Online payment system using steganography and visual cryptography

A rapid growth in E-Commerce market is seen in recent time throughout the world. With ever increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. The method uses combined application of steganography and visual cryptography for this purpose.

[1]  A. E. Narayanan,et al.  Notice of Violation of IEEE Publication PrinciplesNew visual Steganography scheme for secure banking application , 2012, 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET).

[2]  K.R. Venugopal,et al.  Secure Authentication using Image Processing and Visual Cryptography for Banking Applications , 2008, 2008 16th International Conference on Advanced Computing and Communications.

[3]  Walter Bender,et al.  Echo Hiding , 1996, Information Hiding.

[4]  Tung-Shou Chen,et al.  A new data hiding method in binary image , 2003, Fifth International Symposium on Multimedia Software Engineering, 2003. Proceedings..

[5]  Jack Brassil Hiding Information in Document Images , 2007 .

[6]  Chuanxiong Guo,et al.  Online Detection and Prevention of Phishing Attacks , 2006, 2006 First International Conference on Communications and Networking in China.

[7]  Krista Bennett,et al.  LINGUISTIC STEGANOGRAPHY: SURVEY, ANALYSIS, AND ROBUSTNESS CONCERNS FOR HIDING INFORMATION IN TEXT , 2004 .

[8]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[9]  R. Siva Rama Prasad,et al.  An Evolution of Hindi Text Steganography , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[10]  K. Thamizhchelvy,et al.  E-Banking Security: Mitigating Online Threats Using Message Authentication Image (MAI) Algorithm , 2012, 2012 International Conference on Computing Sciences.

[11]  Anand Sharma,et al.  Visual cryptography improvises the security of tongue as a biometric in banking system , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[12]  Sheng Dun Hu,et al.  A Novel Video Steganography Based on Non-uniform Rectangular Partition , 2011, 2011 14th IEEE International Conference on Computational Science and Engineering.

[13]  Abhinav Aggarwal,et al.  Novel authentication system using visual cryptography , 2011, 2011 World Congress on Information and Communication Technologies.

[14]  Xiaoyao Xie,et al.  The security of shopping online , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[15]  Walter Bender,et al.  Techniques for Data Hiding , 1996, IBM Syst. J..

[16]  J C Judge,et al.  Steganography: Past, Present, Future , 2001 .