DOI 10.4010/2016.1354 ISSN 2321 3361 © 2016 IJESC

Research Article Volume 6 Issue No. 5

Secured Transaction System Using and Visual Doshi Ruchali1, Kale Prajakta2, Pasalkar Pranoti3 UG Scholar1, 2, 3 Computer Department Savitribai Phule Pune University, India K.J College of Engineering and Management Research, Pune, India3

Abstract: Online payment is nothing but money which is exchanged electronically. Online payment systems are e-commerce, businesses which allow fund transfer with the help of internet. In today’s world credit cards are used commonly for payment on e-commerce. In online transaction at merchants side merchant have to pay certain amount per transaction and many times it happens that users are asked to provide personal details along with additional bank details. It is the merchant’s responsibility to protect customer’s information from being misused. There by, we are proposing such a system which will build trust relationship between merchant and customer. For that a cryptographic technique based on visual is used for image . Along with this cryptographic technique we are combining advantages of steganography to avoid cheating in visual cryptography. Using these techniques the proposed system will provide security to the customer’s data using less information.

Keywords: cheating prevention scheme, visual cryptography, secret sharing, information security, steganography, online shopping.

I. INTRODUCTION: II. LITRETURE SURVEY:- In online transaction security is very important factor. The internet represents an insecure channel for i. Minimizing Pixel Expansion in Visual exchanging information leading to a high risk of intrusion of Cryptographic Scheme for General Access fraud such as fishing. Different methods have been used to Structures this paper presenting the modeling of protect transfer of data including encryption. minimizing the pixel expansion for a (k, n)-VCS into an integer linear program (ILP) was proposed, The proposed system is providing the security for to ensure that the constraints for GVCS can be online transfer of funds where it is using techniques like satisfied. The pixel expansion of a GVCS can thus visual cryptography and steganography. Cryptography is a be minimized by solving the corresponding ILP[1] technique of hiding information into media formats such as images, videos etc. Where visual cryptography is a special ii. New Visual Steganography Scheme for Secure encryption technique to hide information in images in such a Banking Application The major issue in core way that image can be decrypted by the humans if the banking is the authenticity of the customer. Due to correct single strategy is used by both end users. unavoidable hacking of the databases on the Steganography is also an encryption technique which is used internet, it is always quite difficult to trust the to hide information in text format. information on the internet. To solve this problem of authentication, they proposed an algorithm based The use of images is made for providing privacy to the on image processing, steganography and visual customer’s information over the untrusted network. The cryptography[2] customer’s information is first encrypted by using ceasar- iii. Design and Implementation of a Novel cipher technique and then it is again encrypted in the image Authentication Algorithm for Fool-Proof Lock by applying visual cryptography. The image is divided into System Based on Visual Secret Sharing Scheme two shares in such a way that one share is stored at database Content-The aims at creating an authentication of bank and other is kept at user’s side. The transaction is algorithm using visual cryptography that creates a successful when both shares of image are available and fool-proof lock-key mechanism wherein a lock can verified. Once the original image is revealed to the user it be opened by its paired key only and the key cannot can be used as the password. be duplicated. In proposed mechanism they uses a

International Journal of Engineering Science and Computing, May 2016 5542 http://ijesc.org/ lock and a key, both is one part of given secret science of secret data communication using carrier image and every lock-key pair has one associated medium, such as images, videos, text, and unique image[3] networks. Image steganography is majorly divided into spatial and frequency domains. Pixel value iv. Comment on Cheating Prevention in Visual differencing (PVD) considered as good Cryptography The goal of is to find steganographic algorithm due to its high payload potential weaknesses in a cryptographic scheme. In and good visual perception in spatial domain. The this paper, they have crypt analyzed a cheating- purpose of this paper is two folded. First is the prevention scheme in VC and have shown that it is critical analysis of current PVD methods using not cheating immune[4] evaluating parameters (payload, visual quality and resistance of attacks) and secondly it highlights the v. Secured Bank Authentication using Image current promising directions on PVD Processing and Visual Cryptography Todays steganographic research[8] banking system has brought core banking for the users convenience, which is a set of services, where ix. Deployment of secure sharing: Authenticity and authentication plays main role. So in order to authorization using cryptography in cloud overcome this authentication problem we are environment the proposed methodology provides proposing an efficient algorithm for secured bank more control of owner on the data stored on cloud authentication. The algorithm mainly deals with by restricting the access to specific user for specific Image Processing and Visual Cryptography[5] file with limited privileges and for limited time period on the basis of secret key using symmetric as vi. Online Payment System using Steganography and well as asymmetric mechanism. The integrity and Visual cryptography With ever increasing confidentiality of data is ensured doubly by not popularity of online shopping, Debit or Credit card only Encrypting the secret key but also to the access fraud and personal information security are major permission and limited file information[9] concerns for customers, merchants and banks specifically in The case of CNP (Card Not III. EXISTING SYSTEM: Present).They presents a new approach for providing limited information only that is necessary In existing system customer selects he’s items and after for fund transfer during online shopping thereby selection customer have to submit he’s personal details and safeguarding customer data and increasing debit or credit card details to the merchant’s server. customer confidence and preventing identity Theft. The method uses combined application of steganography and Visual cryptography for this purpose[6]

