Secured Transaction Using Steganography and Visual Cryptography

Authors(2) :-Vishal Yadav, Dr. J. N. Shinde

The utilization of Internet saving money has developed by a wide margin in light of its machine. The security and Information secrecy is one of the wealthiest attacks to the clients of Online Banking Systems. The issue with Online saving money applications is that they have to send the secret substance, for example, Personal Identification Number (PIN), One Time Password (OTP) to the focusing on clients as plaintext, which is shaky. The dissolvable to the above results requires a product application that holds capable encryption methods. To improve the security of the substance that is transmitted over the web, the proposed method present a Dual Enciphering Instrument (DEM) which in clues more than one cryptographic scheme for figure content creation, which guarantees the secured transmission over the system condition and the application is created in Java dialect as a secured double enciphering intrigue (SDEI). In this designated overture e the private managing an account substance, for example, individual recognizable proof number (PIN) is enciphered utilizing Huffmann pressure system, which thusly subjected to symmetric encryption system and the key for the pressure conspire is taken as image, which is at that point transmitted as picture shares utilizing the thought of visual cryptography. The substance at the collector end is submitted to unravelling process, which the symmetric crypto needs conspire key to get the middle code, which thus requires the image, offers to recover the first plain content. Henceforth through the proposed conspire the security issues, for example, 'compromise assaults' and 'mysterious hacking' would be lessened and from the trial comes about it is distinguished that the proposed is known as enciphering or encryption and the disjointed configuration is said to be as figure content or figures.

Authors and Affiliations

Vishal Yadav
Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Savitribai Phule Pune University, Pune, India
Dr. J. N. Shinde
Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Savitribai Phule Pune University, Pune, India

Internet Banking, Huffmann Coding, Decryption, Double Encryption, Visual Cryptography

  1. Chaum D. and Antwerpen van H., "Undeniable signature," Advances in Cryptology- CRYPTO'90, Springer-Verlag, 1990, pp. 2 12-2 16.
  2. Delfs H. and Knebl H., Introduction to Cryptography: Principles and Applications, Springer, 2002.
  3. Diffie W. and Hellman M., "New directions in cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
  4. EsraSatir, HakanIsik "A Huffman compression based text steganography method," Multimed Tools Appl Springer Science 20 12.
  5. Hongjun Liu, Xingyuan Wang, "Triple-image encryption scheme based on one-time key stream generated by chaos and plain images," The Journal of Systems and Software 86 (2013) pp. 826- 834
  6. "Hybrid Steganography using Visual Cryptography and LSB Encryption Method " Gokul.M Final Year - M.Tech - CVIP Amrita VishwaVidhyapeetham University Coimbatore Umeshbabu R Final Year - M.Tech - CVIP Amrita VishwaVidhyapeetham University Coimbatore, International Journal of Computer Applications (0975 - 8887) Volume 59 No.14, December 2012
  7. Narpat Singh Shekhawat, Durga Prasad Sharma, "Cloud Computing Security through Cryptography for Banking Sector",Proceedings of the 5th National Conference; INDIACom-20 11.
  8. Askari, H.M. Heys, and C.R. Moloney "An Extended Visual Cryptography Scheme Without Pixel Expansion For Halftone Images" 2013 26th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE).
  9. Schoenmakers B., "A simple publicly verifiable secret sharing scheme and its application to electronic voting," Advances in Cryptology - CRYPTO'99, SpringerVerlag, 1999, pp. 148-164.
  10. Souvik Roy and P. Venkateswaran ,"IEEE Online Payment System using Steganography and Visual Cryptography" 2014 IEEE.

Publication Details

Published in : Volume 2 | Issue 6 | November-December 2017
Date of Publication : 2017-12-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 759-762
Manuscript Number : CSEIT1726222
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Vishal Yadav, Dr. J. N. Shinde, "Secured Transaction Using Steganography and Visual Cryptography ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.759-762, November-December-2017.
Journal URL :

Article Preview