A Hybrid Data Hiding Approach for Securing Online Transactions
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
Online Banking is an arrangement of administrations given by a gathering of organized bank offices. Bank clients may get to their assets and perform other basic exchanges from any of the part branch workplaces. The real issue in centre keeping money is the realness of the client. Authentication login plays noteworthy roles in this day and age. Because of unavoidable hacking of the databases, it is dependably very hard to confide in the data. The venture work means to tackle the issue of legitimacy. In this paper, we are proposing a system using picture preparing, Steganography and visual cryptography, and after that separating it into shares. In this venture the Transaction Password is taken as a contribution from the client who needs to get implanted in the picture document. The picture record will be of the augmentations .jpg. The message process is figured utilizing the RSA algorithm and this is affixed with the message. The affixed encoded message is inserted in the picture utilizing the minimum huge piece calculation. The encoded picture is then divided into two shares utilizing Shamir's Secret Sharing Scheme. At the point when two shares are made, one is put away in the Bank database and the other is kept by the client or sends to E-Locker server. E-Locker Server is also secured by a dynamic character location based mechanism which is a new concept introduced as a contribution in this paper. The client needs to introduce the share amid the greater part of his exchanges. This impart is stacked to the primary share to get the first Transaction key. The Correlation strategy is utilized to take the choice on acknowledgment or dismissal of the yield and verify the client.
Authors and Affiliations
Ms. Prachi D. Rathod, Mrs. Smita R. Kapse
A Collaborative Watchdog and Classifier Based Scheme to Detect and Avoid Selfish Nodes in MANET
Wireless mobile ad hoc networks are self-configuring, dynamic networks in which nodes are free to move. A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of mobile devices c...
A Review of FTIR and Thermal Resistance test of Cement Mortar made with Metakaolin and Flyash Partially Replaced in cement cured in sea water
In this present study the strength and quality and thermal effect of the cement mortar having partially replaced metakaolin and flyash in cement by compressive strength and thermal resistance and Fourier Transform Infra...
Synthesis and Characterization of Silver Nanoparticles Using Celastrus Paniculatus Leaf Extract
This paper reports a rapid and ecofriendly green method for the synthesis of silver nanoparticles from silver nitrate solution using Celastrus Paniculatus leaf extract. Effect of Celastrus Paniculatus leaf extract , sil...
Failure modes of Cold formed steel beam- A Review
Cold-formed steel members have many advantages over hot-rolled steel members. However, they are susceptible to various buckling modes at stresses below the yield stress of the member because of their relatively high wid...
slugOptimized Name Entity Recognition of Machine Translation
Machine Translation is an important part of Natural Language Processing. Machine Translation refers to using machine to convert one natural language to another language. Machine transliteration for English to Punjabi an...