final_survey_paper

advertisement
International Journal of Research In Science & Engineering
e-ISSN: 2394-8299
p-ISSN: 2394-8280
A SURVEY PAPER ON FRAUD PROOF LINKED PAYMENT SYSTEM
Rohini Kuthe
Mtech, Computer Science & Engg, Priyadarshini Bhagwati College of Engineering, Nagpur, India
rohinikuthe51@gmail.com
ABSTRACT
A new approach for online transaction in which a consumer’s payment information is minimized to that is only
needed for transfer of funds during online payment thereby safeguarding customer data and increasing
customer confidence and preventing identity theft has been proposed. When you make a payment, the
information will never be passed on your personal financial details to merchant sites, keeping your data safe
and your identity protected against fraud. This is achieved by the introduction of Central Certified Authority
(CA) and combined application of Steganography, and Visual Cryptography. Cryptography involves converting
a message text into an unreadable cipher. On the other hand, Steganography embeds message into a cover
media and hides its existence. Both these techniques provide some security of data neither of them alone is
secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder
attack.
Keywords: Central Certified Authority, Steganography, Visual Cryptography
--------------------------------------------------------------------------------------------------------------------------1. INTRODUCTION
The online payment system is proposed by combining different types of steganography and
cryptography techniques that provides customer data privacy and prevents misuse of data at merchant’s side.
These techniques can be applied for E-Commerce with focus area on payment during online shopping as well as
physical banking. Identity theft and phishing are the common dangers of online shopping. Service, Financial and
Retail Service are the most targeted industrial sectors of phishing attacks.
Visual cryptography is a cryptographic technique which allows visual information (pictures, text, etc.)
to be encrypted in such a way that the decryption can be performed by the human visual system. This system
will be more securing than any other these techniques alone and also as compared to steganography and
cryptography combined systems. There are different levels of visual cryptography techniques- Binary images,
Gray images, Color images. Types of visual cryptography are halftone visual cryptography, 2-out-2 visual
cryptography.
Steganography is the art of “secret communication”. Its goal is to transmit a message (information)
hidden inside another visible message. The advantage of steganography over cryptography alone is that the
intended secret message does not attract attention to itself as an object of scrutiny. Steganography and
encryption are both used to ensure data confidentiality. However the main difference between them is that with
encryption anybody can see that both parties are communicating in secret. Steganography hides the existence of
a secret message and in the best case nobody can see that both parties are communicating in secret.
Steganography is classified into types like text based stegnography, BPCS steganography.
2. PHISHING
Identity theft and phishing are the common dangers of online shopping. Identity theft is the stealing of
someone’s identity in the form of personal information and misuse of that information for making purchase and
opening of bank accounts or arranging credit cards [2]. Phishing is a criminal mechanism that employs both
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
e-ISSN: 2394-8299
p-ISSN: 2394-8280
social engineering and technical subterfuge to steal consumer’s personal identity data and financial account
credentials. Effects of Phishing are Inflicts financial losses, Corrodes consumer trust.
3. STEGANOGRAPHY

Text-Based Steganography: It makes use of features of English Language like inflexion, fixed word
order and use of periphrases for hiding data rather than using properties of a statement [4].

BPCS Steganography: The information hiding capacity of a true colour image is around 50%. A
sharpening operation on the dummy image increases the embedding capability quite a bit.
Randomization of the secret data by a compression operation makes the embedded data more
intangible. The steganography program for each user is easy. It further protects against eavesdropping
on the embedded information. It is most secured technique and provides high security [4].
4. VI SUAL CRYPTOGRAPHY

Halftone visual cryptography: This novel technique achieves visual cryptography via half toning.
Based on the blue-noise dithering principles, this method utilizes the void and cluster algorithm to
encode a secret binary image into halftone shares (images) carrying significant visual information [1].

