You are on page 1of 20

ONLINE PAYMENT USING

CRYPTOGRAPHY AND
STEGANOGRAPHY

ASHIQ V M
ABSTRACT
This paper presents a new approach for providing limited
information only that is necessary for fund transfer during
online shopping thereby safeguarding customer data and
increasing customer confidence and preventing identity theft. A
cryptographic technique based on visual secret sharing used for
image encryption.
INTRODUCTION

o In Online shopping the issue of purchase order through


electronic purchase request, filling of credit or debit
card information.

o Identity theft or phishing are the common threats to


online shopping.

o Identity theft is the stealing of someone’s identity in


the form of personal information and misuse.
INTRODUCTION

o A new method is proposed, that uses text based steganography and


visual cryptography, which minimizes information sharing between
consumer and online merchant but enable successful fund transfer ,
thereby safeguarding consumer information and preventing misuse

o Steganography is the art of hiding of a message within the image, called


the cover
STEGANOGRAPHY
DEFINED
OGREEK FOR “COVERED WRITING”.

o“The art and science of writing hidden messages


in such a way that no one apart from the intended
recipient even knows that a message has been
sent.”
EXAMPLES IN HISTORY

oTattoos on shaved heads


oWax-covered tablets
oInvisible Inks - milk, fruit juice
REASONS FOR USING DIGITAL
IMAGES

oIt is the most widely used medium being used today.


oTakes advantage of our limited visual perception of
colors.
oThis field is expected to continually grow as
computer graphics power also grows.
oMany programs are available to apply
steganography.
IMAGE ATTRIBUTES

oDigital images are made up of pixels.


o8-bit and 24-bit images are common.
oThe larger the image size, the more information you
can hide. However, larger images may require
compression to avoid detection.
EXISTING SYSTEM

o A customer authentication system using


visual cryptography is presented , but it is
specifically designed for physical banking.

o A signature based authentication system for core


banking is proposed in but it also requires
physical presence of the customer presenting the
share.

o A biometrics in conjunction with visual cryptography


is used as authentication system
DISADVANTAGES OF EXISTING
SYSTEM

o Does not provide a friendly environment to encrypt or decrypt the


data (images).

o Not suitable for online payments

o It is expansive of Using biometrics


PROPOSED SYSTEM

o Proposed System, Visual Cryptography (VC), technique based


on visual secret sharing used for image encryption.
oA new method is proposed, that uses text based steganography and
visual cryptography, which minimizes information sharing
between consumer and online merchant
o For phishing detection and prevention, we are proposing
a new methodology to detect the phishing website.
o Our methodology is based on the Anti-Phishing Image Captcha
validation scheme using visual cryptography. It prevents
password and other confidential information from the phishing
websites.
.
ADVANTAGES OF PROPOSED
SYSTEM

 Our methodology is based on the Anti-Phishing Image Captcha validation


scheme using visual cryptography.

 It prevents password and other confidential information from the phishing


websites.

 For phishing detection and prevention, we are proposing a new


methodology to detect the phishing website.
IMAGE-BASED
TECHNIQUES

oLeast Significant Bit Insertion


oMasking and Filtering
LSB INSERTION

oReplaces leastsignificant bits with the


message to be encoded.
oMost popular technique when dealing
with images.
oSimple, but susceptible to lossy
compression and image manipulation.
LSB - EXAMPLE
A SAMPLE RASTER DATA FOR 3 PIXELS
(9 BYTES) MAY BE:

00100111 11101001 11001000


00100111 11001000 11101001
11001000 00100111 11101011
Inserting
the binary
value for
A
(10000001)
changes
4 bits

00100111 11101000 11001000


00100110 11001000 11101000
11001000 00100110 11101011
MASKING AND FILTERING

oMasks secret data over the original data


by changing the luminance of particular
areas.
oDuring masking, it embed the message
within significant bits of the cover image.
oNot susceptible to lossy techniques because
image manipulation does not affect the secret
message.
MASKING AND FILTERING

oDigital Watermarking – provides identification


pertaining to the owner; i.e. license or copyright
information.

o Fingerprinting – provides identification of the user;


used to identify and track illegal use of content.
VISIBLE WATERMARK -
EXAMPLE
MODULES

1. Embedding text on the image


2. Encoding
3.Decoding Steps
4.Customer Authentication
5.Certification Authority Access
CONCLUSION

oSteganography and visual cryptography that provides


customer data privacy and prevents misuse of data at
merchant’s side.
The method is concerned only with prevention of
identify theft and customer data security.
In comparison to other banking application which uses
Steganography and visual cryptography , are basically
applied for physical banking, the proposed method can
be applied for E-Commerce with focus area on
payment during online shopping as well as physical
banking

You might also like