online payment system using steganography and visual cryptography

22
ONLINE PAYMENT SYSTEM USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY Department of ISE, DSCE 1

Upload: shahrukh-ali

Post on 13-Apr-2017

335 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: online payment system using Steganography and Visual cryptography

ONLINE PAYMENT SYSTEM USING STEGANOGRAPHY AND

VISUAL CRYPTOGRAPHY

Department of ISE, DSCE 1

Page 2: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

ONLINE PAYMENT SYSTEM USING STEGANOGRAPHY AND

VISUAL CRYPTOGRAPHY

BE Final Year Technical Seminar

Presented by:

Md. SHAHRUKH ALI

(1DS12IS054)

Under Guidance of :

Mrs. REKHA JAYARAM

Assistant Professor

Department of Information Science & Engineering

Dayananda Sagar College Of Engineering

2015 - 2016

2

Page 3: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Introduction

A rapid growth in E-Commerce market is seen in recent time.

Online shopping is the retrieval of product via the internet.

Most payment mode is credit/debit card.

Identity theft and Phishing are common dangers of online shopping.

3

Page 4: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

A new method is proposed that uses Steganography and Visual Cryptography.

It minimizes information sharing between consumer and online merchant.

4

Page 5: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Steganography

It is the art of hiding of a message with another.

Message can be hidden by shifting word and line.

It uses characteristics of English language.

It is based on Vedic Numeric Code.

Each letters is assigned from number 0 to 15.

5

Page 6: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Number Assignment

6

Page 7: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

EncodingStep 1: Representation of each letter in its equivalent ASCII code.

Step 2: Conversion of ASCII code to equivalent 8 bit binary number.

Step 3: Division of 8 bit binary number into two 4 bit parts.

Step 4: Choosing of suitable letters from table corresponding to the 4 bit parts.

Step 5: Meaningful sentence construction by using letters obtained as the first letters of suitable words.

Step 6: Omission of articles, pronoun, preposition, adverb, was/were, is/am/are, has/have/had, will/shall, and would/should in coding process to give flexibility in sentence construction.

7

Page 8: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Decoding

Step 1: First letter in each word of cover message is taken andrepresented by corresponding 4 bit number.

Step 2: 4 bit binary numbers are combined to obtain 8 bitnumber.

Step 3: ASCII codes are obtained from 8 bit numbers.

Step 4: Finally secret message is recovered from ASCII codes.

8

Page 9: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Example

Suppose we take “text”

text= 01110100 01100101 01111000 01110100

9

Page 10: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Visual Cryptography Cryptography, on the other hand, is the encrypting and decrypting of data and information with secret code.

Visual cryptography uses the same concept except that it is applied to images.

Using k out of n (k, n) visual secret sharing scheme a secret image is encrypted in shares.

Only combining the k shares or more give the original secret image.

10

Page 11: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Visual Cryptography example

11

Page 12: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Existing System

12

Page 13: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

The typical online payment process has the following stages:

Customer submits the payment information to the merchant.

The merchant submits the payment information to the online payment gateway.

The online payment gateway submits the payment to the payment processor.

The payment processor authorizes the payment and responds to the payment gateway.

The payment gateway responds back to the merchant.

The merchant responds back to the customer showing if the online payment was successful or not and taking the appropriate action.

13

Page 14: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Proposed System

14

Page 15: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE 15

Information is minimized by providing minimum information.

Introduction of CA and combined application of Steganography and Visual Cryptography.

One share with customer and another in database of CA. If “text” is customer unique authentication password and

account no of customer is 12345678910111, snapshot of cover text and account no is shown in and resultant shares by the application of visual cryptography on snapshot are and shows share 1 kept by customer and share 2 kept by CA.

Page 16: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Account no and cover text

Share 1 kept by customer

Share 2 kept by CA

16

Page 17: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Overlapping of Share 1 and Share 2

17

Page 18: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Advantages

Proposed method minimizes customer information sent to the online merchant.

It also prevents unlawful use of customer information at merchant’s side.

Usage of Steganography ensures that the CA does not know customer authentication password thus maintaining customer privacy.

Since customer data is distributed over 3 parties, a breach in single database can easily be contented.

18

Page 19: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Disadvantages

The problem is that CA does not know to which bank to forward the cover text obtained from combining two shares.

During payment, merchant’s payment system requires to direct the shopper to CA’s portal but fraudulent merchant may direct shopper to a portal similar to CA’s portal but of its own making and get hold of customer own share.

19

Page 20: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

Conclusion The developed system has discussed implementation

of securely using Steganography, Visual Cryptography.

So we are restricting the merchant to misuse of cardholders data and making fraud transactions.

The method is concerned only with prevention of identity theft and customer data security.

This mechanism is useful for every kind of E-commerce business.

20

Page 21: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

References

1. Amit R. Bramhecha, Prof. Dinesh D. Patil,” To Secure Online Payment System Using Steganography, Visual Cryptography and HMM” Proceedings of 2015 International Journal of Innovative Research in Computer and Communication Engineering, Vol. 3, pp, 2320-9801.

2. J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Scheme in Binary Image,” Proceeding of Fifth International Symposium on Multimedia Software Engineering, pp. 88-93, 2003.

3. M. Shirali-Shahreza, "Steganography in MMS," in Multitopic Conference, 2007. INMIC 2007. IEEE International, 2007, pp. 1-4.

4. J. Mielikainen, "LSB matching revisited," Signal Processing Letters, IEEE, vol. 13, pp. 285-287, 2006.

21

Page 22: online payment system using Steganography and Visual cryptography

Department of ISE, DSCE

THANK YOU…

22