Open Access   Article Go Back

Visual Cryptographic Authentication for Online Payment System

Vinod. L. B1 , Nithyanada. C. R2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-8 , Page no. 109-114, Aug-2015

Online published on Aug 31, 2015

Copyright © Vinod. L. B , Nithyanada. C. R . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Vinod. L. B , Nithyanada. C. R, “Visual Cryptographic Authentication for Online Payment System,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.109-114, 2015.

MLA Style Citation: Vinod. L. B , Nithyanada. C. R "Visual Cryptographic Authentication for Online Payment System." International Journal of Computer Sciences and Engineering 3.8 (2015): 109-114.

APA Style Citation: Vinod. L. B , Nithyanada. C. R, (2015). Visual Cryptographic Authentication for Online Payment System. International Journal of Computer Sciences and Engineering, 3(8), 109-114.

BibTex Style Citation:
@article{B_2015,
author = {Vinod. L. B , Nithyanada. C. R},
title = {Visual Cryptographic Authentication for Online Payment System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {8 2015},
volume = {3},
Issue = {8},
month = {8},
year = {2015},
issn = {2347-2693},
pages = {109-114},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=619},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=619
TI - Visual Cryptographic Authentication for Online Payment System
T2 - International Journal of Computer Sciences and Engineering
AU - Vinod. L. B , Nithyanada. C. R
PY - 2015
DA - 2015/08/31
PB - IJCSE, Indore, INDIA
SP - 109-114
IS - 8
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2441 2351 downloads 2427 downloads
  
  
           

Abstract

In these days many people are using e-commerce market for online shopping like example: Flip kart, Amazon and etc. With huge demand in-shopping or increasing popularity of online shopping security issues of debit, credit and personnel information has been raised. This project presents a new approach for providing restricted or limited information that’s only necessary for fund transfer during online transaction with this we are reducing the entering detailed information of customer like card number, CVV and etc. And this project or approach uses combined application of LSB based steganography and visual cryptography. In this project first we encrypt the user or customer credentials in an image by using LSB Steganography process and then we use visual cryptography to divide an image into two shares. Reverse visual cryptography is applied to get an original image and data is retrieved from image and sent to the bank for verification of legitimate user if user is valid the fund will be transferred to the merchant. A quick development in E-Commerce business sector is seen in late time all through the world. With steadily expanding prominence of internet shopping, Debit or Credit card misrepresentation and individual data security are significant attentiveness toward clients, dealers and banks particularly on account of CNP (Card Not Present). This paper displays another methodology for giving restricted data just that is vital for store exchange amid web shopping subsequently defending client information and expanding client certainty and forestalling wholesale fraud. The system uses joined utilization of steganography and visual cryptography for this reason.

Key-Words / Index Term

Online Shopping(E-Commerce),IdentityTheft,LSB Stegnography and VisualCryptography

References

[1] Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSBSteganography in Color and Grayscale Images, Proceedings of ACM Workshop on Multimedia and Security,Ottawa, October 5, 2001, pp.27-30.
[2] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011.
[3] K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm,” Proceedings of 2012 International Conference on Computing Sciences (ICCS), pp. 276 – 280, 2012.
[4] Sathiamoorthy Manoharan, an empirical analysis of rs steganalysis,proceedings of the third international conference on internet monitoring and protection, ieee computer society washington, 2008
[5] Shailendra M. Pardeshi, Sandip R. Sonawane, Vipul D. Punjabi, Puja Saraf,” A Survey on compound use of Cryptography and Steganoghaphy for Secure Data Hiding,” International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10, October 2013)
[6] Souvik Roy, P.Venkateswaran,2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science 978-1-4799-2526-1/14/$31.00 ©2014 IEEE Online Payment System using Steganography and Visual Cryptography.
[7] Usha B A, Srinath N K, Narayan K, Sangeetha K N,” A Secure Data Embedding Technique In Image Teganography For Medical Images,” International Journal Of Advanced Research In Computer And Communication Engineering Vol. 3, Issue 8, August2014.