Secured Transaction System Using Steganography and Visual Cryptography

Secured Transaction System Using Steganography and Visual Cryptography

DOI 10.4010/2016.1354 ISSN 2321 3361 © 2016 IJESC Research Article Volume 6 Issue No. 5 Secured Transaction System Using Steganography and Visual Cryptography Doshi Ruchali1, Kale Prajakta2, Pasalkar Pranoti3 UG Scholar1, 2, 3 Computer Department Savitribai Phule Pune University, India K.J College of Engineering and Management Research, Pune, India3 Abstract: Online payment is nothing but money which is exchanged electronically. Online payment systems are e-commerce, businesses which allow fund transfer with the help of internet. In today’s world credit cards are used commonly for payment on e-commerce. In online transaction at merchants side merchant have to pay certain amount per transaction and many times it happens that users are asked to provide personal details along with additional bank details. It is the merchant’s responsibility to protect customer’s information from being misused. There by, we are proposing such a system which will build trust relationship between merchant and customer. For that a cryptographic technique based on visual secret sharing is used for image encryption. Along with this cryptographic technique we are combining advantages of steganography to avoid cheating in visual cryptography. Using these techniques the proposed system will provide security to the customer’s data using less information. Keywords: cheating prevention scheme, visual cryptography, secret sharing, information security, steganography, online shopping. I. INTRODUCTION: II. LITRETURE SURVEY:- In online transaction security is very important factor. The internet represents an insecure channel for i. Minimizing Pixel Expansion in Visual exchanging information leading to a high risk of intrusion of Cryptographic Scheme for General Access fraud such as fishing. Different methods have been used to Structures this paper presenting the modeling of protect transfer of data including encryption. minimizing the pixel expansion for a (k, n)-VCS into an integer linear program (ILP) was proposed, The proposed system is providing the security for to ensure that the constraints for GVCS can be online transfer of funds where it is using techniques like satisfied. The pixel expansion of a GVCS can thus visual cryptography and steganography. Cryptography is a be minimized by solving the corresponding ILP[1] technique of hiding information into media formats such as images, videos etc. Where visual cryptography is a special ii. New Visual Steganography Scheme for Secure encryption technique to hide information in images in such a Banking Application The major issue in core way that image can be decrypted by the humans if the banking is the authenticity of the customer. Due to correct single strategy is used by both end users. unavoidable hacking of the databases on the Steganography is also an encryption technique which is used internet, it is always quite difficult to trust the to hide information in text format. information on the internet. To solve this problem of authentication, they proposed an algorithm based The use of images is made for providing privacy to the on image processing, steganography and visual customer’s information over the untrusted network. The cryptography[2] customer’s information is first encrypted by using ceasar- iii. Design and Implementation of a Novel cipher technique and then it is again encrypted in the image Authentication Algorithm for Fool-Proof Lock Key by applying visual cryptography. The image is divided into System Based on Visual Secret Sharing Scheme two shares in such a way that one share is stored at database Content-The aims at creating an authentication of bank and other is kept at user’s side. The transaction is algorithm using visual cryptography that creates a successful when both shares of image are available and fool-proof lock-key mechanism wherein a lock can verified. Once the original image is revealed to the user it be opened by its paired key only and the key cannot can be used as the password. be duplicated. In proposed mechanism they uses a International Journal of Engineering Science and Computing, May 2016 5542 http://ijesc.org/ lock and a key, both is one part of given secret science of secret data communication using carrier image and every lock-key pair has one associated medium, such as images, videos, text, and unique image[3] networks. Image steganography is majorly divided into spatial and frequency domains. Pixel value iv. Comment on Cheating Prevention in Visual differencing (PVD) considered as good Cryptography The goal of cryptanalysis is to find steganographic algorithm due to its high payload potential weaknesses in a cryptographic scheme. In and good visual perception in spatial domain. The this paper, they have crypt analyzed a cheating- purpose of this paper is two folded. First is the prevention scheme in VC and have shown that it is critical analysis of current PVD methods using not cheating immune[4] evaluating parameters (payload, visual quality and resistance of attacks) and secondly it highlights the