this area is International Organization for
concerns. The crucial prerequisite these days is to get Standardization (ISO) 7811 and the technique for writing of
rid of the various forms of attacks. Due to this reason, the tracks is known as Friend-to-friend (F/2F). Thankfully,
different biometric systems gain popularity worldwide magnetic stripe feebleness has been partly addressed by the
for their behavior and physiological features. However, introduction of Europay International, MasterCard and Visa
the current biometric systems, for example, iris, palm, (EMV) smartcards.
face fingerprints or voice are extremely complex and
increase the time for each transaction. To overcome Currently the ATM communicates with central host
these issues a new concept has been proposed in this processor by Internet Service Supplier that includes a
paper by Using steganographic and visual cryptography gateway where all the ATM networks offered to the user.
technique approach on image processing with the help The ATM Machine is connected to the central host
of mobile phone. The proposed system uses live ATM processor using a modem. Once the client desire to perform
transaction with steganography to generate dynamic transection offers a PIN and ATM card. ATM machine
pin for each new ATM transaction performed. The forwards to the central host processor whereas ATM
concept of 4-digit static pin is eliminated with the 4-digit request to the customer bank. If client request a money
dynamic pin. Whenever a transaction is performed a central host processor initiates electronic fund transfer from
random 4-digit pin will be generated by the server and client bank to ATM central host processor account. Once
it will be steganographic with an image which will be the transfer is completed to the central host processor it
visible to user on his mobile screen. The user needs to sends permission to the ATM to withdraw the money.
type their profile password and the encrypted pin in the
image will be visible and can be used to perform Despite the many warnings given by the card user,
transection. In case of 3 wrong attempts the image of many people continue to choose easily guessable passwords
the person who is performing the transaction will be and PINs such as phone number, date of birth, social
captured and the alert system will send alert messages security number etc. However, due to the limitations of this
to user’s main and alternate mobile number. design, an intruder with a user card can access the user's
PIN one in every 10,000 users will have same number. If
I. INTRODUCTION the users have more than one cards, all the PINs needs to be
memorized by the user. This can lead user to write or save
The advancement of the payment system in the the passwords physically or use same passwords that can be
modern world has gone passed cash to cheques, and then to found in the dictionaries. A notable example of this was
payment cards such as credit cards and debit cards. ATM shown by Klein, who could crack 25% of 14,000 passwords
stands for Automated Teller Machine. It is a using a dictionary attack with only 86,000 words.

IJISRT23MAY927 www.ijisrt.com 307


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
The reason for not going with the encryption method information hidden from others, but it is to keep others from
is because the encryption creates a coded message that can thinking that the information even exists. The data can be
be mainly in basic formats like:
easily identified by the hackers that some important
information is being transferred as we know this whole  Audio Steganography:
process will be completely relied on the internet hence, we Information hiding technique is a new kind of secret
tried to eliminate these threats by shifting to more tradition communication technology and Audio Steganography is
algorithm that is steganography. science of hiding messages or audios by modifying an audio
signal in an imperceptible manner. The host message before
steganography and the stego message after steganography
should have similar features. Embedding secret messages on
digital audio is a very difficult process. A variety of
techniques for embedding information into digital audio
have been developed.

 Image Steganography:
As the name suggests, Image Steganography refers to
the process of hiding data within an image file. The image
selected for this purpose is called a cover photo and the
image obtained after steganography is called a stego image.
The standard image algorithm for steganography is the LSB
embedding algorithm.

