Secured Transaction Using Steganography and Visual Cryptography

Authors

  • Vishal Yadav  Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Savitribai Phule Pune University, Pune, India
  • Dr. J. N. Shinde  Department of Computer Engineering, Al-Ameen College of Engineering, Koregaon Bhima, Savitribai Phule Pune University, Pune, India

Keywords:

Internet Banking, Huffmann Coding, Decryption, Double Encryption, Visual Cryptography

Abstract

The utilization of Internet saving money has developed by a wide margin in light of its machine. The security and Information secrecy is one of the wealthiest attacks to the clients of Online Banking Systems. The issue with Online saving money applications is that they have to send the secret substance, for example, Personal Identification Number (PIN), One Time Password (OTP) to the focusing on clients as plaintext, which is shaky. The dissolvable to the above results requires a product application that holds capable encryption methods. To improve the security of the substance that is transmitted over the web, the proposed method present a Dual Enciphering Instrument (DEM) which in clues more than one cryptographic scheme for figure content creation, which guarantees the secured transmission over the system condition and the application is created in Java dialect as a secured double enciphering intrigue (SDEI). In this designated overture e the private managing an account substance, for example, individual recognizable proof number (PIN) is enciphered utilizing Huffmann pressure system, which thusly subjected to symmetric encryption system and the key for the pressure conspire is taken as image, which is at that point transmitted as picture shares utilizing the thought of visual cryptography. The substance at the collector end is submitted to unravelling process, which the symmetric crypto needs conspire key to get the middle code, which thus requires the image, offers to recover the first plain content. Henceforth through the proposed conspire the security issues, for example, 'compromise assaults' and 'mysterious hacking' would be lessened and from the trial comes about it is distinguished that the proposed is known as enciphering or encryption and the disjointed configuration is said to be as figure content or figures.

References

  1. Chaum D. and Antwerpen van H., "Undeniable signature," Advances in Cryptology- CRYPTO'90, Springer-Verlag, 1990, pp. 2 12-2 16.
  2. Delfs H. and Knebl H., Introduction to Cryptography: Principles and Applications, Springer, 2002.
  3. Diffie W. and Hellman M., "New directions in cryptography," IEEE Transactions on Information Theory, Vol. IT-22, No. 6, 1976, pp. 644-654.
  4. EsraSatir, HakanIsik "A Huffman compression based text steganography method," Multimed Tools Appl Springer Science 20 12.
  5. Hongjun Liu, Xingyuan Wang, "Triple-image encryption scheme based on one-time key stream generated by chaos and plain images," The Journal of Systems and Software 86 (2013) pp. 826- 834
  6. "Hybrid Steganography using Visual Cryptography and LSB Encryption Method " Gokul.M Final Year - M.Tech - CVIP Amrita VishwaVidhyapeetham University Coimbatore Umeshbabu R Final Year - M.Tech - CVIP Amrita VishwaVidhyapeetham University Coimbatore, International Journal of Computer Applications (0975 - 8887) Volume 59 No.14, December 2012
  7. Narpat Singh Shekhawat, Durga Prasad Sharma, "Cloud Computing Security through Cryptography for Banking Sector",Proceedings of the 5th National Conference; INDIACom-20 11.
  8. Askari, H.M. Heys, and C.R. Moloney "An Extended Visual Cryptography Scheme Without Pixel Expansion For Halftone Images" 2013 26th IEEE Canadian Conference Of Electrical And Computer Engineering (CCECE).
  9. Schoenmakers B., "A simple publicly verifiable secret sharing scheme and its application to electronic voting," Advances in Cryptology - CRYPTO'99, SpringerVerlag, 1999, pp. 148-164.
  10. Souvik Roy and P. Venkateswaran ,"IEEE Online Payment System using Steganography and Visual Cryptography" 2014 IEEE.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
Vishal Yadav, Dr. J. N. Shinde, " Secured Transaction Using Steganography and Visual Cryptography , IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.759-762, November-December-2017.