vii. Privacy preserving data mining using visual steganography and encryption Steganography is the process of hiding a secret message within an ordinary message extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly

suited for image files. The scope of this paper is to In this system it makes use of payment gateway, and using combine steganography and cryptography this gateway it verifies customer’s details. After verification properties in such a way to make it harder to of personal information account details are verified by bank retrieve the image of the secret message. In this then funds are transferred to the merchant’s account. The work, the image is sliced, the sliced images are existing system supports with only one type of image format stored and upon match with a search string query only. For example, if it is .jpg, then it supports only that the original image is retrieved by merging the same kind of image format only. The existing system does individual randomly ordered slices in a regular not provide a friendly environment to encrypt or decrypt the manner. The image slicing ensures privacy data (images).The existing visual cryptography schemes that preserving and thread based mining reduces the are used for data hiding have a security hole in the encrypted time complexity of the search algorithm[7] Share file. Here an image based authentication using Visual

Cryptography is implemented. viii. Pixel value differencing steganography techniques.

Analysis and open challenge Steganography is the

International Journal of Engineering Science and Computing, May 2016 5543 http://ijesc.org/ Disadvantages: combines its own share with the customer’s share and  Does not provide a friendly environment to encrypt obtains the original image. From CA, merchant account details, cover text are forwarded to the bank. At the bank or decrypt the data (images). customer authentication password is recover from the cover  Supports with only one type of image format only. text. Customer information is sent to the merchant by CA For example, if it is .jpg, then it supports only that [6]. after receiving customer’s password, bank matches it with its own database and after verification of the customer’s same kind of image format only. information, the transaction is conducted from customer  The most critical measurements to evaluate the account to merchants account successfully. effectiveness of a VCS. The problem is that CA does not know to which bank to forward the cover text obtained from combining two shares.

IV. PROPOSED SYSTEM It can be solved by appending 9 digit transit number of bank with customer authentication information. For example, If Following figure shows the system architecture of proposed “text” is customer unique authentication password and system: account no of customer is 12345678910111, snapshot of cover text and account no is shown in Fig. 3 and resultant shares by the application of visual cryptography on snapshot are Fig. 4and Fig. 5. Fig. 4 shows share 1 kept by customer and Fig. 5shows share 2 kept by CA. Fig. 6 shows the result of combing share 1 and share 2. Proposed System, Visual Cryptography (VC), technique based on visual secret sharing used for image encryption. Secure Socket Layer (SSL) encryption prevents the interception of consumer information in transit between the consumer and the online merchant. In this paper, a new method is proposed, that uses text based steganography and visual cryptography, which minimizes information sharing between consumer and online merchant.VCS is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system. For phishing detection and prevention, we are proposing a new methodology to detect the phishing website. Our methodology is based on the Anti- Phishing Image Captcha validation scheme using visual cryptography. It prevents password and other confidential information from the phishing websites. Cryptographic Fig. 2. Block diagram for proposed system technique, Threshold VCS scheme,(n, n) -Threshold VCS

scheme, (k, n) Threshold VCS scheme are used in this In this proposed system, we are introducing a new proposed system. technique which will be providing better security for online transaction. During online shopping, after selection of Advantages of using this system is as follows desired item, customer fills its personal details to the 1. Its methodology is based on the Anti-Phishing Image merchant’s database. After that, the details of customer are Captcha validation scheme using visual cryptography encrypted in image format using visual cryptography and steganography. One share of that image is kept at customer 2. It prevents password and other confidential information and another share is kept at CA [1].Merchant directs the from the phishing websites. customer to the secured server which is nothing but Certified Authority (CA) portal. In the portal customer submits its 3. For phishing detection and prevention, we are proposing a new methodology to detect the phishing website. share and merchant submit its own account details. Now CA

International Journal of Engineering Science and Computing, May 2016 5544 http://ijesc.org/ V. ALGORITHM: are not in the range 0...25, we have to subtract or add 26.

