Secure E-Pay System Using Steganography and Visual Cryptography
Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi
Abstract:
Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.
Keywords: Image security, random LSB, steganography, visual cryptography.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1132006
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1385References:
[1] Anandhi and S. Sathiyaraj, “Embedded Visual Cryptography Schemes for Secret Images” International Journal of Computer Science and Network Security (IJCSNS) Volume.12 – No.12, December 2012, Page 153-158.
[2] Souvik Roy and P. Venkateswaran 2014 “Online Payment System using Steganography and Visual Cryptography” IEEE Students Conference on Electrical, Electronics and Computer Science 978-1-4799-2526-1/14/$31.00 ©2014.
[3] D. B. Satre, Varad Durugkar, Akshay Ambekar, Amit Kumar Yadav, Sudarshan Patil “Securing Online Shopping System Using Visual Cryptography”International Journal of Emerging Technologies and Engineering (IJETE) Volume 2 Issue 1, January 2015, ISSN 2348 – 8050.
[4] B. Srikanth, G. Padmaja, Syed Khasim, P. V. S.Lakshmi, A. Haritha “Secured Bank Authentication using Image Processing and Visual Cryptography” International Journal of Computer Applications (0975 – 8887) Volume 124 – No.6, August 2015.
[5] V. Lokeswara Reddy, T. Anusha “Combine Use of Steganography and Visual Cryptography for Online Payment System” International Journal of Computer Applications (0975 – 8887) Volume 124 – No.6, August 2015.
[6] Mahsuna Abdul Sathar, Nimya, Shana, Vipin Goutham, Geethu Bastian. “Secured E-Payment System Using Image Steganography and Visual Cryptography” International Journal of Computer Trends and Technology (IJCTT) – volume 28 Number 4 – October 2015 ISSN: 2231-2803 http://www.ijcttjournal.org Page 189.
[7] Navjot Kumar, Ashima Bansal, “A Review on Digital Image Steganography” International Journal of Computer Science and Information Technologies (IJCSIT), Volume 5 – No.6, 2014, 8135-8137.
[8] K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan, R. J. Qureshi, “A Secure cyclic Steganographic Technique for color images using Randomization” Technical Journal, University of Engineering and Technology Taxila, Volume 19 – No.III, 2014, 57-64.
[9] https://sites.google.com/site/cs534steganographyproject/home/matlab-code-and-examples.