Combine Use of Steganography and Visual Cryptography for Online Payment System
|
|
|
- Christian James
- 10 years ago
- Views:
Transcription
1 Combine Use of Steganography and Visual Cryptography for Online Payment System V. Lokeswara Reddy, PhD Associate Professor Department of CSE KSRM College of Engineering Kadapa, YSR District. AP (INDIA) T. Anusha Post Graduation Student Department of CSE KSRM College of Engineering Kadapa, YSR District. AP (INDIA) ABSTRACT A rapid growth in the E - Commerce market is seen in recent time in the whole extent of the world. With ever increasing popularity of online shopping, Debit/Credit card fraud and personal information security are major concerns for clients, Merchandiser and depository financial institution specifically in the case of CNP (Card Not Present). This paper presents a novel approach for providing limited information that is necessary for fund transfer during online shopping thereby safeguarding customer data and increasing customer confidence and preventing identity stealing. This method uses combined application of Steganography and visual cryptography for this purpose. Keywords Steganography, InformationSecurity, Visual-Cryptograhy, Online-payment. 1. INTRODUCTION Online shopping is the recovery of product data by way of the internet and go-forth of purchase club to completion of electronic purchase asking, sating of credit or debit card data/info conveyance of ware by mail order or homedelivery by courier. Persisting entity theft and phishing are the usual dangers of online-shopping. Persisting entity thefts is the thievery of someone s persisting entity in the form of personal info/data for inducing purchase and used for wrong through that information for inducing purchase and spreading of bank accounts or setting Credit-Cards. Phishing is a malefactor mechanism that hires both social consumers/clients personal and individual data/info and financial account facts. Secure Social Layer (SSL) encryption forbids the taping of consumer information in transit between the consumer/client and the online merchandiser. In this paper, a new method is proposed, that applies text based Steganography and visual cryptography, which derogates information dealing between consumer/client and online merchant but enable successful fund transfer from consumer s account. 1.1 Text based Steganography In text Steganography, message can be hidden by shifting word and line, in open spaces, in word succession. Attributes of a conviction such as number of phrases, number of characters, num of vowels, location of vowels in a word are also used to hide private message. The advantage of choosing text Steganography over other Steganography techniques is its smaller memory requirement and simpler communication. 1.2 Visual Cryptography Visual Cryptography (VC), proposed by Naor, is a cryptographic technique based on visual secret sharing used for image encryption. Using k out of n (k, n) visual secret sharing scheme a secret image is encrypted in shares which are meaningless images that can be transmitted or distributed over an untrusted communication groove. Only blending the k shares or more give the original secret image. 2. PROPOSED SYSTEM In the proposed solution, information submitted by the customer to the online merchant is minimized by providing only minimum information that will only verify the payment made by the said customer from its bank account. This is attained by the unveiling of a central Certified Authority (CA) and combined application of Steganography and visual cryptography. The information obtained by the merchant can be in the form of account number related to the card used for shopping. The information will only formalize receipt of payment from authentic customer. fig 1 shows proposed payment system. Fig 1: proposed payment method 2.1 Advantage 1. Proposed method minimizes customer information sent TRANSFER OF FUND to the online merchant. 2. So in case of a breach in merchant s database, customer doesn t get involved. 3. It also forbids unlawful use of customer information at merchant s side. 7
2 4. Presence of a fourth party, CA, enhances customer s atonement and security further as number of parties are involved in the process. 5. Usage of Steganography ensures that the CA does not know the customer authentication password thus maintaining customer privacy. 6. Cover text can be sent in the form of from CA to bank to avoid rising suspicion. Since customer data is circulated over 3 parties, a breach in single database can easily be contented. 3. RELATED WORK A short measurement of related work in the area of banking security based on online shopping by combine use of Steganography and visual cryptography proposes this methods to eradicate the frauds through text based Steganography hiding data rather than using properties of sentences and each letter is assigned to a num in the range of (0-15) Number assigned in range (N0.99) % to (N0.3) % and (N0.2) % to (N0.01) % is same where N is any integer from 0 to 11. Table 1:Number assignment Letter Number assigned Letter Number assigned E 15 M 7 A 14 H 7 R 13 G 6 I 13 B 5 O 12 F 4 T 11 Y 4 N 11 W 3 S 10 K 3 L 10 V 3 C 9 X 2 U 8 Z 2 D 8 J 1 P 7 Q 0 The above table 1 shows the number assigned to a letter. 3.1 Encoding In this process, Steganography uses characteristics of English language such as inflexion, fixed word order and use of circumlation for hiding data rather than using properties of a conviction. This gives manipulable and freedom from the point view of sentence construction but it increases computational complexity Text encoding process Input: Text file Output: secret key image shares Step 1: Representation of each letter in secret message by its equivalent ASCII code. Step 2: Convert ASCII code into equivalent 8 bit binary number. Step 3: Divide 8 bit binary number into two 4 bit parts. Step 3.1.1: Choose the desirable letters from table 1 corresponding to the 4 bit parts. Step 3.1.2: Meaningful sentence construction by using letters obtained as the first letters of suitable words. Step 4: Converted sentence can be generated as secret key image. Step 5: Secret key image can be divide two portions/shares are obtained in jpg form Transaction in online shopping: In this module traditional online shopping consumer selects items from online shopping portal and then is directed to the defrayal foliate. Online merchandiser may have its own payment arrangement or can take action of third party payment systems such as Pay-Pal, pay-onlinesystem, WebMoney and others. In the claiming portal node/user submit his or her credit or debit card details such as credit or debit card numerals, mention on the card, termination date of the card Customer Authentication: Customer unique authentication password in connection to the bank is hidden inside a cover text using the text based Steganography method. Customer authentication information (account no) in connection with merchant is placed above the cover text in its master form. Now a informal photograph of two texts is taken. From the informal photograph image, two portions/plowshares are generated using visual cryptanalysis. Now one portion/plowshare is kept by the customer and the other portion/plowshare is kept in the database of the certified authority Certification Authority Access During shopping online, after selection of desired item and adding it to the go-cart, opted defrayal system of the merchandiser directs the customer/node to the Certified Authority imposing entarnce. In the imposing entrance, shopper accedes its own portion/plowshare and merchandiser takes its own record details. Now the CA unites its own portion/plowshare with shopper s plowshare and obtains the master image. From CA now, merchandiser record details, screen text are sent to the bank where customer authentication password is recovered from the cover text Decoding Paces for decoding: Input: Two secret key images/shares Output: Original secret key image Step 1: First letter in each word of cover message is taken and represented by corresponding 4 bit number. Step 2: 4 bit binary numbers of combined to obtain 8 bit number. Step 3: ASCII codes are obtained from 8 bit numbers. Step 4: Finally, secret message is recovered from ASCII codes. Step 5: Secret key image can be restored. 8
3 Customer authentication information is sent to the merchant by CA. Upon obtaining client/node authentication phrase known only to a restricted group, bank matches it with its posses records and after sustaining authorized client/node, transmits fund from the client/node record to the stated merchandiser account. Fig 2:cover image 3.4 Method extension The payment system can also be extended to physical banking. Shares may contain customer image or signature in addition to customer/client certification password. In the bank, customer submits its own share and customer physical signature is validated against the signature obtained by combining customer s share and CA s share along with validation of customer certification password. It forbids pervert of stolen. 4. EXPERIMENTAL WORK When the scheme is executed the GUI(Graphically based User Interface) is displayed. The snapshot of the main window is shown in below figure 3.It shows the bank registration for secret key generation. Fig 4: secret key generation The secrete key obtained is utilized in the online transaction for secure transmission.below fig 5 shows in the transaction one secret key image is inserted by the client/customer, the other is inserted by the certified author which was stored in the bank while registration. Fig 3: Bank registration form By the above snapshot banking registration the below window can be displayed with secret key generation and that secret key can be divided into two shareswhich was shown in the below fig 4.It generates the secret key images. Fig 5: money transfer in online shopping The proposed method applied on different key images with its results is shown below. Case 1: key extraction for client l 1. Transaction of client/customer named and transaction is completed. 9
4 2. Transaction of customer/client named sai and transaction not completed Secret key image1 Shows when transaction complete. 2. Transaction of customer/client named anu when transaction not completed. Shows when transaction not completed. Case 2: Key extraction for client 2 1. Transaction of client/customer named sai and transaction is successful. Shows when transaction is completed Shows when transaction not completed. 5. CONCLUSION In this paper, we propsed a payment system for online shopping by combining text based Steganography and visual cryptography that provides customer data privacy and prevents misuse of data at merchandiser s side. The computing is implicating only with prevention of identity theft and customer data security. In likening to other banking application which uses Steganography and visual cryptography are basically applied for the physical banking, the proposed method can be applied for the E- Commerce with focus area on payment during online shopping as well as physical banking. 6. REFERENCES [1] Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shoppingonline," Proceedings of 2011 International Conference on Electronic and Mechanical Engineering and Information Technology (EMEIT), vol. 9, pp , Javelin Strategy & Research, 2013 Identify FraudReport, [2] Walter Bender, Daniel Gruhl, Norishige Morimoto, A. Lu, Techniques for Data Hiding, IBM Systems Journal, Vol.35, Nos. 3 & 4, pp , [3] M. Naor nd A. Shamir, Visual cryptography, Advances in Cryptograhy: EUROCRYPT 94, LNCS, vol. 950, pp. 1 12, [4] 4.Chetana Hegde, S. Manu, P. Deepa Shenoy, K.R.Venugopal,L M Patnaik, Secure Authentication using Image Processing and Visual Cryptography for Banking Applications, Proceedings of 16 th International Conference on Advanced Computing and Communications. [5] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, Novel Authentication System Using Visual Cryptography, Proceedings of 2011 World Congress on Information and Communication Technologies. 10
5 [6] C. Pautasso, T. Heinis, and G. Alonso, Autonomic resource provisioning for software business processes, Information and Software Technology. [7] A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler,H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef, Web services on demand: Wsla-driven automated management, IBM Syst. J., vol. 43, no. 1, pp , [8] M. Wang and T. Suda, The bio-networking architecture: a biologically inspired approach to the design of scalable, adaptive, and survivable/available network applications, in Proc. of the IEEE Symposium on Applications and the Internet. [9] N. Laranjeiro and M. Vieira, Towards fault tolerance in web services compositions, in Proc. of the workshop on engineering fault tolerant systems. 7. AUTHOR PROFILE Dr. V. Lokeswara Reddy did his Ph. D in Computer Science and Engineering from JNTUA, Ananthapuramu in the year He did his M. Tech (CSE) from SRM University, Chennai in the year He did his M.C.A from S.V. University, Tirupati in the year He has a total of 13 years of experience in teaching. Currently he is working as Associate Professor at K.S.R.M College of Engineering, Kadapa. He has presented 9 papers in International, National Conferences and published 13 papers in International journals. T.Anusha did her B.Tech (CSE) from JNTUA, Anantapuramu in the year She is pursuing her M.Tech (CSE) from JNTUA Anantapuramu, Andrapradesh. She is currently doing her M.Tech in K.S.R.M College of Engineering, Kadapa. IJCA TM : 11
Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods
Online Secure E-Pay Fraud Detection in E-Commerce System Using Visual Cryptographic Methods M. Suresh, Bullarao Domathoti, Nageswara Rao Putta Pursuing M. Tech, Dept. of CSE., SITS, JNT University, Aanthapur,
Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling
Implementation of a Prototype for Secure Online Payment System Using Discrete Cosine Transformation and Permutative Straddling GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme
www.ijcsi.org 182 Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme Harinandan Tunga 1 and Soumen Mukherjee 2 1 Department
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME
CRYPTANALYSIS OF A MORE EFFICIENT AND SECURE DYNAMIC ID-BASED REMOTE USER AUTHENTICATION SCHEME Mohammed Aijaz Ahmed 1, D. Rajya Lakshmi 2 and Sayed Abdul Sattar 3 1 Department of Computer Science and
A Secure Model for Cloud Computing Based Storage and Retrieval
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 6, Issue 1 (Sep-Oct. 2012), PP 01-05 A Secure Model for Cloud Computing Based Storage and Retrieval Yaga Reddemma
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY
HYBRID ENCRYPTION FOR CLOUD DATABASE SECURITY Amanjot Kaur 1, Manisha Bhardwaj 2 1 MTech Student, Computer Science Department, LPU, Jalandhar, Punjab, India, [email protected] 2 Assistant Professor,
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER
SECURITY ANALYSIS OF PASSWORD BASED MUTUAL AUTHENTICATION METHOD FOR REMOTE USER Mrs. P.Venkateswari Assistant Professor / CSE Erode Sengunthar Engineering College, Thudupathi ABSTRACT Nowadays Communication
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK
International Journal of Advance Research In Science And Engineering IJARSE, Vol. No.4, Issue No.01, January 2015 http:// SECURE RE-ENCRYPTION IN UNRELIABLE CLOUD USINGSYNCHRONOUS CLOCK Arudra Gopala Rao
MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS
INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND SCIENCE MANAGING OF AUTHENTICATING PASSWORD BY MEANS OF NUMEROUS SERVERS Kanchupati Kondaiah 1, B.Sudhakar 2 1 M.Tech Student, Dept of CSE,
A Layered Signcryption Model for Secure Cloud System Communication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.1086
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Enhanced Model of SQL Injection Detecting and Prevention
Enhanced Model of SQL Injection Detecting and Prevention Srinivas Baggam, Assistant Professor, Department of Computer Science and Engineering, MVGR College of Engineering, Vizianagaram, India. [email protected]
EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control
On-line Payment and Security of E-commerce
ISBN 978-952-5726-00-8 (Print), 978-952-5726-01-5 (CD-ROM) Proceedings of the 2009 International Symposium on Web Information Systems and Applications (WISA 09) Nanchang, P. R. China, May 22-24, 2009,
IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD ENVIRONMENT
IJRRECS/November 2014/Volume-2/Issue-11/3699-3703 ISSN 2321-5461 INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE IMPLEMENTATION OF RESPONSIBLE DATA STORAGE IN CONSISTENT CLOUD
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
A secure email login system using virtual password
A secure email login system using virtual password Bhavin Tanti 1,Nishant Doshi 2 1 9seriesSoftwares, Ahmedabad,Gujarat,India 1 {[email protected]} 2 SVNIT, Surat,Gujarat,India 2 {[email protected]}
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud
Analysis on Secure Data sharing using ELGamal s Cryptosystem in Cloud M.Jayanthi, Assistant Professor, Hod of MCA.E mail: [email protected] MahatmaGandhi University,Nalgonda, INDIA. B.Ranganatha
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES
A MELIORATED APPROACH TO TEXT STEGANOGRAPHY USING MARKUP LANGUAGES AND AES K.Ramesh 1, P.Manivannan 2 1,2 Assistant Professor, Department of Information Technology, V.R.S. College of Engineering & Technology,
A multi-layered approach to payment card security.
A multi-layered approach to payment card security. CARD-NOT-PRESENT 1 A recent research study revealed that Visa cards are the most widely used payment method at Canadian websites, on the phone, or through
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm
Secure Collaborative Privacy In Cloud Data With Advanced Symmetric Key Block Algorithm Twinkle Graf.F 1, Mrs.Prema.P 2 1 (M.E- CSE, Dhanalakshmi College of Engineering, Chennai, India) 2 (Asst. Professor
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES
WIRELESS PUBLIC KEY INFRASTRUCTURE FOR MOBILE PHONES Balachandra Muniyal 1 Krishna Prakash 2 Shashank Sharma 3 1 Dept. of Information and Communication Technology, Manipal Institute of Technology, Manipal
Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Three Layered
Analysis of E-Commerce Security Protocols SSL and SET
Analysis of E-Commerce Security Protocols SSL and SET Neetu Kawatra, Vijay Kumar Dept. of Computer Science Guru Nanak Khalsa College Karnal India ABSTRACT Today is the era of information technology. E-commerce
Proof of Retrivability: A Third Party Auditor Using Cloud Computing
Proof of Retrivability: A Third Party Auditor Using Cloud Computing Vijayaraghavan U 1, Madonna Arieth R 2, Geethanjali K 3 1,2 Asst. Professor, Dept of CSE, RVS College of Engineering& Technology, Pondicherry
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD
MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
A Security Integrated Data Storage Model for Cloud Environment
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle
DOI 10.4010/2014.282 ISSN-2321-3361 2014 IJESC Research Article Preventing Identity Theft using Shift Key mechanism and QR Code with Sudoku Puzzle R.Saisrikanth Department of Computer Science and Engineering
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Dynamic Query Updation for User Authentication in cloud Environment
Dynamic Query Updation for User Authentication in cloud Environment Gaurav Shrivastava 1, Dr. S. Prabakaran 2 1 Research Scholar, Department of Computer Science, SRM University, Kattankulathur, Tamilnadu,
Secure Authentication of Distributed Networks by Single Sign-On Mechanism
Secure Authentication of Distributed Networks by Single Sign-On Mechanism Swati Sinha 1, Prof. Sheerin Zadoo 2 P.G.Student, Department of Computer Application, TOCE, Bangalore, Karnataka, India 1 Asst.Professor,
Keywords-- Cloud computing, Encryption, Data integrity, Third Party Auditor (TPA), RC5 Algorithm, privacypreserving,
Volume 3, Issue 11, November 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Third Party
The need for a secure & trusted payment instrument in e-commerce. Ali AlMeshal
The need for a secure & trusted payment instrument in e-commerce Ali AlMeshal In Physical/Real World Hand over card Visual check Swipe in POS Online authorization Receipt with signature panel Sign or Pin
Towards Securing E-Banking by an Integrated Service Model Utilizing Mobile Confirmation
Research Inventy: International Journal of Engineering And Science Vol.4, Issue 9 (Sept 2014), PP 26-30 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com Towards Securing E-Banking by an
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
An Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method
An Efficient and Light weight Secure Framework for Applications of Cloud Environment using Identity Encryption Method E.Sathiyamoorthy 1, S.S.Manivannan 2 1&2 School of Information Technology and Engineering
Network Security - ISA 656 Email Security
Network Security - ISA 656 Angelos Stavrou November 13, 2007 The Usual Questions The Usual Questions Assets What are we trying to protect? Against whom? 2 / 33 Assets The Usual Questions Assets Confidentiality
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Understanding and Integrating KODAK Picture Authentication Cameras
Understanding and Integrating KODAK Picture Authentication Cameras Introduction Anyone familiar with imaging software such as ADOBE PHOTOSHOP can appreciate how easy it is manipulate digital still images.
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Professional Ethics for Computer Science
Professional Ethics for Computer Science Chapter 4: Privacy Jie Gao Computer Science Department Stony Brook University Privacy Issues Internet privacy consists of privacy over the media of the Internet:
Savitribai Phule Pune University
Savitribai Phule Pune University Centre for Information and Network Security Course: Introduction to Cyber Security / Information Security Module : Pre-requisites in Information and Network Security Chapter
SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE
International Journal of Computer Network and Security(IJCNS) Vol 7. No.1 2015 Pp. 1-8 gopalax Journals, Singapore available at : www.ijcns.com ISSN: 0975-8283 ----------------------------------------------------------------------------------------------------------------------------------------------------------
Pretty Good Privacy (PGP)
Pretty Good Privacy (PGP) Contents...1 Abstract...2 Introduction...3 The importance of the cryptography...4 The idea about how (PGP) works...5 Legal issues surrounding (PGP)...6 The implementation and
Shop Online with Confidence
Shop Online with Confidence Table of Contents Introduction 3 Benefits and Drawbacks of Online Shopping Benefits Drawbacks 5 6 Tips for Safe Online Shopping Before You Buy When Making a Purchase After Your
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions
Understanding Digital Certificates & Secure Sockets Layer (SSL): A Fundamental Requirement for Internet Transactions February 2005 All rights reserved. Page i Entrust is a registered trademark of Entrust,
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
WHY YOU NEED AN SSL CERTIFICATE
GO DADDY TECHNICAL BRIEF ecommerce SECURITY WHY YOU NEED AN SSL CERTIFICATE In the world of electronic commerce, security is paramount. Although Web sales are on the rise, widespread fears about sending
WHITE PAPER. The latest advancements in SSL technology
The latest advancements in SSL technology CONTENTS + Introduction 3 + SSL overview 3 + Server Gated Cryptography (SGC): 4 Enabling strong encryption for the most site visitors + Extended Validation SSL
University Policy Accepting Credit Cards to Conduct University Business
BROWN UNIVERSITY University Policy Accepting Credit Cards to Conduct University Business Purpose Brown University requires all departments that are involved with credit card handling to do so in compliance
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle
CRYPTOGRAPHY Secure E-Commerce: Understanding the Public Key Cryptography Jigsaw Puzzle Viswanathan Kodaganallur, Ph.D. Today almost all organizations use the Internet extensively for both intra- and inter-organizational
STRONGER ONLINE SECURITY
STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Authentication in Online Banking Systems through Quantum Cryptography
Authentication in Online Banking Systems through Quantum Cryptography Anand Sharma 1, S.K.Lenka 2 FET, MITS, Lakshmangarh Sikar, Rajasthan, India 1 [email protected], 2 [email protected]
Security in Electronic Payment Systems
Security in Electronic Payment Systems Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler Institute for Theoretical Computer Science, ETH Zurich, CH-8092 Zurich e-mail: {camenisch, stadler}@inf.ethz.ch
Electronic Commerce and E-wallet
International Journal of Recent Research and Review, Vol. I, March 2012 Electronic Commerce and E-wallet Abhay Upadhayaya Department of ABST,University of Rajasthan,Jaipur, India Email: [email protected]
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card
Application of Automatic Variable Password Technique in Das s Remote System Authentication Scheme Using Smart Card C. Koner, Member, IACSIT, C. T. Bhunia, Sr. Member, IEEE and U. Maulik, Sr. Member, IEEE
Technical Analysis Document
Technical Architecture Technical Analysis Document The table below shows the various possibilities that sonic sounds have to host their e-commerce site on. The hosting type is described and then advantages
Research Article. Research of network payment system based on multi-factor authentication
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):437-441 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research of network payment system based on multi-factor
Evaluate the Usability of Security Audits in Electronic Commerce
Evaluate the Usability of Security Audits in Electronic Commerce K.A.D.C.P Kahandawaarachchi, M.C Adipola, D.Y.S Mahagederawatte and P Hewamallikage 3 rd Year Information Systems Undergraduates Sri Lanka
Content Teaching Academy at James Madison University
Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems
The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler [email protected] Mentor: Professor Chris Gregg Abstract Modern day authentication systems
Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn
Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to
Email Spam Detection Using Customized SimHash Function
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful.
With the Target breach on everyone s mind, you may find these Customer Service Q & A s helpful. Breach Overview Q: Media reports are stating that Target experienced a data breach. Can you provide more
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Two-Factor Authentication
Chen Arbel Vice President, Strategic Development Authentication Unit & Software DRM Aladdin Knowledge Systems Two-Factor Authentication The key to compliance for secure online banking Legal Notice Copyright
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