 Video Steganography:
Steganography can also be used in video files. If we
hide information in a video file, it can be called Video
Steganography. The video file should not be seen by the
attacker. The video steganography is divided into three
categories: intra embedding, pre embedding, and post
embedding. Intra embedding methods are categorized into
video compression categories such as intra-prediction
Fig 1 Traditional ATM cash withdrawal Process Flowchart
prediction, motion vectors, pixel translation, converting
coefficients. Pre-embedded methods are used in raw video,
The Proposed system uses live ATM transaction with
which can be categorized and convert domains. Post-
steganography to generate dynamic pin for each new ATM
embedding methods are more focused on bitstreams, which
transaction performed. The concept of 4-digit static pin is
means that the process of embedding, and extraction of
eliminated with the 4-digit dynamic pin. Whenever a
steganography video is all used in small, compressed
transaction is performed a random 4-digit pin will be
streams.
generated by the server and it will be steganography with
an image which will be visible to user on his mobile screen.
The user needs to type their profile password and the  Text files Steganography:
encrypted pin in the image will be visible and can be used Steganography can also be used in text files as well.
to perform transection. In case of 3 wrong attempts the When we hide information in a text file, it is called Text
image of the person who is performing the transaction will Steganography.
be captured and the alert system will send alert messages to
user’s main and alternate mobile number.  LSB Methods
In the gray scale picture, each pixel is represented by
The reason for not going with the encryption method 8 bits. The last pixel bit is called the Least Significant bit as
is because the encryption creates a coded message that can its value will only affect the pixel value by “1”. Thus, this
be easily identified by the hackers that some important structure is used to hide data in the image. If anyone
information is being transferred as we know this whole thought of the last two pieces as LSB pieces as they would
process will be completely relied on the internet hence, we only affect the pixel value by “3”. This helps to store
tried to eliminate these threats by shifting to more tradition additional data. Steganography of Bit Least Significant Bit
algorithm that is steganography. (LSB) is one such method where the insignificant bit of
imagery is replaced by data bit. As this method is
 STEGANOGRAPHY Types vulnerable to steganalysis to make it more secure we
STEGANOGRAPHY is derived from the Greek encrypt raw data before embedding it in the image.
Words: STEGANOS - “Covered” and GRAPHIE – Although the encryption process increases the complexity
“Writing”. The main goal of the steganography is to make of the time, but at the same time it also provides higher
communication between two or more ends in completely security as well. This method is very simple. In this way
undetectable manner without drawing suspicion to the some important bits or all the bits inside the image are
transmission of the hidden data. This is not done to keep the replaced with fragments of private message. The LSB

IJISRT23MAY927 www.ijisrt.com 308


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
embedding method has become the basis of many strategies accuracy of 92.34% achieved by the extractor model but
that hide messages within multimedia network company Processing time is relatively slow.
data. LSB embedding can also be applied to certain data
areas - for example, embedding hidden message in RGB Abdul Alif et el [8] introduced Steganography with
bitmap data values, or in JPEG image frequency data mapping and Method to eliminate steganalysis attacks.
coefficients. LSB embedding can also be used in a variety So, the proposed methodology Able to achieve 3.48%
of data formats and types. Therefore, LSB embedding is larger embedding capacity. But it was Not able to achieve
one of the most important methods of steganography used adaptable mapping between the cover and secret data bits.
today. Oleg Evsutin et el [9] gave Classification of methods
for data hiding in digital images and Reverse engineering
II. LITERATURE SURVEY (Steganalysis). A detailed classification of steganographic
algorithms but the Embedding efficiency is low.
Rama Moortht et el [1] has mainly focused on the
usage of the steganography to hide the data. Algorithm to Sabyasachi Pramanik et el [10] Approaches for
perform cryptographic hash function. Data Embedding information hiding using both cryptography &
Phase and Authentication Phase and whole data is stored as steganography is proposed keeping in mind two
an image in bank side , in which information about the considerations - size of the encrypted object and degree of
customer is saved and hashing is done. Authentication will security. It Cover image with hidden data in encrypted
be done by comparing the hash values. The given using cryptography, but Execution is relatively high.
methodology involves use of OTP (One Time Password)
which creates security issues in the whole process.  Design Methodology
The proposed methodology involves the use of
Ramadhan J.Mstafa et el [2] has Discussed about Steganography and Image Processing. The main aim of this
different techniques of information hiding and Digital research is to develop and introduce a new way of ATM
watermarking to mark all object in the same way. The transaction using Steganography technique where each time
concept of protection against detection and removal with a dynamic ATM pin is created and encrypted inside an
watermarking and fingerprinting is discussed. The issue image which will be accessed by the user through their
using that was described is Intensity of the colour affected. mobile by scanning a QR code during the transaction. The
steganographic image will be decrypted only using the
Urang Awajionyi s et el [3] has proposed way of user’s profile password. And Image Processing will be used
Secure ATM transaction using biometric fingerprint by to identify the person and send alert notification to
Replacing the use of pin and bank credit card. The customer’s original and alternate number if more than 3
Precision of authentication was improved as identical wrong attempt is made to decrypt the image during the live
matches are almost impossible. But this methodology is transaction.
Prone to fingerprint spoofing and false detection of
fingerprint. And require hardware upgradation.

