International Journal of Research In Science & Engineering e-ISSN: 2394-8299 p-ISSN: 2394-8280 A SURVEY PAPER ON FRAUD PROOF LINKED PAYMENT SYSTEM Rohini Kuthe Mtech, Computer Science & Engg, Priyadarshini Bhagwati College of Engineering, Nagpur, India rohinikuthe51@gmail.com ABSTRACT A new approach for online transaction in which a consumer’s payment information is minimized to that is only needed for transfer of funds during online payment thereby safeguarding customer data and increasing customer confidence and preventing identity theft has been proposed. When you make a payment, the information will never be passed on your personal financial details to merchant sites, keeping your data safe and your identity protected against fraud. This is achieved by the introduction of Central Certified Authority (CA) and combined application of Steganography, and Visual Cryptography. Cryptography involves converting a message text into an unreadable cipher. On the other hand, Steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attack. Keywords: Central Certified Authority, Steganography, Visual Cryptography --------------------------------------------------------------------------------------------------------------------------1. INTRODUCTION The online payment system is proposed by combining different types of steganography and cryptography techniques that provides customer data privacy and prevents misuse of data at merchant’s side. These techniques can be applied for E-Commerce with focus area on payment during online shopping as well as physical banking. Identity theft and phishing are the common dangers of online shopping. Service, Financial and Retail Service are the most targeted industrial sectors of phishing attacks. Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.) to be encrypted in such a way that the decryption can be performed by the human visual system. This system will be more securing than any other these techniques alone and also as compared to steganography and cryptography combined systems. There are different levels of visual cryptography techniques- Binary images, Gray images, Color images. Types of visual cryptography are halftone visual cryptography, 2-out-2 visual cryptography. Steganography is the art of “secret communication”. Its goal is to transmit a message (information) hidden inside another visible message. The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Steganography and encryption are both used to ensure data confidentiality. However the main difference between them is that with encryption anybody can see that both parties are communicating in secret. Steganography hides the existence of a secret message and in the best case nobody can see that both parties are communicating in secret. Steganography is classified into types like text based stegnography, BPCS steganography. 2. PHISHING Identity theft and phishing are the common dangers of online shopping. Identity theft is the stealing of someone’s identity in the form of personal information and misuse of that information for making purchase and opening of bank accounts or arranging credit cards [2]. Phishing is a criminal mechanism that employs both IJRISE| www.ijrise.org|editor@ijrise.org International Journal of Research In Science & Engineering e-ISSN: 2394-8299 p-ISSN: 2394-8280 social engineering and technical subterfuge to steal consumer’s personal identity data and financial account credentials. Effects of Phishing are Inflicts financial losses, Corrodes consumer trust. 3. STEGANOGRAPHY Text-Based Steganography: It makes use of features of English Language like inflexion, fixed word order and use of periphrases for hiding data rather than using properties of a statement [4]. BPCS Steganography: The information hiding capacity of a true colour image is around 50%. A sharpening operation on the dummy image increases the embedding capability quite a bit. Randomization of the secret data by a compression operation makes the embedded data more intangible. The steganography program for each user is easy. It further protects against eavesdropping on the embedded information. It is most secured technique and provides high security [4]. 4. VI SUAL CRYPTOGRAPHY Halftone visual cryptography: This novel technique achieves visual cryptography via half toning. Based on the blue-noise dithering principles, this method utilizes the void and cluster algorithm to encode a secret binary image into halftone shares (images) carrying significant visual information [1]. 2-0ut-2 Visual Cryptography: Every secret pixel of the original binary image is converted into four sub pixel of two share images and recovered by simple stacking process. This is equivalent to using the logical OR operation between the shares [1]. 5. TEXT STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY S. R. Navale, S. S. Khandagale, Prof. N. K. Chouhan proposed payment systems, a consumer’s payment information is sent to a payment portal via a merchant.[4] This makes the payment system vulnerable to intrusions and Information leaks, causing consumer data theft, identity theft and fraudulent transactions. To protect consumer’s financial information from being compromised, we developed an approach for online payment systems in which a consumer’s payment information is directly provided to a payment portal rather than sent through a merchant’s website. This approach, however, introduced by the introduction of a trusted third party called certified authority, CA, and a combination of text steganography and visual cryptography. A CA verifies the identity of a consumer by combining share1 and share2 before processing the payment. The combination of text steganography and visual cryptography provides consumer’s information privacy and protects data from misuse. 5.1 Sequence of Payment System 1. 2. 3. 4. 5. 6. 7. 8. 