International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
Secured Online Payment System 1Swapna 1AP, 234
B Sasi, 2Aaditya Anil, 3Arjun T A, 4Harry John
CSE Department, Jyothi Engineering College, Kerala, India
Students, CSE Department, Jyothi Engineering College, Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Online payment system allows money transfers to be made only through internet instead of using cash or a check, in person or by mail. Nowadays there is a tremendous growth in online payment throughout the world, so the E-shopping users are facing more problems. The main problem is security. We provide secured online payment system through various techniques. The main techniques used are Steganography, Visual Cryptography and OCR. This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping. Key Words: Information security; Steganography;
Visual Cryptography; Online shopping 1. INTRODUCTION In this busy world most of us prefer doing online shopping and online payment. Since there is no waste of time in this process a tremendous growth in online payment has been seen throughout the world. Online shopping security is a concern for everyone who makes purchases on the Internet, but it is also an important issue for business leaders — and not just those in the retail sector. Firms go for online shopping, and their employees frequently make business purchases on the company credit card. So, the attackers mainly focus on this process and e-shopping users are facing more problem. Security is the main problem behind this system. Online payment is an electronic payment for goods or services electronically without using cash or check in person or by mail. It could be achieved through different modes. Different modes are Debit card, Credit card, E-money and Electronic fund transfer. Since there is less security by using this type of payment, we provide a secure payment by using different technologies [4]. This paper consist of a new proposed system, that uses text based steganography [2] and visual cryptography [1]. It provides only limited information that is necessary for fund transfer during online shopping and thereby protecting customer data and increasing customer confidence and preventing identity theft [4]. Optical character recognition Š 2017, IRJET
|
Impact Factor value: 5.181
|
also known as OCR [7] is used to convert the typed, printed or handwritten text into encoded machine text. It can be used in machine translation, text-to-speech and text mining. The method proposed is specifically for E-Commerce but can easily be extended for online as well as physical banking.
2. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY Steganography is a practice of hiding a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step farther by hiding an encrypted message such that no one suspects it exists. Ideally, anyone scanning your data will fail to know it contains encrypted data. The messages could be hidden under image, audio, video, text. The text based steganography [2] technique is based on Vedic Numeric Code. Frequency of letters in English alphabet in conjunction with Vedic Numeric Code is used for the steganography technique. No separate importance is given for vowels and consonants. Text steganography [2] uses text as a cover media for hiding message. Message can be hidden by shifting word and line in the open spaces and in word sequence. Sentence properties such as number of words, number of characters and number of vowels and position of a vowel in a word are also used to hide secret message. The advantage of choosing text steganography over other steganographic technique [12] is its smaller memory requirement and simpler communication. Visual cryptography (VC)[5][10] was brought out by Moni Naor and Adi Shamir at EUROCRYPT 1994. It is used to encrypt written material (printed text, handwritten notes, pictures, etc) in a perfectly secure way. The decoding part is done by the human visual system directly, without any computation cost. Using k out of n (k,n) visual secret sharing scheme [11], a secret image is encoded into n shadow images called shares [8][9], in which each participant in P receives one share. The original message is visible if any k or more of them are stacked together, but totally invisible if fewer than k transparencies are stacked together.
ISO 9001:2008 Certified Journal
|
Page 239