Pavan S et el [4] has proposed concept of Concept of


multifactor authentication was discussed and
Authentication layer using IMEI number was introduced,
and it was mentioned that by Using IMEI number and
multifactor authentication security was improved but the
feasibility of the proposed solution was very low.
Frimpong Twum et el [5] has suggested Three tier
design structure. Application evaluation system based on
False Rejection Rate(FAL), False Acceptance Rate (FAR),
Average Matching Time (AMT) was discussed. The
concept to evaluate the system using different scale was
introduced but The solution is not feasible as it require
hardware upgradation.

Indrajit Das et el [6] has introduced Finger vein


authentication method as well as Light-weight
cryptography and steganography (MSB-LSB) algorithm has
been proposed and The average recognition accuracy is
98.75% and 97.2% with execution time 0.168 s but the The
vein authentication method is relatively complicated.

Ketan Ramaneti et el [7] has generated stego images


using Generative Adversarial Networks (GANs) and
Extractor model was improved with high accuracy. The
Fig 2 Client – Side Architecture

IJISRT23MAY927 www.ijisrt.com 309


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
In the above Fig. 2 The client or the end user must be done and both passwords will be cross checked if they
Swipe the card in the ATM machine and the machine will both are same then the access will be granted and then the
check the authenticity of the card and this functionality will transaction will proceed.
not be affected or will not be changed in the proposed
system. Then the ATM card will be scanned, and the user
authentication will appear to check the authenticity of the
user. Here the user must enter password, it is just basically
a four-digit user pin that the user must input in order to
proceed. If the user will give wrong password, then the
transaction will be closed. If the verification is successful,
then a QR code will be generated and in the mobile phone
the user has to install the application and again there will be
option for sign up and Sign In , if the user is using this
service for first time he needs to enter in the Sign Up
section and has to register itself for making use of service
and he/she is resisted then they have to tap on Sign In
button in order to access the dashboard of the profile. Once
after filling the credential the user can slide the Log In
button in order to access the dashboard there, the card that
are connected to the account will be displayed and option
like check details of the account , statement , balance check
will be there and in centre there is a button stating Tap To
Transect that will be used to scan the QR code that was
generated from the server side and is transmitted through
secure server to perform the transaction. So once the user
scans the QR code he/she will get a prompt to decrypt the
dynamic PIN and that PIN has to be entered by user in the
ATM to proceed with the transaction.

If the Dynamic PIN is incorrect then the transaction


will be closed if the PIN is correct then transection window
will be opened and the User can perform the transection or Fig 3 Server – Side Architecture
user can Abort the transection in between. In both the cases
in the end the transaction will be cancelled and when each The server side and the client side of the proposed
time the transaction is cancelled the user will get a chance system is inter-connected with each other and help to
to apply for a new Debit or Credit card. This are the reduce the risk in making transections using ATM. The
required steps for performing the ATM transection and the Server side plays a major role and we have used the method
functionality of the client-side architecture. The proposed of encryption where the specialised algorithms are used
work aims to enhance the security of ATM transection where we are manipulating the most significant bit of the
system as well as reduce the risk of external threads while structure and the pool of image will also be updated with
performing the ATM transactions. new images.

In the above Fig. 3 Firstly the server will check the For implementation we have prepared ten modules that
connection, if the connection is not established then the are:
transaction will be closed automatically and if the
connection is successful then a four-digit PIN will be  Login with OTP:
generated randomly, if the system is able to generate four The Login with OTP module enables us to Login
digit PIN then from a pool of image a random photo will using registered mobile number, user just has to enter the
picked otherwise system will try to generate a four digit registered mobile number and request for OTP after
PIN again. If the Random photo is picked then the entering the OTP the User has to slide the button and
steganography is performed , it is performed using MSB authentication will be done if the OTP entered by the user
method. After the encrypted image is created then the it is is correct then the user will send to the dashboard otherwise
transferred to the client side using a secure server and then Error message will be displayed and User has to enter the
user profile password is checked if the profile password is mobile number again.
incorrect then the user will get two more attempts , even
after two more attempts if the user password is incorrect  Transact Module:
then Threat alert system will be activated and the image of The Transect module gives us the option for scanning
the transaction will be captured and alert message and mail the image and get the Dynamic password that was
will be sent to the user registered Email and Contact generated and then encrypted and sent over the secured
number and transection will be closed. If the Password is server. Firstly, the user needs to login then click on transect
correct then then the decoding of the encrypted image will

