CFP last date
20 December 2024
Reseach Article

Combine Use of Steganography and Visual Cryptography for Online Payment System

by V. Lokeswara Reddy, T. Anusha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 6
Year of Publication: 2015
Authors: V. Lokeswara Reddy, T. Anusha
10.5120/ijca2015905494

V. Lokeswara Reddy, T. Anusha . Combine Use of Steganography and Visual Cryptography for Online Payment System. International Journal of Computer Applications. 124, 6 ( August 2015), 7-11. DOI=10.5120/ijca2015905494

@article{ 10.5120/ijca2015905494,
author = { V. Lokeswara Reddy, T. Anusha },
title = { Combine Use of Steganography and Visual Cryptography for Online Payment System },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 6 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 7-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number6/22106-2015905494/ },
doi = { 10.5120/ijca2015905494 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:13:39.013367+05:30
%A V. Lokeswara Reddy
%A T. Anusha
%T Combine Use of Steganography and Visual Cryptography for Online Payment System
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 6
%P 7-11
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A rapid growth in the E - Commerce market is seen in recent time in the whole extent of the world. With ever increasing popularity of online shopping, Debit/Credit card fraud and personal information security are major concerns for clients, Merchandiser and depository financial institution specifically in the case of CNP (Card Not Present). This paper presents a novel approach for providing limited information that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity stealing. This method uses combined application of Steganography and visual cryptography for this purpose.

References
  1. Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shoppingOnline," Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), vol. 9, pp. 4693-4696, 2011. Javelin Strategy & Research, “2013 Identify FraudReport, https://www.javelinstrategy.com/brochure/276.
  2. Walter Bender, Daniel Gruhl, Norishige Morimoto, A. Lu, “Techniques for Data Hiding,” IBM Systems Journal, Vol.35, Nos. 3 & 4, pp. 313-336, 1996.
  3. M. Naor nd A. Shamir, “Visual cryptography,” Advances in Cryptograhy: EUROCRYPT’94, LNCS, vol. 950, pp. 1–12, 1995.
  4. 4.Chetana Hegde, S. Manu, P. Deepa Shenoy, K.R.Venugopal,L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,” Proceedings of 16th International Conference on Advanced Computing and Communications.
  5. Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and Communication Technologies.
  6. C. Pautasso, T. Heinis, and G. Alonso, “Autonomic resource provisioning for software business processes,” Information and Software Technology.
  7. A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler,H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef, “Web services on demand: Wsla-driven automated management,”IBM Syst. J., vol. 43, no. 1, pp. 136–158, 2004.
  8. M. Wang and T. Suda, “The bio-networking architecture: a biologically inspired approach to the design of scalable, adaptive, and survivable/available network applications,” in Proc. of the IEEE Symposium on Applications and the Internet.
  9. N. Laranjeiro and M. Vieira, “Towards fault tolerance in web services compositions,” in Proc. of the workshop on engineering fault tolerant systems.
Index Terms

Computer Science
Information Sciences

Keywords

Steganography InformationSecurity Visual-Cryptograhy Online-payment.