Steganography Security on Bank System
Shaik Arshiya1, B. Aruna2, P. Guru Prasad3, Ravi Kumar Tenali4
1Shaik Arshiya, Shaik Arshiya, Student Qualification B. Tech (UG) Branch ECM Streamn Cyber Security College, KLEF. A. P. India.
2B. Aruna, Mrs. B. Aruna, Assistant Professor With Departments of M.C.A and CSE from 1998 to 2018 in Engineering college of Kanchipuram and KL University, A. P. India.
3P. Guru Prasad, Student Qualification Btech (UG) Branch ECM Stream Cyber Security College, KLEF. A. P. India.
4Ravi Kumar Tenali, Assistant Professor in Department of ECM, Koneru Lakshmaiah Education Foundation (KLEF). A. P. India

Manuscript received on 15 April 2019 | Revised Manuscript received on 21 May 2019 | Manuscript published on 30 May 2019 | PP: 247-250 | Volume-8 Issue-1, May 2019 | Retrieval Number: A3069058119/19©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this paper we are developing an application based on security as the rate of internet users are increasing and most of the users either use internet for money transaction and social media the rate of cybercrime is increasing rapidly and there is a need to secure bank system to prevent customer from cybercrime. we have developed a three-tier architecture in which the concept of image steganography is inspired from google which checks whether it’s a human or robot and all the data is applied with encryption and decryption. The customer need to provide the details during the registration process and the images will be also selected during the time of registration and during the transaction process to be done based on the images selected the admin provides steganography on the given images and the user need to select the original image and if the image that is applied is correct then the puzzle is set up with mathematical expression and user further continues with the following transaction process by generating his one time password (otp)and transaction is successful.
Index Terms: Cybersecurity, Image Steganography, Bot Detection, Encryption, Decryption

Scope of the Article: Image Security