IJISRT23MAY927 www.ijisrt.com 310


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
icon then scan the QR code that is generated and displayed III. RESULT
on the ATM screen.
To analyse the result of the current work, let's first go
 Decrypter Module: to the study of the previous work. In Chetana et al [3] the
The Decrypter modules works for decryption of the signature image is scanned by the application and then fed
encrypted image , here the image and the information or the to pre-processing, where the intensity of the image is
four digit PIN are separated , in order to perform this increased and then undergoes the generation of actions. The
operation user needs to scan the QR Code that is generated actions are stacked for authentication. Where, as during this
and click on the decrypt option on the Pop – up generated. work, the image is generated immediately after the data
embedding process and a generation of actions is carried
 Scan Card Module: out, represents the comparison. Transactions suggested
The Scan card modules is implemented to check the Fadi Aloul et al. within the server. So, the key needs to be
authenticity of the Card that is inserted into the ATM . This sent back to the server for verification and it is not said to
particular module reads the information that is present in have immediate verification. In the later stages of the
card chip that is already embedded in the card then use that transaction, the user is verified. Therefore, in this job, the
information to cross check the authenticity of the card by key is specified as follows: It is generated on the device on
matching the information. If the card that is inserted is which the transaction is taking place, and only the key is
found illegal then the transaction will be closed sent via SMS to the mobile phone to the specific registered
automatically. number of the user who is performing the transaction, so
that the authentication carried out in the input phase, faster
 Banking Option Module: and more efficiently.
In this module the user gets option to select various
option in order to get information regarding the account. In To overcome this issues several solutions were given
this module user gets options of account details, statement , in the form of biometric solution as well as two factor
Current account balance , change account setting and authentication but they don’t seems to be practical as the
option for transferring money and this is dashboard for tends to increase time for each transection as well as those
performing , it can be accessed by just logging into the methods comes with increase cost of deployment and these
account. methods also needs hardware upgrade. To overcome these
issues, we have proposed a new method of performing
 Encrypter with Dynamic PIN: ATM transactions. So, in this method we have used
In this module , the server is responsible for checking steganographic and visual cryptography technique approach
of established connection if the connection is not on image processing with the help of mobile phone. The
established then the transaction will be closed. If the proposed system uses live ATM transaction with
transaction is established then the system will generate four steganography to generate dynamic pin for each new ATM
digit Pin and once the image is generated an image will be transaction performed. The concept of 4-digit static pin is
picked randomly from pool of image and encryption will be eliminated with the 4-digit dynamic pin. Whenever a
done and that encrypted image will be transferred to the transaction is performed a random 4-digit pin will be
ATM. generated by the server and it will be steganographic with
an image which will be visible to user on his mobile screen.
 PIN Verify Module: The user needs to type their profile password and the
In this module PIN verification is done , the dynamic encrypted pin in the image will be visible and can be used
PIN will be matched with the generated PIN , here if the to perform transection. In case of 3 wrong attempts the
authentication is failed then the transaction will be closed image of the person who is performing the transaction will
and user will allowed to enter PIN three times , if the user be captured and the alert system will send alert messages to
enters three more consecutive wrong PINs then the user’s main and alternate mobile number. the direct use of
transaction will be closed and threat alert system will be encryption is eliminated because the encrypted messages
activated. In this module the PIN verification is described it will trigger the hackers.
works same as OTP and it makes process fast.
That some important information is being transferred
 Transection Close Module: via the respective channel. The crucial prerequisite in these
The Transection close module will allow close the days is to get rid of various forms of attacks.
transaction if authentication issues are there. The system
will automatically close if it detects any suspicious activity So this Method is unique in obtaining a solution for
and in few stages it will also trigger threat alert. Authentication of a customer for Bank as well as for ATM
transactions.

