Secure Live ATM Transaction Using Steganography and Image Processing
Secure Live ATM Transaction Using Steganography and Image Processing
ISSN No:-2456-2165
Abstract:- The Current banking system is very popular telecommunications tool that enables customers to make
with the feature of offering customers a high-quality financial transactions, especially withdrawals, without the
service 24 hours a day, but the major issue in banking is need for a cashier, clerk, or bank accountant. Along with
the authenticity of the customer and most systems today the easy and feasible use of ATMs, there has also been an
rely on static passwords to verify a user’s identity. The increase in the number of ATM thefts and frauds, which are
user always tries to use, easy and guessable passwords, growing at an appalling rate. ATM card verification
try to use the same password for one or more accounts, methods have changed little since they were first
or some will write down their password, etc. So, there introduced in the 1960s. ATM safety standards are largely
are many ways to steal these passwords by a hacker, found in the safety traps of magnetic resources. The data on
they will be using many techniques, such as peeping i.e., the magnetic stripe are usually coded using two or three
shoulder surfing, snooping, sniffing, etc. Also, the PIN tracks, because, it is not difficult or expensive to have the
validation is done at later stages of ATM transactions. equipment to encode magnetic stripes. The standard
However, such passwords, come with major security covering this area is International Organization for
concerns. The crucial prerequisite these days is to get Standardization (ISO) 7811 and the technique for writing of
rid of the various forms of attacks. Due to this reason, the tracks is known as Friend-to-friend (F/2F). Thankfully,
different biometric systems gain popularity worldwide magnetic stripe feebleness has been partly addressed by the
for their behavior and physiological features. However, introduction of Europay International, MasterCard and Visa
the current biometric systems, for example, iris, palm, (EMV) smartcards.
face fingerprints or voice are extremely complex and
increase the time for each transaction. To overcome Currently the ATM communicates with central host
these issues a new concept has been proposed in this processor by Internet Service Supplier that includes a
paper by Using steganographic and visual cryptography gateway where all the ATM networks offered to the user.
technique approach on image processing with the help The ATM Machine is connected to the central host
of mobile phone. The proposed system uses live ATM processor using a modem. Once the client desire to perform
transaction with steganography to generate dynamic transection offers a PIN and ATM card. ATM machine
pin for each new ATM transaction performed. The forwards to the central host processor whereas ATM
concept of 4-digit static pin is eliminated with the 4-digit request to the customer bank. If client request a money
dynamic pin. Whenever a transaction is performed a central host processor initiates electronic fund transfer from
random 4-digit pin will be generated by the server and client bank to ATM central host processor account. Once
it will be steganographic with an image which will be the transfer is completed to the central host processor it
visible to user on his mobile screen. The user needs to sends permission to the ATM to withdraw the money.
type their profile password and the encrypted pin in the
image will be visible and can be used to perform Despite the many warnings given by the card user,
transection. In case of 3 wrong attempts the image of many people continue to choose easily guessable passwords
the person who is performing the transaction will be and PINs such as phone number, date of birth, social
captured and the alert system will send alert messages security number etc. However, due to the limitations of this
to user’s main and alternate mobile number. design, an intruder with a user card can access the user's
PIN one in every 10,000 users will have same number. If
I. INTRODUCTION the users have more than one cards, all the PINs needs to be
memorized by the user. This can lead user to write or save
The advancement of the payment system in the the passwords physically or use same passwords that can be
modern world has gone passed cash to cheques, and then to found in the dictionaries. A notable example of this was
payment cards such as credit cards and debit cards. ATM shown by Klein, who could crack 25% of 14,000 passwords
stands for Automated Teller Machine. It is a using a dictionary attack with only 86,000 words.
Image Steganography:
As the name suggests, Image Steganography refers to
the process of hiding data within an image file. The image
selected for this purpose is called a cover photo and the
image obtained after steganography is called a stego image.
The standard image algorithm for steganography is the LSB
embedding algorithm.