1. Encoding Formula for steganographic process, 2. First letter in each word of cover message is taken 3. Representation of each letter in secret message by its Stegano_medium = cover_medium + hidden_data. equivalent ASCCI code. 4. Conversion of ASCII code to equivalent 8 Bit binary Where, number. Cover_medium is the medium which is used to hide the 5. Division of 8 bit binary Choosing of suitable letters data, from table corresponding to 4 bit parts. Hidden_data is the data which will be hidden, 6. Apply Caesar cipher on the letters which are chosen Stegano_medium is the resultant medium of for the 4bit binary part. Steganography. 7. Meaningful sentence construction by using the resultant letters obtained by Caesar cipher as a first VII. CONCLUSION:- letters of suitable words. The payment system for online transaction is 8.Omission of Articles, pronouns, prepositions, adverb, proposed by combining text based steganography and visual was/were, am/is/are, have/has/had, shall/will, and cryptography that gives security to customer data and should/would in coding process to give flexibility in prevents misuse of data at merchant’s side. The proposed sentence construction any number into 4 bit parts. method can be applied for E-Commerce and mostly it will focus on payment during online shopping as well as physical VI. METHODOLOGY banking.

Ceasar cipher is a new and simplest technique which is VIII. ACKNOWLEDGEMENT:- used for encrypting and decrypting plaintext. In ceasar We would like to express our sincere gratitude to Prof. M.K cipher technique, it substitutes letters in the plaintext by Nighot for their suggestions and support towards the shifting a certain number of places up or down the alphabet. improvement of this research paper. For example, with a left shift of 4, E would be replaced by A, F would become B, and so on. IX. REFERENCES [1] Minimizing Pixel Expansion in Visual Cryptographic Plain text: abcdefghijklmnopqrstuvwxyz Scheme for General Access Structures ShyongJianShyu, Cipher text: wxyzabcdefghijklmnopqrstuv Member, IEEE, and Ming Chiang Chen IEEE Transactions On Circuits And Systems For Video Technology, Vol. 25, Formula for Encryption in Caesar cipher, No. 9, September 2015.

En(x) = (x+n) mod 26 [2] New Visual Steganography Scheme for Secure Banking Application S.Premkumar1, A.E.Narayanan2 Dept. of

Information Technology Peri-yarManiammai University Where, Thanjavur- 613 403, Tamil Nadu, India 2012 International x is the letter on which encryption will be done , Conference on Computing, Electronics and Electrical n is the key by which encryption will be done, and Technologies [ICCEET] E is the encryption function. [3] Design and Implementation of a Novel Authentication Formula for Decryption in Caesar cipher, Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme Harinandan Tunga1 and Dn(x) =(x-n) mod 26 Soumen Mukherjee2 1 Department of Computer Sc. & Engineering RCC Institute of Information technology Where, Kolkata, West Bengal, India 2 Department of computer x is the letter on which decryption will be done , Application RCC Institute of Information technology n is the key by which decryption will be done, and Kolkata, West Bengal, India. D is the decryption function.

The result should be in between 0...25. i.e., if x+n or x-n

International Journal of Engineering Science and Computing, May 2016 5545 http://ijesc.org/ [4] Comment on “Cheating Prevention in Visual Cryptography Yu-Chi Chen, Student Member, IEEE, Gwoboa Horng, and Du-Shiau Tsai.

[5] Secured Bank Authentication using Image Processing and Visual Cryptography B.Srikanth, G.Padmaja, Dr.Syed Khasim, Dr. P.V.S.Lakshmi, A.Haritha, Assistant Professor, Department of IT, PVPSIT, Kanuru.

[6] Online Payment System using Steganography and Visual Cryptography by Souvik Roy1 and P. Venkateswaran2 Department of Electronics & Tele- Communication Engineering Jabalpur University, Kolkata- 700032, India 2014 IEEE Students’ Conference on Electrical, Electronics and Computer Science.

[7] A. Shamir, How to share a secret, Comm. ACM, vol. 22, no. 11, pp. 612613, Nov. 1979.

[8] J.C. Judge, Steganography: Past, Present, Future, SANS Institute, November 30, 2001.

[9] A. N. Jaber and Md. F. B. Zolkipli, Use of cryptography in cloud computing, IEEE International conference on Control System, Computing and Engineering, pp. 179184

International Journal of Engineering Science and Computing, May 2016 5546 http://ijesc.org/