CFP last date
20 January 2025
Reseach Article

A Novel Approach on Secure Data Transfer for General Transactions using Secret Sharing Scheme

by J. Sharmila, Jagadish Gurrala
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 172 - Number 8
Year of Publication: 2017
Authors: J. Sharmila, Jagadish Gurrala
10.5120/ijca2017915189

J. Sharmila, Jagadish Gurrala . A Novel Approach on Secure Data Transfer for General Transactions using Secret Sharing Scheme. International Journal of Computer Applications. 172, 8 ( Aug 2017), 10-13. DOI=10.5120/ijca2017915189

@article{ 10.5120/ijca2017915189,
author = { J. Sharmila, Jagadish Gurrala },
title = { A Novel Approach on Secure Data Transfer for General Transactions using Secret Sharing Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2017 },
volume = { 172 },
number = { 8 },
month = { Aug },
year = { 2017 },
issn = { 0975-8887 },
pages = { 10-13 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume172/number8/28269-2017915189/ },
doi = { 10.5120/ijca2017915189 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:20:02.818276+05:30
%A J. Sharmila
%A Jagadish Gurrala
%T A Novel Approach on Secure Data Transfer for General Transactions using Secret Sharing Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 172
%N 8
%P 10-13
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the last two decades, the researchers were targeted on the various issues in any general transactions was getting ambiguity in Information Technology domain because of its challenging nature and all overlapping purchases through selling goods during online shopping in government sector. Visual Cryptography gives us the best framework for all services where all authenticated mobile devices through legitimate users get linked and sharing secret keys with goods details with more security. In the paper, each Mobile get acquainted with this proposed framework to enable source to destination goods delivery among users who subscribed in the online shopping cart. Actual Customers want to shop any item from Flipcart, Amazon with unique purchase and selling their belonging without having gray item available in the network is possible through virtual shopping. In the paper to fill gap between old shopping framework and new framework through this techniques by supplementing new techniques inside mobile shopping. Therefore the .legitimate customer gets benefitted while shopping.

References
  1. “Visual cryptography. in Proceedings of Advances in Cryptology”, Moni Naor and Adi Shamir,EUROCRYPT 94, LNCS Vol. 950, pages 1- 12. Springer - Verlag, 1994
  2. D. R. L. Prasanna, L. Jani Anbarasi and M. Jenila Vincent “A Novel Approach for Secret Data Transfer using Image Steganography and Visual Cryptography” ICCCS’11, February 2011.
  3. Piyush Marwaha and Paresh Marwaha “Visual Cryptographic Steganography In Images” Second International conference on Computing, Communication and Networking Technologies. 2010.
  4. Cheddad, A., Condell, J., Curran, K., & Mc Kevitt, P. “Digital image steganography: Survey and analysis of current methods” Signal processing, Vol. 90(3), pp. 727-752, 2010.
  5. Kaur, S., Kaur, A., & Singh, K. “A survey of image steganography” IJRECE, Vol. 2(3), pp. 102-105, 2014.
  6. Anbarsi LJ, Kannan S. Secured secret color image sharing with steganography. In: Recent Trends In Information Technology ICRTIT.2012;44-48.
  7. P.Sanyasi Naidu,Reena Kharat,2016,”Secure Authentication in online voting system using multiple Image secret sharing, springer verilog, 2016.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Tamper resistance.