Open Access   Article Go Back

Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography

Anshu Arele1 , Vikas Sejwar2

  1. Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India.
  2. Dept. of CSE and IT, Madhav Institute of Technology and Science, Gwalior, India.

Correspondence should be addressed to: areleanshu@gmail.com.

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-7 , Page no. 115-119, Jul-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i7.115119

Online published on Jul 30, 2017

Copyright © Anshu Arele, Vikas Sejwar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Anshu Arele, Vikas Sejwar, “Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.7, pp.115-119, 2017.

MLA Style Citation: Anshu Arele, Vikas Sejwar "Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography." International Journal of Computer Sciences and Engineering 5.7 (2017): 115-119.

APA Style Citation: Anshu Arele, Vikas Sejwar, (2017). Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography. International Journal of Computer Sciences and Engineering, 5(7), 115-119.

BibTex Style Citation:
@article{Arele_2017,
author = {Anshu Arele, Vikas Sejwar},
title = {Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2017},
volume = {5},
Issue = {7},
month = {7},
year = {2017},
issn = {2347-2693},
pages = {115-119},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1375},
doi = {https://doi.org/10.26438/ijcse/v5i7.115119}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i7.115119}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1375
TI - Enhanced Online Payment Security using Steganography, Quantum and Visual Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Anshu Arele, Vikas Sejwar
PY - 2017
DA - 2017/07/30
PB - IJCSE, Indore, INDIA
SP - 115-119
IS - 7
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
1114 484 downloads 479 downloads
  
  
           

Abstract

Visual Cryptography is Secret Sharing Scheme where it is an encryption methodology to hide the data under image in a fashion that it can only be decrypted by the combination of two shares. Quantum mechanics is the bsis of Quantum Cryptography Techniques. Use of Quantum key is the basis as Quantum mechanics concept has been utilized to have encrypted key in place between users and not used for data transmission. Steganography involves techniques of hiding information under other information so that extraction of data become difficult .In the existing work, it used these three techniques to improve the transaction security. But this is not enough to secure so to overcome this problem we apply image sequence and send OTP in the email id which makes them more secure to achieve more security.

Key-Words / Index Term

Payment System, Buisness, Internet, Keys, Visual Cryptography, Quantum Cryptography, Stagenography

References

[1] Wayner, P. “Digital cash: Commerce on the net”, 2nd ed. London: AP Professional, 1997.
[2] Dennis Abrazhevich “A Survey of User Attitudes towards Electronic Payment Systems”2012.
[3] P. Sharma, D. Mishra, V.K. Sarthi, P. Bhatpahri, R. Shrivastava, "Visual Encryption Using Bit Shift Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.57-61, 2017.
[4] Vinod. L. B and Nithyanada. C. R, "Visual Cryptographic Authentication for Online Payment System", International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.
[5] Ajay L “Survey of Most Prominent Quantum Key Distribution Protocols” International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 05, 2016.
[6] SO. OKOLIE, BT. ADETOBA, "Comparative Analysis of Performance Characteristics of well-known Symmetric Key Encryption Algorithms", International Journal of Scientific Research in Network Security and Communication, Vol.4, Issue.3, pp.1-6, 2016.
[7] Gaurav Jain and Vikas sejwar,“Improving the Security by using Various Cryptographic Techniques in cloud computing``, ICICCS-International Conference On Intelligent Computing and Control Systems ICICCS 2017,
[8] Rajesh Shah and Yashwant Singh Chouhan, "Encoding of Hindi Text Using Steganography Technique", International Journal of Scientific Research in Computer Science and Engineering, Vol.2, Issue.1, pp.22-28, 2014.
[9] Noor Ul Ain “A Novel approach for secure multi-party secret sharing scheme via quantum cryptography” 2017 International Conference on Communication, Computing and Digital Systems (C-CODE), 2017.
[10] Yuriy Gorbenko, Igor Svatovskiy, Oleksiy Shevtsov “Post-Quantum Message Authentication Cryptography Based on Error-Correcting Codes” Third International Scientific-Practical Conference Problems of Infocommunications. Science and Technology PIC S&T-16, Kharkiv,pp. 51-54, 2016.
[11] Kaur, R. Singh, S. Gagneja , "Network Security and Methods of Encoding and Decoding", International Journal of Computer Sciences and Engineering, Vol.2, Issue.2, pp.11-15, 2014.
[12] Trupti Patel, Rohit Srivastava “Hierarchical Visual Cryptography for Grayscale Image” 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16/$31.00 ©2016 IEEE.
[13] Vandana Purushothaman, Sreela Sreedhar “An Improved Secret Sharing Using Xor-Based Visual Cryptography” 2016 Online International Conference on Green Engineering and Technologies (IC-GET), 978-1-5090-4556-3/16/$31.00 ©2016 IEEE.
[14] Mamta Jain, Rishabh Charan Choudhary Anil Kumar “Secure Medical Image Steganography with RSA Cryptography using Decision Tree” 2016 .
[15] Sudipta Sahana and Abhipsa Kundu, "A Novel Approach on Adaptive Block Steganography Based Crypting Technique for Secure Message Passing", International Journal of Computer Sciences and Engineering, Vol.2, Issue.12, pp.42-46, 2014.
[16] Nour Elhouda Tabet, Media Anugerah Ayu “Analysing the Security of NFC Based Payment Systems” 2016 International Conference on Informatics and Computing (ICIC), 2016.
[17] Deepali Kayande, Elsa Rebello, Shweta Sharma and Monica Tandel “Overview of a Payment Solution for NFC- Enabled Mobile Phones” InICT in Business Industry and Government (ICTBIG), International Conference on Nov 18 (pp. 1-4), 2016.