2-0ut-2 Visual Cryptography: Every secret pixel of the original binary image is converted into four
sub pixel of two share images and recovered by simple stacking process. This is equivalent to using the
logical OR operation between the shares [1].
5. TEXT STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY
S. R. Navale, S. S. Khandagale, Prof. N. K. Chouhan proposed payment systems, a consumer’s
payment information is sent to a payment portal via a merchant.[4] This makes the payment system vulnerable
to intrusions and Information leaks, causing consumer data theft, identity theft and fraudulent transactions. To
protect consumer’s financial information from being compromised, we developed an approach for online
payment systems in which a consumer’s payment information is directly provided to a payment portal rather
than sent through a merchant’s website. This approach, however, introduced by the introduction of a trusted
third party called certified authority, CA, and a combination of text steganography and visual cryptography. A
CA verifies the identity of a consumer by combining share1 and share2 before processing the payment. The
combination of text steganography and visual cryptography provides consumer’s information privacy and
protects data from misuse.
5.1 Sequence of Payment System
1.
2.
3.
4.
5.
6.
7.
8.
9.
Consumer registration process.
Share 1 generated using Steganography and Visual Cryptography.
Consumer opts for online shopping (Merchant Side)
Consumer completes the shopping process and directed to payment process.
Consumer submits the share 1 provided while registration and Merchant provides its account details.
The Consumer Share and Bank Share are combined and verified by the CA.
If the share is valid then the transaction will be synchronized with the bank. If share not valid then error
message will be sent.
For valid share the Bank will extract the Account number from the original image and perform the
transaction.
A notification will be sent to the consumer via mail.
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
e-ISSN: 2394-8299
p-ISSN: 2394-8280
Fig-1: Payment System using Text steganography and Visual Cryptography
6. BPCS STEGANOGRAPHY AND 2-OUT-2 VISUAL CRYPTOGRAPHY
Mrs. D. Murugeswari, Urugeswari, Rugeswari, Kn.Sangeetha, M.Srivani [1] proposed a system by
combining BPCS steganography and 2-out-2 visual cryptography. It provide that provides customer data privacy
and prevents misuse of data at merchant’s side. BPCS Steganography is really effective against eavesdropping
and has a high information hiding capacity as compared to traditional steganography approach. The method is
concerned only with prevention of identity theft and customer data security. This method can be applied for ECommerce with focus area on payment during online shopping as well as physical banking.
Fig-2: Payment system using BPCS steganography and 2-out-2 visual cryptography
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
e-ISSN: 2394-8299
p-ISSN: 2394-8280
6.1 Encoding

Representation of each letter in secret message by its equivalent ASCII code

Conversion of ASCII code to equivalent 8 bit binary number.

Division of 8 bit binary number into two 4 bit parts.

Choosing of suitable letters from table 1 corresponding to the 4 bit parts.

Meaningful sentence construction by using letters obtained as the first letters of suitable words.

Encoding is not case sensitive. [5]
6.2 Decoding

First letter in each word of cover message is taken and represented by corresponding 4 bit number.

Bit binary numbers of combined to obtain 8 bit number.

ASCII codes are obtained from 8 bit numbers.

