Visual Cryptographic Authentication for Online Payment System
Keywords:
OnlineShopping(E-Commerce), IdentityTheft, LSBStegnography and VisualCryptographyAbstract
In these days many people are using e-commerce market for online shopping like example: Flip kart, Amazon and etc. With huge demand in-shopping or increasing popularity of online shopping security issues of debit, credit and personnel information has been raised. This project presents a new approach for providing restricted or limited information that’s only necessary for fund transfer during online transaction with this we are reducing the entering detailed information of customer like card number, CVV and etc. And this project or approach uses combined application of LSB based steganography and visual cryptography. In this project first we encrypt the user or customer credentials in an image by using LSB Steganography process and then we use visual cryptography to divide an image into two shares. Reverse visual cryptography is applied to get an original image and data is retrieved from image and sent to the bank for verification of legitimate user if user is valid the fund will be transferred to the merchant.
A quick development in E-Commerce business sector is seen in late time all through the world. With steadily expanding prominence of internet shopping, Debit or Credit card misrepresentation and individual data security are significant attentiveness toward clients, dealers and banks particularly on account of CNP (Card Not Present). This paper displays another methodology for giving restricted data just that is vital for store exchange amid web shopping subsequently defending client information and expanding client certainty and forestalling wholesale fraud. The system uses joined utilization of steganography and visual cryptography for this reason.
References
Fridrich, J., Goljan, M. and Du,R, Reliable Detection of LSBSteganography in Color and Grayscale Images, Proceedings of ACM Workshop on Multimedia and Security,Ottawa, October 5, 2001, pp.27-30.
Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and Communication Technologies, pp. 1181-1186, Mumbai, India, 2011.
K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm,” Proceedings of 2012 International Conference on Computing Sciences (ICCS), pp. 276 – 280, 2012.
Sathiamoorthy Manoharan, an empirical analysis of rs steganalysis,proceedings of the third international conference on internet monitoring and protection, ieee computer society washington, 2008
Shailendra M. Pardeshi, Sandip R. Sonawane, Vipul D. Punjabi, Puja Saraf,” A Survey on compound use of Cryptography and Steganoghaphy for Secure Data Hiding,” International Journal of Emerging Technology and Advanced Engineering (ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 3, Issue 10, October 2013)
Souvik Roy, P.Venkateswaran,2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science 978-1-4799-2526-1/14/$31.00 ©2014 IEEE Online Payment System using Steganography and Visual Cryptography.
Usha B A, Srinath N K, Narayan K, Sangeetha K N,” A Secure Data Embedding Technique In Image Teganography For Medical Images,” International Journal Of Advanced Research In Computer And Communication Engineering Vol. 3, Issue 8, August 2014.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
