Online payment system using Steganography and Visual Cryptography

IEEE based on VISUAL CRYPTOGRAPHY DOTNET  2014

Abstract

This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. A cryptographic technique based on visual secret sharing used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret image is encrypted in shares which are meaningless images that can be transmitted or distributed over an un trusted communication channel. Only combining the k shares or more give the original secret image. Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities The use of images is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. Several solutions have been proposed to tackle phishing.

 Existing system:-

  •  The existing system supports with only one type of image format only. For example, if it is .jpg, then it supports only that same kind of image format only.
  •  The existing system does not provide a friendly environment to encrypt or decrypt the data (images).
  •  The existing visual cryptography schemes that are used for data hiding have a security hole in the encrypted Share file.
  •  Here an image based authentication using Visual Cryptography is implemented.

 Disadvantages:

  •  Does not provide a friendly environment to encrypt or decrypt the data (images).
  •  Supports with only one type of image format only. For example, if it is .jpg, then it supports only that same kind of image format only.
  •  The most critical measurements to evaluate the effectiveness of a VCS.

 Proposed System:

  •  Proposed System,Visual Cryptography (VC),  technique based on visual secret sharing used for image encryption.
  •  Secure Socket Layer (SSL) encryption prevents the interception of consumer information in transit between the consumer and the online merchant.
  •  In this paper, a new method is proposed, that uses text based steganography and visual cryptography, which minimizes information sharing between consumer and online merchant.
  •  VCS is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system.
  •  For phishing detection and prevention, we are proposing a new methodology to detect the phishing website.
  •  Our methodology is based on the Anti-Phishing Image Captcha validation scheme using visual cryptography. It prevents password and other confidential information from the phishing websites.

  •  Cryptographic technique:(2, 2)- Threshold VCS scheme,(n, n) -Threshold VCS scheme, (k, n) Threshold VCS  scheme are used in this proposed system.

 Advantages:

  •  Our methodology is based on the Anti-Phishing Image Captcha validation scheme using visual cryptography.
  •  It prevents password and other confidential information from the phishing websites.
  •  For phishing detection and prevention, we are proposing a new methodology to detect the phishing website.

 Hardware Requirements:-

 SYSTEM        : Pentium IV 2.4 GHz

 HARD DISK   : 40 GB

 RAM              : 256 MB

 Software Requirements:-

 Operating system :  Windows 7

 IDE                       :  Microsoft Visual Studio 2010

 Database               :  Sql server 2005

 Coding Language  :  C#.NET.