IJISRT23MAY927 www.ijisrt.com 311


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165

Fig 4 Depiction of Login Fig 6 Depiction of Decryption of Key

The Fig. 4 depicts the option for login of the user if The above given fig.6 shows the option for decryption
the user has Account number and password that was of the encrypted image so that the user can enter the four
provided by the bank then user can directly Login other digit dynamic Pin in the ATM machine , so that he/she can
wise user can login with the option Login with OTP. continue with the transaction. If the user enters wrong
password he/she has three more attempts if user is failed in
that then the transaction will be closed and alert threat
system will be activated.

IV. CONCLUSION

The paper method to finish the traditional or the


antique approaches of transaction utilized in ATM ought to
get replaced via way of means of the Steganography
approach wherein the transaction technique turns into extra
secured and dependable. All the customers want to hold
their very own cellular telephones to have their transaction
to finish and affirm their identification. It is primarily based
totally at the traits of scanning the picture withinside the
ATM thru the telecellsmartphone and getting the dynamic
pin from it and it'll deliver get entry to the technique of
transaction and it'll assist it grow to be extra secured.
Steganography lets in the recognition of a personal thru
quantifiable physiological traits that affirm the
identification of a man or woman. AES 256 encryption
presents stable protection functions required for the system.
Steganography mechanism presents little or no clue to
centre guy assaults. With the deliver low price-green
biometric scanners, this method is positive to deliver a
alternative enjoy to the customers, who can sense the
benefit of use and on the identical time happy as no
Fig 5 Depiction of Decryption of Key
compromise has been made to the protection factor of the
system. Due to an enlargement in globalization, the
The given fig. 5 shows the image of scanner where
ordinary man or woman’s existence has been compromised
user can scan the encrypted image and then user will get
via way of means of the increasing grievous occasions of
pop up of decryption of the code.

