Student Seminar Report & Project Report With Presentation (PPT,PDF,DOC,ZIP)

Full Version: source code of online payment system using steganography and visual cryptography
You're currently viewing a stripped down version of our content. View the full version with proper formatting.

Guest

Please give me the page link to source code of online payment system using steganography and visual cryptography
source code of online payment system using steganography and visual cryptography

Abstract
This paper presents a new approach for providing limited information only that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity theft. A cryptographic technique based on visual secret sharing used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret image is encrypted in shares which are meaningless images that can be transmitted or distributed over an un trusted communication channel. Only combining the k shares or more give the original secret image. Phishing is an attempt by an individual or a group to thieve personal confidential information such as passwords, credit card information etc from unsuspecting victims for identity theft, financial gain and other fraudulent activities The use of images is explored to preserve the privacy of image captcha by decomposing the original image captcha into two shares that are stored in separate database servers such that the original image captcha can be revealed only when both are simultaneously available; the individual sheet images do not reveal the identity of the original image captcha. Once the original image captcha is revealed to the user it can be used as the password. Several solutions have been proposed to tackle phishing.

Existing system:-

The existing system supports with only one type of image format only. For example, if it is .jpg, then it supports only that same kind of image format only.
The existing system does not provide a friendly environment to encrypt or decrypt the data (images).
The existing visual cryptography schemes that are used for data hiding have a security hole in the encrypted Share file.
Here an image based authentication using Visual Cryptography is implemented.
Disadvantages:

Does not provide a friendly environment to encrypt or decrypt the data (images).
Supports with only one type of image format only. For example, if it is .jpg, then it supports only that same kind of image format only.
The most critical measurements to evaluate the effectiveness of a VCS.
Proposed System:

Proposed System,Visual Cryptography (VC), technique based on visual secret sharing used for image encryption.
Secure Socket Layer (SSL) encryption prevents the interception of consumer information in transit between the consumer and the online merchant.
In this paper, a new method is proposed, that uses text based steganography and visual cryptography, which minimizes information sharing between consumer and online merchant.
VCS is a cryptographic technique that allows for the encryption of visual information such that decryption can be performed using the human visual system.
For phishing detection and prevention, we are proposing a new methodology to detect the phishing website.
Our methodology is based on the Anti-Phishing Image Captcha validation scheme using visual cryptography. It prevents password and other confidential information from the phishing websites.
Cryptographic techniqueSad2, 2)- Threshold VCS scheme,(n, n) -Threshold VCS scheme, (k, n) Threshold VCS scheme are used in this proposed system.
Advantages:

Our methodology is based on the Anti-Phishing Image Captcha validation scheme using visual cryptography.
It prevents password and other confidential information from the phishing websites.
For phishing detection and prevention, we are proposing a new methodology to detect the phishing website.

Guest

Please give me the page link to source code of online payment system using steganography and visual cryptography
In recent times there is a rapid growth in the ECommerce market. The main concerns of customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats to online shopping. Phishing is a method of stealing personal confidential information such as username, passwords, victim credit card details. It is a social engineering technique used to deceive users. In this article we propose a new method that uses text - based steganography and visual cryptography. It represents a new approach that will provide limited information for the transfer of funds.

Online shopping also called as e-tail is a way to buy products through the Internet. It allows customers to purchase goods or services using web browsers and filling in credit or debit card information. In online shopping, the most common threats are identity theft and identity theft. Identity theft is a way to steal someone's identity, that is, personal information in which someone pretends to be someone else. The person abusively uses personal information to buy or open bank accounts and to arrange credit cards. As a result of identity theft, customer information was misused for an average of 48 days in 2012. Phishing is a method of stealing personal confidential information such as username, passwords, victim credit card details . It is a criminal mechanism that uses social engineering. Phishing email directs users to visit the website where they take personal information from users, such as bank account number, password. This is email fraud for identity theft. In 2013, the financial service and retail, payment service are the targeted industrial sectors of phishing attacks.



It can be understood in the following video: