Secure Payment System using Steganography and Visual Cryptography  
  Authors : Swati Akolkar; Yogesh Kokulwar; Ashish Neharkar; Dinkar Pawar

 

In recent time there is rapid growth in ECommerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords, credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.

 

Published In : IJCAT Journal Volume 3, Issue 1

Date of Publication : January 2016

Pages : 58 - 61

Figures :01

Tables : --

Publication Link :Secure Payment System using Steganography and Visual Cryptography

 

 

 

Swati Akolkar : Currently pursuing Bachelor of Engineering (Comp) from Parvatibai Genba Moze College of Engineering. My role is to prepare the Documentation, designing and Testing, and made a project in java for database.

Yogeshwar Kokulwar : Currently pursuing Bachelor of Engineering (Comp) from Parvatibai Genba Moze College of Engineering. My part comes in the Core part of development of coding and Database. I have also made project in.NET for database.

Ashish Neharkar : Currently pursuing Bachelor of Engineering (Comp) from Parvatibai Genba Moze College of Engineering. My role is to make Java coding and testing. I have also made project in .NET for Database.

Dinkar Pawar : Currently pursuing Bachelor of Engineering (Comp) from Parvatibai Genba Moze College of Engineering. My role is to deal with the Designing and creation of Database. I have also made a Project in java using Database.

 

 

 

 

 

 

 

Steganography

Visual Cryptography

Online Shopping

Phishing

In this paper, steganography and visual cryptography are combined to provide secure transaction in online shopping. It secures customer's confidential information at merchant side and hence prevents misuse of data. This method is mainly concerned with preventing identity theft and providing customer data security. It also prevents phishing. The system authenticates client as well as merchant server.

 

 

 

 

 

 

 

 

 

[1] Souvik Roy and P. Venkateswaran, "Online Payment System using Steganography and Visual Cryptography," Proceeding of IEEE Students’ Conference on Electrical, Electronics and Computer Science , Jadavpur University, Kolkata-700032, India, 2014. [2] Thiyagarajan, P. Venkatesan, V.P. Aghila, G. "Anti-Phishing Technique using Automated Challenge Response Method", in Proceedings of IEEE- International Conference on Communications and Computational Intelligence, 2010. [3] N. Chou, R. Ledesma, Y. Teraguchi, and D. Boneh, “Clientside defense against web-based identity theft,” in Proc. 11th Annu. Netw. Distribut. Syst. Secure. Symp., San Diego, CA, Feb. 2005. [4] Anthony Y. Fu, Liu Wenyin, "Detecting Phishing Web Pages with Visual Similarity Assessment Based on Earth Mover’s Distance (EMD)",IEEE Transactions on Dependable and Secure Computing, v 3,n 4, October/December 2006. [5] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994. [6] Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shopping online," Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), vol. 9, pp. 4693-4696, 2011. [7] Javelin Strategy & Research,“2013 Identify Fraud Report,”https://www.javelinstrategy.com/brochu re/276. [8] Anti-Phishing Working Group (APWG), “Phishing Activity Trends Report,2013,”http://docs.apwg.org/reports/apwg _trends_report_q2_2013 .pdf [9] Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman, “Hiding Information in Document Images,” Proceedings of the 1995 Conference on Information Sciences and Systems, Johns Hopkins University, pp. 482-489, 1995. [10] J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Scheme in Binary Image,” Proceeding of Fifth International Symposium on Multimedia Software Engineering, pp. 88- 93, 2003. [11] M. Naor and A. Shamir, “Visual cryptography,” Advances in Cryptograhy: EUROCRYPT’94, LNCS, vol. 950, pp. 1–12, 1995. [12] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011. [13] Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,” Proceedings of 16th International Conference on Advanced Computing and Communications, pp. 65-72, Chennai, India, 2008. [14] S.Premkumar, A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking Application,” Proceeding of 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1013 – 1016, Kumaracoil, India, 2012. [15] K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm,” Proceedings of 2012 International Conference on Computing Sciences (ICCS), pp. 276 – 280, 2012. [16] S. Suryadevara, R. Naaz, Shweta, S. Kapoor, “Visual cryptography improvises the security of tongue as a biometric in banking system,” Proceedings of 2011 2nd International Conference on Computer and Communication Technology (ICCCT), pp. 412 – 415, 2011. [17] Bharati Krishna Tirthaji, “Vedic Mathematics and its Spiritual Dimension,” Motilal Bansari