v. Secured Bank Authentication using Image current promising directions on PVD Processing and Visual Cryptography Todays steganographic research[8] banking system has brought core banking for the users convenience, which is a set of services, where ix. Deployment of secure sharing: Authenticity and authentication plays main role. So in order to authorization using cryptography in cloud overcome this authentication problem we are environment the proposed methodology provides proposing an efficient algorithm for secured bank more control of owner on the data stored on cloud authentication. The algorithm mainly deals with by restricting the access to specific user for specific Image Processing and Visual Cryptography[5] file with limited privileges and for limited time period on the basis of secret key using symmetric as vi. Online Payment System using Steganography and well as asymmetric mechanism. The integrity and Visual cryptography With ever increasing confidentiality of data is ensured doubly by not popularity of online shopping, Debit or Credit card only Encrypting the secret key but also to the access fraud and personal information security are major permission and limited file information[9] concerns for customers, merchants and banks specifically in The case of CNP (Card Not III. EXISTING SYSTEM: Present).They presents a new approach for providing limited information only that is necessary In existing system customer selects he’s items and after for fund transfer during online shopping thereby selection customer have to submit he’s personal details and safeguarding customer data and increasing debit or credit card details to the merchant’s server. customer confidence and preventing identity Theft. The method uses combined application of steganography and Visual cryptography for this purpose[6] vii. Privacy preserving data mining using visual steganography and encryption Steganography is the process of hiding a secret message within an ordinary message extracting it at its destination. Visual steganography is one of the most secure forms of steganography available today and highly suited for image files. The scope of this paper is to In this system it makes use of payment gateway, and using combine steganography and cryptography this gateway it verifies customer’s details. After verification properties in such a way to make it harder to of personal information account details are verified by bank retrieve the image of the secret message. In this then funds are transferred to the merchant’s account. The work, the image is sliced, the sliced images are existing system supports with only one type of image format stored and upon match with a search string query only. For example, if it is .jpg, then it supports only that the original image is retrieved by merging the same kind of image format only. The existing system does individual randomly ordered slices in a regular not provide a friendly environment to encrypt or decrypt the manner. The image slicing ensures privacy data (images).The existing visual cryptography schemes that preserving and thread based mining reduces the are used for data hiding have a security hole in the encrypted time complexity of the search algorithm[7] Share file. Here an image based authentication using Visual Cryptography is implemented. viii. Pixel value differencing steganography techniques. Analysis and open challenge Steganography is the International Journal of Engineering Science and Computing, May 2016 5543 http://ijesc.org/ Disadvantages: combines its own share with the customer’s share and Does not provide a friendly environment to encrypt obtains the original image. From CA, merchant account details, cover text are forwarded to the bank. At the bank or decrypt the data (images). customer authentication password is recover from the cover Supports with only one type of image format only. text. Customer information is sent to the merchant by CA For example, if it is .jpg, then it supports only that [6]. after receiving customer’s password, bank matches it with its own database and after verification of the customer’s same kind of image format only. information, the transaction is conducted from customer The most critical measurements to evaluate the account to merchants account successfully. effectiveness of a VCS. The problem is that CA does not know to which bank to forward the cover text obtained from combining two shares. IV. PROPOSED SYSTEM It can be solved by appending 9 digit transit number of bank with customer authentication information. For example, If Following figure shows the system architecture of proposed “text” is customer unique authentication password and system: account no of customer is 12345678910111, snapshot of cover text and account no is shown in Fig. 3 and resultant shares by the application of visual cryptography on snapshot are Fig. 4and Fig. 5. Fig. 4 shows share 1 kept by customer and Fig. 5shows share 2 kept by CA. Fig. 6 shows the result of combing share 1 and share 2. Proposed System, Visual Cryptography (VC), technique based on visual secret sharing used for image encryption.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us