Online Payment System Using Steganography and Visual Cryptography PDF
Online Payment System Using Steganography and Visual Cryptography PDF
Abstract—A rapid growth in E-Commerce market is seen in The rest of the paper is organized as follows: Section II
recent time throughout the world. With ever increasing gives brief description of text based steganography and visual
popularity of online shopping, Debit or Credit card fraud and cryptography. Section III contains related works. Section IV
personal information security are major concerns for customers, presents the proposed steganography method. Section V
merchants and banks specifically in the case of CNP (Card Not provides method of transaction in online shopping. Section VI
Present). This paper presents a new approach for providing presents proposed payment method. Section VII concludes the
limited information only that is necessary for fund transfer paper
during online shopping thereby safeguarding customer data and
increasing customer confidence and preventing identity theft.
The method uses combined application of steganography and II. STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY
visual cryptography for this purpose. Steganography is the art of hiding of a message within
another so that hidden message is indistinguishable. The key
Keywords—Information security; Steganography; Visual concept behind steganography is that message to be transmitted
Cryptography; Online shopping
is not detectable to casual eye. Text [4], image [5], video [6],
audio [7] are used as a cover media for hiding data in
I. INTRODUCTION steganography. In text steganography, message can be hidden
Online shopping is the retrieval of product information via by shifting word and line [4], in open spaces [8], in word
the Internet and issue of purchase order through electronic sequence [9]. Properties of a sentence such as number of
purchase request, filling of credit or debit card information and words, number of characters, number of vowels, position of
shipping of product by mail order or home delivery by courier vowels in a word are also used to hide secret message. The
[1]. Identity theft and phishing are the common dangers of advantage of preferring text steganography over other
online shopping. Identity theft is the stealing of someone’s steganography techniques is its smaller memory requirement
identity in the form of personal information and misuse of that and simpler communication [10].
information for making purchase and opening of bank accounts Visual Cryptography (VC), proposed by Naor et al. in [11],
or arranging credit cards. In 2012 consumer information was is a cryptographic technique based on visual secret sharing
misused for an average of 48 days as a result of identity theft used for image encryption. Using k out of n (k, n) visual secret
[2]. Phishing is a criminal mechanism that employs both social sharing scheme a secret image is encrypted in shares which are
engineering and technical subterfuge to steal consumers’ meaningless images that can be transmitted or distributed over
personal identity data and financial account credentials. In 2nd an untrusted communication channel. Only combining the k
quarter of 2013, Payment Service, Financial and Retail Service shares or more give the original secret image.
are the most targeted industrial sectors of phishing attacks [3].
Secure Socket Layer (SSL) encryption prevents the
interception of consumer information in transit between the III. RELATED WORK
consumer and the online merchant. However, one must still A brief survey of related work in the area of banking
trust merchant and its employees not to use consumer security based on steganography and visual cryptography is
information for their own purchases and not to sell the presented in this section. A customer authentication system
information to others. using visual cryptography is presented in [12] but it is
specifically designed for physical banking. A signature based
In this paper, a new method is proposed, that uses text
authentication system for core banking is proposed in [13] but
based steganography and visual cryptography, which
it also requires physical presence of the customer presenting
minimizes information sharing between consumer and online
the share. [14] proposes a combined image based
merchant but enable successful fund transfer from consumer’s
steganography and visual cryptography authentication system
account to merchant’s account thereby safeguarding consumer
for customer authentication in core banking. A message
information and preventing misuse of information at merchant
authentication image algorithm is proposed in [15] to protect
side. The method proposed is specifically for E-Commerce but
against e-banking fraud. A biometrics in conjunction with
can easily be extended for online as well as physical banking.
visual cryptography is used as authentication system [16].
A 14 H 7
R 13 G 6
I 13 B 5
O 12 F 4
T 11 Y 4
N 11 W 3
S 10 K 3
Fig. 1. Cover message.
