Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Online Payment System Using Steganography and Visual Cryptography

Author : Sumana Sarkar 1 Srinivas Goud 2 Prasad B 3

Date of Publication :7th March 2016

Abstract: This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safe guarding customer data and increasing customer confidence and preventing identity theft. In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. The approach uses combined application of BPCS Steganography and visual cryptography for this purpose. Payment portal, a channel between consumers and payment processors, use numerous security tools to secure a consumer’s payment information, ordinarily card data, during an online transaction. Moreover, not all merchants provide a secure payment environment to their consumers and, in spite of having a standard payment plan, adhere to it. Consequently, this exposes a consumer’s payment information to risks of being compromised or misused by merchants or stolen by hackers and spammers.

Reference :

    1. Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shopping online," Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), vol. 9,pp. 4693-4696, 2011
    2. Javelin Strategy & Research, ―2013 Identify Fraud Report,‖ https://www.javelinstrategy.com/brochure/276.
    3. Anti-Phishing Working Group (APWG), ―Phishing Activity Trends Report,2013,‖http://docs.apwg.org/reports/apwg_tr ends_report_q2_2013.pdf .
    4. Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman, ―Hiding Information in Document Images,‖ Proceedings of the 1995 Conference on Information Sciences and Systems, Johns Hopkins University, pp. 482-489, 1995.
    5. J. Chen, T. S. Chen, M. W. Cheng, ―A New Data Hiding Scheme in Binary Image,‖ Proceeding of Fifth International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.
    6. Hu ShengDun, U. KinTak, ―A Novel Video Steganography Based on Non-uniform Rectangular Partition,‖ Proceding of 14th International Conference on Computational Science and Engineering, pp. 57-61, Dalian, Liaoning, 2011.
    7. Daniel Gruhl, Anthony Lu, Walter Bender, ―Echo Hiding,‖ Proceedings of the First International Workshop on Information Hidding, pp. 293- 315, Cambridge, UK, 1996.
    8. Walter Bender, Daniel Gruhl, Norishige Morimoto, A. Lu, ―Techniques for Data Hiding,‖ IBM Systems Journal, Vol. 35, Nos. 3 & 4, pp. 313- 336, 1996.
    9. K. Bennet, ―Linguistic Steganography: Surevey, Analysis, and Robustness Concerns for Hiding information in Text,‖ Purdue University, Cerias Tech Report 2004—2013.
    10. J.C. Judge, ―Steganography: Past, Present, Future,‖ SANS Institute, November 30, 2001.
    11. M. Naor and A. Shamir, ―Visual cryptography,‖ Advances in Cryptograhy. EUROCRYPT’94, LNCS, vol. 950, pp. 1–12, 1995.
    12. Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, ―Novel Authentication System Using Visual Cryptography,‖ Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011.
    13. Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M Patnaik, ―Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,‖ Proceedings of 16th International Conference on Advanced Computing and Communications, pp. 65-72, Chennai, India, 2008

Recent Article