INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) VOLUME: 04 ISSUE: 02 | FEB -2017
WWW.IRJET.NET
E-ISSN: 2395 -0056
P-ISSN: 2395-0072
Online Secure payment System Using shared Images 1Prof.
Anuja Zade,2 Bhupendra Singh ,3 Jawed Ansari, 4 Akshit Pandita 1234 JSPM,
s RSCOE Tathawade Pune 33
--------------------------------------------------------------------***-----------------------------------------------------------------------
Abstract -As a quick growth in online shopping is seen
Once you think your computer is safe to use but there is rise through social media. In social media we are much more open about ourselves online. Now days 61% of people say that they uses social networking sites. Illustrating the central role that such sites now play in our lives. [1]As we become more confident using these networks, we can begin to feel ‘untouchable’. We forget that criminals will use the personal information for their benefits like your date of birth and where you live is enough for someone to begin building the profile needed to apply for a credit card in your name. So while most people wouldn’t give this information to a stranger in real life, they will happily post it online where they did not care about it.
in recent time throughout the world. By increase in online shopping, many type of frauds like phishing, credit or debit card fraud are takes place. For the security of customer this paper has presents a new approach for providing limited information only that is necessary for fund transfer during online shopping there by safeguarding users data and increasing users confidence and preventing identity theft. The method uses combined application of steganography and visual cryptography for this purpose. Keywords – visual cryptography, online shopping, Stenography, Phishing, safeguarding.
I. INTRODUCTION
Types of frauds:
A high-speed welfare in E-Commerce market has been witnessed in recent times throughout the world. With increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major burden for customers and banks specifically in the case of CNP (Card Not Present). It allows customers to buy goods or services using web browsers and by filling credit or debit card information. In online shopping the common threats are phishing and identity theft. Identity theft is a form of thieving someone's identity i.e. personal information in which someone pretends to be someone else. The person misuses personal information for opening bank accounts and arranging credit cards. Proposed system presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby protecting customer data and gaining customer confidence and preventing identity theft. The approach uses combined application of Steganography and image cryptography for this purpose. User Account Details such as Account Number, Debit Card Number and Secret Pin Number are hidden into an Image using Steganography technique and Image is split into two Shares and shares are encrypted. [1]As Online Shopping Portals are insecure for Customer's Account Details, Customer has to provide only Account Number on Shopping Portal and Secret details of Bank account are obtained from adding user image share with Server image share by admin of the Bank.
Spam and Identity Theft Identity fraud terms used to [2] refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. In this identity of person is seal through social network sites and this information is used for wrongful purpose. In identity theft E-mail address of the user is used for terrorist activities, defamation, fake E mails.
Credit Card Fraud
There are various mods of Credit card fraud are as follows: Duplication: Card is with owner and is duplicate is made by stealing data of the owner. Skimming: Collection of data from the card’s magnet and copy it to blank card. Call center leaked: The card information in sold to Fraudsters. Bank back office data: By hacking the bank server and getting the personal information. Data theft: Stealing the information by sending spam Emails. Man in middle attack: Gaining the access when customer is contacting with vendor for payment and accessing the information.
Investment Fraud
Various investment schemes typically target stock investors, trying to steal money and investors' identities. Some of these scams will come in the form of an online newsletter.[2] In these newsletters, frauds will offer inside information on stocks, for a fee, and offer false data instead of real information. Online bulletin boards have also become a hotbed of fraudulent activity.
This system uses both steganography and visual cryptography. It reduces information sharing between customer and merchant server and safeguards customers’ information. It enables successful fund transfer to merchant's account from customer's account and prevents misuse of information at merchant side. © 2017, IRJET
|
Impact Factor value: 5.181
|
ISO 9001:2008 Certified Journal
|
Page 325