Video Steganography:
Steganography can also be used in video files. If we
hide information in a video file, it can be called Video
Steganography. The video file should not be seen by the
attacker. The video steganography is divided into three
categories: intra embedding, pre embedding, and post
embedding. Intra embedding methods are categorized into
video compression categories such as intra-prediction
Fig 1 Traditional ATM cash withdrawal Process Flowchart
prediction, motion vectors, pixel translation, converting
coefficients. Pre-embedded methods are used in raw video,
The Proposed system uses live ATM transaction with
which can be categorized and convert domains. Post-
steganography to generate dynamic pin for each new ATM
embedding methods are more focused on bitstreams, which
transaction performed. The concept of 4-digit static pin is
means that the process of embedding, and extraction of
eliminated with the 4-digit dynamic pin. Whenever a
steganography video is all used in small, compressed
transaction is performed a random 4-digit pin will be
streams.
generated by the server and it will be steganography with
an image which will be visible to user on his mobile screen.
The user needs to type their profile password and the Text files Steganography:
encrypted pin in the image will be visible and can be used Steganography can also be used in text files as well.
to perform transection. In case of 3 wrong attempts the When we hide information in a text file, it is called Text
image of the person who is performing the transaction will Steganography.
be captured and the alert system will send alert messages to
user’s main and alternate mobile number. LSB Methods
In the gray scale picture, each pixel is represented by
The reason for not going with the encryption method 8 bits. The last pixel bit is called the Least Significant bit as
is because the encryption creates a coded message that can its value will only affect the pixel value by “1”. Thus, this
be easily identified by the hackers that some important structure is used to hide data in the image. If anyone
information is being transferred as we know this whole thought of the last two pieces as LSB pieces as they would
process will be completely relied on the internet hence, we only affect the pixel value by “3”. This helps to store
tried to eliminate these threats by shifting to more tradition additional data. Steganography of Bit Least Significant Bit
algorithm that is steganography. (LSB) is one such method where the insignificant bit of
imagery is replaced by data bit. As this method is
STEGANOGRAPHY Types vulnerable to steganalysis to make it more secure we
STEGANOGRAPHY is derived from the Greek encrypt raw data before embedding it in the image.
Words: STEGANOS - “Covered” and GRAPHIE – Although the encryption process increases the complexity
“Writing”. The main goal of the steganography is to make of the time, but at the same time it also provides higher
communication between two or more ends in completely security as well. This method is very simple. In this way
undetectable manner without drawing suspicion to the some important bits or all the bits inside the image are
transmission of the hidden data. This is not done to keep the replaced with fragments of private message. The LSB
In the above Fig. 3 Firstly the server will check the For implementation we have prepared ten modules that
connection, if the connection is not established then the are:
transaction will be closed automatically and if the
connection is successful then a four-digit PIN will be Login with OTP:
generated randomly, if the system is able to generate four The Login with OTP module enables us to Login
digit PIN then from a pool of image a random photo will using registered mobile number, user just has to enter the
picked otherwise system will try to generate a four digit registered mobile number and request for OTP after
PIN again. If the Random photo is picked then the entering the OTP the User has to slide the button and
steganography is performed , it is performed using MSB authentication will be done if the OTP entered by the user
method. After the encrypted image is created then the it is is correct then the user will send to the dashboard otherwise
transferred to the client side using a secure server and then Error message will be displayed and User has to enter the
user profile password is checked if the profile password is mobile number again.
incorrect then the user will get two more attempts , even
after two more attempts if the user password is incorrect Transact Module:
then Threat alert system will be activated and the image of The Transect module gives us the option for scanning
the transaction will be captured and alert message and mail the image and get the Dynamic password that was
will be sent to the user registered Email and Contact generated and then encrypted and sent over the secured
number and transection will be closed. If the Password is server. Firstly, the user needs to login then click on transect
correct then then the decoding of the encrypted image will
The Fig. 4 depicts the option for login of the user if The above given fig.6 shows the option for decryption
the user has Account number and password that was of the encrypted image so that the user can enter the four
provided by the bank then user can directly Login other digit dynamic Pin in the ATM machine , so that he/she can
wise user can login with the option Login with OTP. continue with the transaction. If the user enters wrong
password he/she has three more attempts if user is failed in
that then the transaction will be closed and alert threat
system will be activated.
IV. CONCLUSION