Finally secret message is recovered from ASCII codes. [5]
7. IMAGE PROCESSING AND VISUAL CRYPTOGRAPHY FOR BANKING
Chetana Hegadem, S. Manu, P. Deepa Shenoy, K.R.Venugopal,L.M.Patniak proposed A signature
based authentication system for core banking [10] but it also requires physical presence of the customer
presenting the share. Core banking is a set of services provided by a group of networked bank branches. Bank
customers may access their funds and perform other simple transactions from any of the member branch offices.
The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases
on the Internet, it is always quite difficult to trust the information on the Internet. It provides technique of
processing the signature of a customer and then dividing it into shares. Total number of shares to be created is
depending on the scheme chosen by the bank. When two shares are created, one is stored in the bank database
and the other is kept by the customer. The customer has to present the share during all of his transactions. This
share is stacked with the first share to get the original signature. The correlation method is used to take the
decision on acceptance or rejection of the output and authenticate the customer.
8. CONCLUSION
An extensive survey of different visual cryptographic and steganographic techniques is presented in this paper.
Many combinations of visual cryptography and steganography are examined up to the latest developments in it.
Traditional visual cryptography specifically deals with sharing a single binary secret between a numbers of
participants. Using visual cryptography with various types of steganography provide double level of security.
ACKNOWLEDGEMENT
Author is thankful to the Mr. M. S. Chaudhari, Head of the Department of Priyadarshini Bhagwati College of
Engineering (CSE), Nagpur, India. His kind support and useful technical discussion during the course of this
work, Thanks are also due to friends and colleagues of my department for their cooperation, fruitful technical
discussion and guidance.
REFERENCES
1] Mrs. D. Murugeswari, Urugeswari, Rugeswari, Kn.Sangeetha, M.Srivani, “ Secure E-pay using text
based stagnos and visual cryptography” International Journal of Engineering Research and General
Science Volume 3, Issue 1, January-February, 2015 ISSN 2091-2730
IJRISE| www.ijrise.org|editor@ijrise.org
International Journal of Research In Science & Engineering
e-ISSN: 2394-8299
p-ISSN: 2394-8280
2] Prof. D. B. Satre, Varad Durugkar, Akshay Ambekar, AmitKumar Yadav, Sudarshan Patil, ‘‘Securing
Online Shopping System Using Visual Cryptography’’, International Journal of Emerging
Technologies and Engineering (IJETE) Volume 2 Issue 1, January 2015, ISSN 2348 – 8050
3] Alathy, Sharmila, Sushmitha, “Privacy Enhanced Online Payment System”, International Journal of
Modern Trends in Engineering and Research (IJMTER), Volume 02, Issue 01, [January - 2015] eISSN: 2349-9745, p-ISSN: 2393-8161
4] S. R. Navale, S. S. Khandagale, Prof. N. K. Chouhan, “S. R. Navale, S. S. Khandagale, Prof. N. K.
Chouhan, “Approach for Secure Onlinetransaction using Visual Cryptography & Text
Steganography”, International Journal of Engineering Research & Technology (IJERT), Vol. 4
Issue 03, March-2015, ISSN: 2278-0181
5] Souvik Roy, P.Venkateswaran, “Online Payment System using Steganography and Visual
Cryptography,” Proceedings of IEEE Students’ Conference on Electrical, Electronics and Computer
Science, 2014.
6] K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating OnlineThreats Using Message
Authentication Image (MAI) Algorithm,”Proceedings of 2012 International Conference on Computing
Sciences(ICCS), pp. 276 – 280, 2012.
7] S. Premkumar, A.E.Narayanan, “New Visual Steganography Scheme for Secure Banking
Application,” Proceeding of 2012 International Conference on Computing, Electronics and Electrical
Technologies (ICCEET), pp. 1013 – 1016, Kumaracoil, India, 2012.
8] Jaya, Siddharth Malik, AbhinavAggarwal, Anjali Sardana, “Novel Authentication System Using Visual
Cryptography,”
Proceedings
of
2011
World
Congress
on
Information
and
CommunicationTechnologies, pp. 1181-1186, Mumbai, India, 2011.
9] S. Suryadevara, R. Naaz, Shweta, S. Kapoor, “Visual cryptography improvises the security of tongue
as a biometric in banking system,”Proceedings of 2011 2nd International Conference on Computer and
Communication Technology (ICCCT), pp. 412 – 415, 2011.
10] Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M Patnaik, “Secure Authentication
using Image Processing and Visual Cryptography for Banking Applications,” Proceedings of 16 th
International Conference on Advanced Computing and Communications, pp. 65-72, Chennai, India,
2008.
IJRISE| www.ijrise.org|editor@ijrise.org
Download