e-Fraud Prevention based on the SelfAuthentication of e-Documents ABSTRACT We consider a method for preventing e-Fraud in which a image is encrypted with a floating point cipher using a convolution operation and then output will generate in a image ciphertext. The output is then ‘embedded’ in a host image to hide the encrypted information.Decryption is accomplished by: (i) extracting the binary image from the host image; (ii) correlating the result with the original cipher. In principle, any cipher generator can be used for this purpose and the method has been designed to operate with images.The approach has a variety of applications and in this paper, we focus on the authentication and self-authentication of edocuments (letters and certificates, for example) that are communicated over the Internet and are thereby vulnerable to e-Fraud (e.g. modification, editing, counterfeiting etc.). EXISTING SYSTEM The weaknesses of all encryption systems is that the form of the output data (the cipher text), if intercepted, alerts the intruder to the fact that the information being transmitted may have some importance and that it is therefore worth attacking and attempting to decrypt it. This aspect of cipher text transmission can be used to propagate disinformation, achieved by encrypting information that is specifically designed to be intercepted and decrypted. In this case, we assume that the intercept will be attacked, decrypted and the information retrieved. There is no security when transmitting the data from one end to another. PROPOSED SYSTEM The main objective of the proposed system is to hide the encrypted message or a secret data in to an image which further act as a carrier of secret data and to transmit to the destination securely without any modification. If there are any perceivable changes when inserting or embedding the information into the image or if any distortions occur in the image or on its resolution there may be a chance for an unauthorized person to modify the data. So, the data encryption into an image and decryption and steganography is used to protect the data from unauthorized person, this plays a major role in the project.The scheme allows for the authentication and selfauthentication of documents such as letters, certificates and other image based data. For example, the selfauthentication of edocuments sent as attachments over the internet provides a unique facility for many legal and financial transactions that have traditionally relied on paper based documents to secure authenticity. PROCESS FLOW: MODULE DESCRIPTION: Number of Modules After careful analysis the system has been identified to have the following modules: 1. File Upload And Encryption 2. Hiding Text 3. Text Extraction 4. Decryption 1. File Upload And Encryption: Admin upload the files using filename and fileid. The user will search the uploaded files and select file and send request to admin. Admin view the user requested file and send secret key with image in which text embed into the image .The binary image should be converted in to block of bytes using serialization. The key will encrypt using an encryption algorithm. Use the encryption function to encrypt the numeric plaintext values using the public key. The encrypted function gives an integer value, and then converts the integer value in to hexadecimal value. Concatenate the hexadecimal value to form a cipher text. 2. Hiding Text: Steganography is the process of hiding the one information in to other sources of information like text, image or audio file so that it is not visible to the natural view. Here, the image is encrypted, then encrypted information hidden in a host image It is a simple approach to embedding a message in to the image. The Least Significant Bit insertion varies according to number of bits in an image. The encrypted text is hiding in changed to the bit of secret message. The encrypted information is hidden in a cover image is called as stegoimage. The stego key is used to extract the hidden data from a stegoimage. The stego key is a secret key used to protect the hidden message in an image. The stegoimage should be sent as an attachment to destination. 3. Text Extraction: The stegoimage can view using the image upload path. The hidden text is extracted from the host image using a stego key. The stego key is used to extract the text from the image. The stego key finds the text hidden in image file. Extract the text from an image; finally get the secret data and the hidden message stored in a file. 4. Decryption: The encrypted information extract from an image and using a private key to decrypt the hiddenmessage. Break the ciphertext into small blocks of data that are the same length as the public key modulus. The blocks of data containing a hexadecimal string. The interpret each hexadecimal string as a decimal integer value. Use the decryption function to decrypt the integer values using the private key. Represent each decrypted value as a pair of bytes. By using decryption the ciphertext convert in to block of bytes .After decryption the bytes converted in to binary image using deserialization. The binary image is converted in to image by using dequantization. Software requirements: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Database : My SQL Java Version : J2SDK1.5 Hardware requirements: Hardware - Pentium Speed - 1.1 GHz RAM - 1GB Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA