{"title":"Secure E-Pay System Using Steganography and Visual Cryptography","authors":"K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi","volume":127,"journal":"International Journal of Mathematical and Computational Sciences","pagesStart":296,"pagesEnd":300,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10007822","abstract":"
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.<\/p>\r\n","references":"[1]\tAnandhi and S. Sathiyaraj, \u201cEmbedded Visual Cryptography Schemes for Secret Images\u201d International Journal of Computer Science and Network Security (IJCSNS) Volume.12 \u2013 No.12, December 2012, Page 153-158.\r\n[2]\tSouvik Roy and P. Venkateswaran 2014 \u201cOnline Payment System using Steganography and Visual Cryptography\u201d IEEE Students Conference on Electrical, Electronics and Computer Science 978-1-4799-2526-1\/14\/$31.00 \u00a92014.\r\n[3]\tD. B. Satre, Varad Durugkar, Akshay Ambekar, Amit Kumar Yadav, Sudarshan Patil \u201cSecuring Online Shopping System Using Visual Cryptography\u201dInternational Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 1, January 2015, ISSN 2348 \u2013 8050.\r\n[4]\tB. Srikanth, G. Padmaja, Syed Khasim, P. V. S.Lakshmi, A. Haritha \u201cSecured Bank Authentication using Image Processing and Visual Cryptography\u201d International Journal of Computer Applications (0975 \u2013 8887) Volume 124 \u2013 No.6, August 2015.\r\n[5]\tV. Lokeswara Reddy, T. Anusha \u201cCombine Use of Steganography and Visual Cryptography for Online Payment System\u201d International Journal of Computer Applications (0975 \u2013 8887) Volume 124 \u2013 No.6, August 2015.\r\n[6]\tMahsuna Abdul Sathar, Nimya, Shana, Vipin Goutham, Geethu Bastian. \u201cSecured E-Payment System Using Image Steganography and Visual Cryptography\u201d International Journal of Computer Trends and Technology (IJCTT) \u2013 volume 28 Number 4 \u2013 October 2015 ISSN: 2231-2803 http:\/\/www.ijcttjournal.org Page 189.\r\n[7]\tNavjot Kumar, Ashima Bansal, \u201cA Review on Digital Image Steganography\u201d International Journal of Computer Science and Information Technologies (IJCSIT), Volume 5 \u2013 No.6, 2014, 8135-8137.\r\n[8]\tK. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan, R. J. Qureshi, \u201cA Secure cyclic Steganographic Technique for color images using Randomization\u201d Technical Journal, University of Engineering and Technology Taxila, Volume 19 \u2013 No.III, 2014, 57-64.\r\n[9]\thttps:\/\/sites.google.com\/site\/cs534steganographyproject\/home\/matlab-code-and-examples.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 127, 2017"}