L 10 V 3
C 9 X 2 D. Drawback
U 8 Z 2 In result to hide 4 letter word, 8 words are required
excluding the words that are added to provide flexibility in
D 8 J 1 sentence construction. So to hide a large message, this
P 7 Q 0 technique requires large no of words and creates a complexity
in sentence construction. Disadvantage of this technique can be
used in its advantage by applying it to online banking to create
spam mail to hide one’s banking information.
A. Encoding
Steps: V. TRANSACTION IN ONLINE SHOPPING
Representation of each letter in secret message by its In traditional online shopping as shown in Fig. 2 consumer
equivalent ASCII code. selects items from online shopping portal and then is directed
to the payment page. Online merchant may have its own
Conversion of ASCII code to equivalent 8 bit binary payment system or can take advantage of third party payment
number. systems such as PayPal, payonlinesystem, WebMoney and
Division of 8 bit binary number into two 4 bit parts. others. In the payment portal consumer submit his or her credit
SCEECS 2014
or debit card details such as credit or debit card number, name the snapshot image, two shares are generated using visual
on the card, expiry date of the card. cryptography.
SELECTION OF ITEM SUBMISSION OF PERSONAL
BY CUSTOMER AND DEBIT OR CREDIT CARD CUSTOMER’S
DETAILS IN SHOP’S SECURE SHARE CUSTOMER
SERVER +
CA’S SHARE
ACCOUNT NO
ACCOUNT NO
TRANSFER OF FUND
TRANSFER
OF FUND
USER
AUTHENTICATION
Fig. 2. Transaction in online shopping. PASSWORD
USER
AUTHENTICATION
Details of information sought from shopper vary from one PASSWORD
SCEECS 2014
also prevents unlawful use of customer information at
merchant’s side.
Presence of a fourth party, CA, enhances customer’s
satisfaction and security further as more number of
parties are involved in the process.
Usage of steganography ensures that the CA does not Fig. 7. Overlapping of share 1 and share 2.
know customer authentication password thus
maintaining customer privacy.
VII. CONCLUSIONS
Cover text can be sent in the form of email from CA to
bank to avoid rising suspicion. In this paper, a payment system for online shopping is
proposed by combining text based steganography and visual
Since customer data is distributed over 3 parties, a cryptography that provides customer data privacy and prevents
breach in single database can easily be contented. misuse of data at merchant’s side. The method is concerned
only with prevention of identify theft and customer data
B. Security Threat security. In comparison to other banking application which
During payment, merchant’s payment system requires uses steganography and visual cryptography [12, 13, and 14],
to direct the shopper to CA’s portal but fraudulent are basically applied for physical banking, the proposed
merchant may direct shopper to a portal similar to CA’s method can be applied for E-Commerce with focus area on
portal but of its own making and get hold of customer payment during online shopping as well as physical banking.
own share. To prevent this type of phishing attack, an
end-host based approach can be implemented for REFERENCES
detection and prevention of phishing attack as in [22].
[1] Jihui Chen, Xiaoyao Xie, and Fengxuan Jing, "The security of shopping
C. Method Extension online," Proceedings of 2011 International Conference on Electronic and
The payment system can also be extended to physical Mechanical Engineering and Information Technology (EMEIT), vol. 9,
pp. 4693-4696, 2011.
banking. Shares may contain customer image or
[2] Javelin Strategy & Research, “2013 Identify Fraud Report,”
signature in addition to customer authentication https://www.javelinstrategy.com/brochure/276.
password. In the bank, customer submits its own share
[3] Anti-Phishing Working Group (APWG), “Phishing Activity Trends
and customer physical signature is validated against the Report,2013,”http://docs.apwg.org/reports/apwg_trends_report_q2_2013
signature obtained by combining customer’s share and .pdf .
CA’s share along with validation of customer [4] Jack Brassil, Steven Low, Nicholas Maxemchuk, Larry O’Gorman,
authentication password. It prevents misuse of stolen “Hiding Information in Document Images,” Proceedings of the 1995
card and stops illegitimate customer. Conference on Information Sciences and Systems, Johns Hopkins
University, pp. 482-489, 1995.
[5] J. Chen, T. S. Chen, M. W. Cheng, “A New Data Hiding Scheme in
Binary Image,” Proceeding of Fifth International Symposium on
Multimedia Software Engineering, pp. 88-93, 2003.
[6] Hu ShengDun, U. KinTak, “A Novel Video Steganography Based on
Non-uniform Rectangular Partition,” Proceding of 14th International
Conference on Computational Science and Engineering, pp. 57-61,
Dalian, Liaoning, 2011.
Fig. 4. Snapshot account no and cover text. [7] Daniel Gruhl, Anthony Lu, Walter Bender, “Echo Hiding,” Proceedings
of the First International Workshop on Information Hidding, pp. 293-
315, Cambridge, UK, 1996.
[8] Walter Bender, Daniel Gruhl, Norishige Morimoto, A. Lu, “Techniques
for Data Hiding,” IBM Systems Journal, Vol. 35, Nos. 3 & 4, pp. 313-
336, 1996.
[9] K. Bennet, “Linguistic Steganography: Surevey, Analysis, and
Robustness Concerns for Hiding information in Text,” Purdue
University, Cerias Tech Report 2004—2013.
[10] J.C. Judge, “Steganography: Past, Present, Future,” SANS Institute,
Fig. 5. Share 1 kept by customer. November 30, 2001.
[11] M. Naor and A. Shamir, “Visual cryptography,” Advances in
Cryptograhy: EUROCRYPT’94, LNCS, vol. 950, pp. 1–12, 1995.
[12] Jaya, Siddharth Malik, Abhinav Aggarwal, Anjali Sardana, “Novel
Authentication System Using Visual Cryptography,” Proceedings of
2011 World Congress on Information and Communication
Technologies, pp. 1181-1186, Mumbai, India, 2011.
[13] Chetana Hegde, S. Manu, P. Deepa Shenoy, K. R. Venugopal, L M
Patnaik, “Secure Authentication using Image Processing and Visual
Fig. 6. Share 2 kept by CA. Cryptography for Banking Applications,” Proceedings of 16th
International Conference on Advanced Computing and
Communications, pp. 65-72, Chennai, India, 2008.
SCEECS 2014
[14] S.Premkumar, A.E.Narayanan, “New Visual Steganography Scheme for [18] http://oxforddictionaries.com/words/what-is-the-frequency-of-the-
Secure Banking Application,” Proceeding of 2012 International letters-of-the-alphabet-in-english.
Conference on Computing, Electronics and Electrical Technologies [19] Kalavathi Alla, Dr. R. Siva Rama Prasad, “An Evolution of Hindi Text
(ICCEET), pp. 1013 – 1016, Kumaracoil, India, 2012. Steganography,” Proceding of Sixth International Conference on
[15] K. Thamizhchelvy, G. Geetha, “E-Banking Security: Mitigating Online Information Technology, pp. 1577-1578, Las Vegas, NV, 2009.
Threats Using Message Authentication Image (MAI) Algorithm,” [20] PCI DSS Quick Reference Guide v2.0, pp 14-15.
Proceedings of 2012 International Conference on Computing Sciences
(ICCS), pp. 276 – 280, 2012. [21] https://www.braintreepayments.com/blog/pci-compliance-and-the-cost-
of-a-credit-card-breach.
[16] S. Suryadevara, R. Naaz, Shweta, S. Kapoor, “Visual cryptography
improvises the security of tongue as a biometric in banking system,” [22] Juan Chen, Chuanxiong Guo, “Online Detection and Prevention of
Proceedings of 2011 2nd International Conference on Computer and Phishing Attacks,” Proceedings of First International Conference on
Communication Technology (ICCCT), pp. 412 – 415, 2011. Communications and Networking in China (ChinaCom '06), pp. 1 - 7,
Beijing, China, 2006.
[17] Bharati Krishna Tirthaji, “Vedic Mathematics and its Spiritual
Dimension,” Motilal Bansari Publishers,1992.
SCEECS 2014