9. Consumer registration process. Share 1 generated using Steganography and Visual Cryptography. Consumer opts for online shopping (Merchant Side) Consumer completes the shopping process and directed to payment process. Consumer submits the share 1 provided while registration and Merchant provides its account details. The Consumer Share and Bank Share are combined and verified by the CA. If the share is valid then the transaction will be synchronized with the bank. If share not valid then error message will be sent. For valid share the Bank will extract the Account number from the original image and perform the transaction. A notification will be sent to the consumer via mail. IJRISE| www.ijrise.org|editor@ijrise.org International Journal of Research In Science & Engineering e-ISSN: 2394-8299 p-ISSN: 2394-8280 Fig-1: Payment System using Text steganography and Visual Cryptography 6. BPCS STEGANOGRAPHY AND 2-OUT-2 VISUAL CRYPTOGRAPHY Mrs. D. Murugeswari, Urugeswari, Rugeswari, Kn.Sangeetha, M.Srivani [1] proposed a system by combining BPCS steganography and 2-out-2 visual cryptography. It provide that provides customer data privacy and prevents misuse of data at merchant’s side. BPCS Steganography is really effective against eavesdropping and has a high information hiding capacity as compared to traditional steganography approach. The method is concerned only with prevention of identity theft and customer data security. This method can be applied for ECommerce with focus area on payment during online shopping as well as physical banking. Fig-2: Payment system using BPCS steganography and 2-out-2 visual cryptography IJRISE| www.ijrise.org|editor@ijrise.org International Journal of Research In Science & Engineering e-ISSN: 2394-8299 p-ISSN: 2394-8280 6.1 Encoding Representation of each letter in secret message by its equivalent ASCII code Conversion of ASCII code to equivalent 8 bit binary number. Division of 8 bit binary number into two 4 bit parts. Choosing of suitable letters from table 1 corresponding to the 4 bit parts. Meaningful sentence construction by using letters obtained as the first letters of suitable words. Encoding is not case sensitive. [5] 6.2 Decoding First letter in each word of cover message is taken and represented by corresponding 4 bit number. Bit binary numbers of combined to obtain 8 bit number. ASCII codes are obtained from 8 bit numbers. Finally secret message is recovered from ASCII codes. [5] 7. IMAGE PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING Chetana Hegadem, S. Manu, P. Deepa Shenoy, K.R.Venugopal,L.M.Patniak proposed A signature based authentication system for core banking [10] but it also requires physical presence of the customer presenting the share. Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the Internet, it is always quite difficult to trust the information on the Internet. It provides technique of processing the signature of a customer and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank. When two shares are created, one is stored in the bank database and the other is kept by the customer. The customer has to present the share during all of his transactions. This share is stacked with the first share to get the original signature. The correlation method is used to take the decision on acceptance or rejection of the output and authenticate the customer. 8. CONCLUSION An extensive survey of different visual cryptographic and steganographic techniques is presented in this paper. Many combinations of visual cryptography and steganography are examined up to the latest developments in it. Traditional visual cryptography specifically deals with sharing a single binary secret between a numbers of participants. Using visual cryptography with various types of steganography provide double level of security. ACKNOWLEDGEMENT Author is thankful to the Mr. M. S. Chaudhari, Head of the Department of Priyadarshini Bhagwati College of Engineering (CSE), Nagpur, India. His kind support and useful technical discussion during the course of this work, Thanks are also due to friends and colleagues of my department for their cooperation, fruitful technical discussion and guidance. REFERENCES 1] Mrs. D. Murugeswari, Urugeswari, Rugeswari, Kn.Sangeetha, M.Srivani, “ Secure E-pay using text based stagnos and visual cryptography” International Journal of Engineering Research and General Science Volume 3, Issue 1, January-February, 2015 ISSN 2091-2730 IJRISE| www.ijrise.org|editor@ijrise.org International Journal of Research In Science & Engineering e-ISSN: 2394-8299 p-ISSN: 2394-8280 2] Prof. D. B. Satre, Varad Durugkar, Akshay Ambekar, AmitKumar Yadav, Sudarshan Patil, ‘‘Securing Online Shopping System Using Visual Cryptography’’, International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 1, January 2015, ISSN 2348 – 8050 3] Alathy, Sharmila, Sushmitha, “Privacy Enhanced Online Payment System”, International Journal of Modern Trends in Engineering and Research (IJMTER), Volume 02, Issue 01, [January - 2015] eISSN: 2349-9745, p-ISSN: 2393-8161 4] S. R. Navale, S. S. Khandagale, Prof. N. K. Chouhan, “S. R. Navale, S. S. Khandagale, Prof. N. K. Chouhan, “Approach for Secure Onlinetransaction using Visual Cryptography & Text Steganography”, International Journal of Engineering Research & Technology (IJERT), Vol. 4 Issue 03, March-2015, ISSN: 2278-0181 5] Souvik Roy, P.Venkateswaran, “Online Payment System using Steganography and Visual Cryptography,” Proceedings of IEEE Students’ Conference on Electrical, Electronics and Computer Science, 2014. 6] K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating OnlineThreats Using Message Authentication Image (MAI) Algorithm,”Proceedings of 2012 International Conference on Computing Sciences(ICCS), pp. 276 – 280, 2012. 7] S. Premkumar, A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking Application,” Proceeding of 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET), pp. 1013 – 1016, Kumaracoil, India, 2012. 8] Jaya, Siddharth Malik, AbhinavAggarwal, Anjali Sardana, “Novel Authentication System Using Visual Cryptography,” Proceedings of 2011 World Congress on Information and CommunicationTechnologies, pp. 1181-1186, Mumbai, India, 2011. 9] S. Suryadevara, R. Naaz, Shweta, S. Kapoor, “Visual cryptography improvises the security of tongue as a biometric in banking system,”Proceedings of 2011 2nd International Conference on Computer and Communication Technology (ICCCT), pp. 412 – 415, 2011. 10] Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M Patnaik, “Secure Authentication using Image Processing and Visual Cryptography for Banking Applications,” Proceedings of 16 th International Conference on Advanced Computing and Communications, pp. 65-72, Chennai, India, 2008. IJRISE| www.ijrise.org|editor@ijrise.org