IJISRT23MAY927 www.ijisrt.com 312


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
assaults of man or woman statistics and withinside the case The process could also be considered for the network
of monetary transaction and banking-associated duties in banking facility to provide two levels of user
coins device machines (ATMs). PIN and Password are authentication. From now on, authentication takes place
maximum not unusual place manner of getting access to with two-step user names and passwords.
ATMs for monetary transaction however they may be cast
and consequently are subjected to assault including REFERENCES
phishing, spoofing etc. In order to triumph over such
assaults better protection is needed. Subsequently the [1]. Rama Moorthy H et al., “Steganographic And
human physiological and behavioural traits, as an example Visual Cryptographic Approach For Authentication
iris, voice, finger print, face palm and so forth are being Of Bank Users Using ATM Cards ”, International
applied to offer higher protection arrangements. In any Journal of Engineering Research & Technology
case, all of them may be correctly deceived and replicated (IJERT)Vol. 2 Issue 5, May - 2013.
at one stage and a advanced association is needed for the [Online].Available:https://www.ijert.org/research/ste
safety requirements which might be price effective and ganographic-and-visual- cryptographic-approach-
dependable too. Hence, the mixed method (device getting forauthentication-of-bank-users-using-atm-cards-
to know and picture processing) of finger vein IJERTV2IS50805.pdf
authentication approach is hired and for finger vein picture [2]. Ramadhan Mstafa et al., “Information Hiding in
switch variable MSB–LSB steganography and light-weight Images Using Steganography Techniques ”, I2013
weight cryptography is proposed on this paper. The vein ASEE Northeast SectionConferenceMarch1416,20
authentication approach is exceedingly complicated, so it 13[Online].Available:https://www.researchgate.net/
may be higher to apply it for a few unique applications. For publication/259893801_Information_Hiding_in_Ima
finger-vein authentication system, the test indicates that ges_Using_Steganography_Techniques
during proposed class manner (one-versus- one and one- [3]. URANG Awajionyi S et al., “Securing Automated
versus-all) the common reputation accuracy is 98.75% and Teller Machine (ATM) Transaction Using Biometric
97.92% and the execution time is 0.168 s and 0.187 s Fingerprint ”,American Journal of Engineering
respectively. One comparative look at is finished amongst Research(AJER)
five algorithms which includes ANFIS, Global Matching Volume9,Issue9,pp3643[Online].Available:http://w
and SVM, MLP, SVM and CNN. Adaptive neuro-fuzzy ww.ajer.org/papers/Vol-9-issue-9/F09093643.pdf
inference system (ANFIS) and convolutional neural [4]. Ketan Ramaneti et al., “Image Steganography Using
network (CNN), the 2 algorithms have higher class GANs”,ICIS2021:ComputerStegnographyusingGA
accuracy than proposed method i.e., with 99% and 99.38 N’spp1918224June2021.[Online].Available:https://li
accuracy respectively. However, the execution time of 4. nk.springer.com/chapter/10.1007%2F978-3-030-
five s is needed for ANFIS which is relatively extra than 79474- 3_12
proposed manner and CNN aren't giving green end result [5]. Frimpong Twum et al., “Improving Security Levels
for low exceptional finger vein images, while the proposed In Automatic Teller Machines (ATM) Using
manner has no such difficulty. Thus, the proposed method Multifactor Authentication ”, International Journal
is pleasant in regards to class accuracy while seemed in a of Science and EngineeringApplicationsVolume 5
different way in connection with ANFIS and CNN and Issue 3, 2016, ISSN-23197560(Online) [Online].
moreover have effective if there ought to be an incidence of Available:https://www.researchgate.net/publication/
time of execution, noise sensitivity and higher for non-best 301536500_Improving_Security_Levels_In_Autom
finger vein cases. Another difficulty that's to be taken into atic_Teller_Machines_ATM_Using_Multifactor_Au
consideration is that the method via way of means of which thenticati on
this biometric picture (finger vein) is frequently transferred [6]. Indrajit Das et al., Design and implementation of
safely. And the variable MSB–LSB set of rules is higher secure ATM system using machine learning and
than easy LSB set of rules as it calls for a smaller wide crypto–stego methodology ”, pringer Nature
variety of pixels for embedding and feature higher Switzerland AG 2019
randomness, protection etc. SNAppliedSciences(2019)1:976[Online].Available:
https://doi.org/10.1007/s42452-019-0988-0
Generated Shares if revealed also to any third party, [7]. Rama Moorthy H et al., “Steganographic And
through hacking of database or stealing of the card, does Visual Cryptographic Approach For Authentication
not reveal any information regarding the customer has only Of Bank Users Using ATM Cards ”, International
a hash value is stored, particular system is considered to Journal of Engineering Research& Technology
authenticate a user only in a bank. The PIN generated with (IJERT)Vol.2Issue5,May2013.[Online].Available:ht
the help of a image and the data hidden, will be sent to the tps://www.ijert.org/research/steganographic-and-
registered Mobile Number of that particular customer as a visual-cryptographic-approach-for-authentication-
message only. As to this method, the PIN generated is from of-bank-users-using-atm-cards-IJERTV2IS50805
ATM machine itself, therefore no need to wait to ATM .pdf
server to validate the PIN entered. Thus, we can achieve
Dynamic Key and validation is done at entry level rather
than later stages of the ATM transaction.

IJISRT23MAY927 www.ijisrt.com 313


Volume 8, Issue 5, May – 2023 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165
[8]. Abdul Alif Zakaria et al., “High-Capacity Image
Steganography with Minimum Modified Bits Based
on Data Mapping and LSB Substitution ”, MPDI ,
Applied Science Appl.Sci.2018,8,2199[Online].
Available:https:https://www.mdpi.com/2076-
3417/8/11/2199
[9]. Oleg Evsutin et al., “Digital Steganography and
Watermarking for Digital Images: A Review of
Current Research Directions ”, IEEE Access
Volume: 8, Septempber-2020[Online].Available
:https://ieeexplore.ieee.org/document/9187785
[10]. Sabyasachi Pramanik et al., “Signature Image
Hiding in Color Image using Steganography and
Cryptography based on Digital Signature Concepts”,
2020 2nd International Conference on Innovative
Mechanisms for Industry Applications (ICIMIA)
Volume 4. March 2020 [Online].Available:https
://ieeexplore.ieee.org/document/9074957

IJISRT23MAY927 www.ijisrt.com 314

You might also like